Professional

Email Security

StealthMail makes your emails secure and invisible to email relays, hackers, or Public Internet threats - making email relationship with clients a trusted one via StealthMail’s best-in-class Secure Email Channel.

Moreover, StealthMail gives you full and exclusive control over your encryption keys, data, and access rights - so that your email communication is fully protected.

To start using StealthMail no integration is needed. There are no risks for existing IT infrastructure. The whole deployment takes less than 4 hours. Users get Outlook Add-ins and the server is deployed to Company’s Azure Cloud.

Outlook

Advanced

Encryption

The solution includes true end-to-end encryption. Security keys are generated and stored on the user’s side. Moreover, The Company can decide where to store their Email content (on The Company’s local servers, or in the Company's Azure cloud).
Encryption is performed on the user’s side. That means any data the user sends is already secured and protected by advanced encryption algorithms.

No Integration

Needed

Existing infrastructure is not affected;

Users install Outlook Add-in;

StealthMail is deployed to Company’s Azure Cloud;

Security Officers use their own Console and Qradar.

KNOW

How it Works

StealthMail uses Email only to send Stealth-links that do not contain any user information whatsoever.

Only through the Stealth-links can an authorized user access encrypted Email content and attachments.

This approach to protecting emails makes the gaping vulnerabilities of SMTP, SSL/TLS a complete non-issue.

Schema

Information

Protection

MailIcon

No one, except for the defined list of users, is able to see Email content from the sender. StealthMail constantly checks user identity and applies a company’s policies to executed actions.

All secure data that is requested by an authorized user downloads via an end-to-end encrypted channel to protected, and encrypted temporary storage, and this is decrypted only when the user is accessing it. After the user’s authorization session ends, all temporarily stored data is erased.

Furthermore, at any given time, the security officer may block user access to the information stored on the user side and even erase it.

Revoke

Sent emails

MailIcon

Any historical email or attachment, whether an employee’s or a 3rd party’s, never leaves the company’s security perimeter and is individually encrypted in protected storage.

This allows to:

Revoke accidentally sent Emails;

Revoke Emails from former contractors after projects are completed;

Revoke Emails from former employees, even if sent to personal Email accounts.

Making

Secure Cloud Usage

StealthMail gives exclusive control and ownership of the encryption keys and crypto-machines to our clients. Even though data may be stored in the cloud, the cloud provider has no access to the data because each Email, attachment, or file is individually encrypted on the user’s side and is kept in protected storage.

Solving

The main threat of an Email

Warning

StealthMail uses Email to send only Stealth-links that do not contain any user information whatsoever. Only through Stealth-links can an authorized user access encrypted Email content and attachments.

Thus, untrusted 3rd party mail servers will only receive and transfer Stealth-links, which can't be decrypted as they do not contain data. This approach to protecting Emails makes SMTP, SSL/TLS vulnerabilities complete non-issues.

Professional

Solution

Icon

INVISIBLE
EMAIL

Mail servers are only used to send Stealth-links. Email content and files are not exposed to Public Internet.

Mail servers are only used to send Stealth-links. Email content and files are not exposed to Public Internet.

Icon

EMAIL
ENCRYPTION

Email is only used to transfer a Stealth-link. The actual content is sent via secure channels in an encrypted state.

Email is only used to transfer a Stealth-link. The actual content is sent via secure channels in an encrypted state.

Icon

SECURE EMAIL
CHANNEL

Protect yourself and clients from phishing (whaling, spear, clone, etc. ) and Business Email Compromise Attacks.

Protect yourself and clients from phishing (whaling, spear, clone, etc. ) and Business Email Compromise Attacks.

Icon

LEGAL
COMPLIANCE

Avoid severe penalties, protect your reputation, save time, money and effort.

Avoid severe penalties, protect your reputation, save time, money and effort.

Icon

EMAIL
CERTIFICATE

Senders, recipients, and their devices are identified and authorized making spear phishing impossible.

Senders, recipients, and their devices are identified and authorized making spear phishing impossible.

Icon

EMAIL
SAFE

Stored emails are encrypted separately, so if a criminal accessed the stored data, it still wouldn’t be compromised.

Stored emails are encrypted separately, so if a criminal accessed the stored data, it still wouldn’t be compromised.

Icon

EMAIL
SHREDDER

Erase any historical Emails for all recipients on all devices without possibility of recovery

Erase any historical Emails for all recipients on all devices without possibility of recovery

Icon

STEALTH
VIEW

Data stored on a user’s device is decrypted only while the user is authorized, and it is removed immediately after.

Data stored on a user’s device is decrypted only while the user is authorized, and it is removed immediately after.

Icon

ENCRYPTION
KEYS

Encryption keys are stored in your company’s secure perimeter.

Encryption keys are stored in your company’s secure perimeter.

Icon

INFRASTRUCTURE
CONTROL

Critical infrastructure can be integrated on-premises or into the company’s cloud.

Critical infrastructure can be integrated on-premises or into the company’s cloud.

Icon

END-USER
DEVICE
ENCRYPTION

End-to-end encryption is performed on the end user's device.

End-to-end encryption is performed on the end user's device.

Icon

RIGHTS
MANAGEMENT

No one except a specified list of recipients is able to see the user’s email content.

No one except a specified list of recipients is able to see the user’s email content.

View

Access history

HistoryIcon

Email senders become content owners, which allows them to see who had access to their Emails and when.

Swiss

DPA

LegalIcon

StealthMail also offers optional legal protection under Swiss DPA (Data Protection Act), viewed by many as the most secure legal data protection environment in the world. StealthMail acts as an escrow agent and guarantees that no other 3rd party will have access to our clients' data. Clients enjoy the best of both worlds - cloud economics and absolute privacy.

©2018 StealthMail. All rights reserved

Info

We use cookies to improve your experience