FAQs
How Does Email Encryption Work?
With email being the predominant means of business communication, your email is a tempting target for a hostile actor. There are multiple protocols that have been used to encrypt emails, each with their own history and strengths and weaknesses. The most used types of encryption are TLS, AES, PGP, and S/MIME.
- TLS – TLS stands for Transport Layer Security and has evolved from SSL (Secure Socket Layer). This type of encryption is in use whenever you see the padlock icon in search bar of web browsers where a secure connection is established. It can be used to send emails, as well as other file types. TLS will ensure your data is safe whilst in transit, it cannot, however, protect emails that are in your inbox.
- AES – Advanced Encryption Standard is a robust and effective method of sending data securely. It uses a symmetric key cipher which makes it incredibly fast, but no less secure. The encryption acts like a trap door – it is easy to go in one direction (encryption) but much harder to go backwards (decrypt) unless you have the right key. To hack AES-256, an attacker would need to work out a number that is 78 digits long to decrypt your data. While 256 is the highest encryption level on use, it can also be used in 128- or 192-bit formats. This type of encryption is used by governmental organizations.
- PGP – PGP stands for Pretty Good Privacy (no, really), and uses symmetric-key cryptography to protect your email, texts, and files. It has been the de facto email encryption method since its invention in 1991. The public key is used to encrypt the data, while a separate key is used to decrypt the data. As you are not using the same key for both processes, there is less opportunity for an attacker to steal the key.
- S/MIME – This builds on Multipurpose Internet Mail Extension (MIME) by employing asymmetric encryption methods. This means that there are a pair of keys – one is public and the other is private. Not only does S/MIME protect your email whilst in transit, but it ensures the email is not modified and protects against email spoofing. S/MIME also uses digital certificates to verify sender identity. This type of encryption will need to be implemented on the user endpoint.
What Features Should You Look For In An Email Encryption Solution?
Key features to look for in an email encryption solution include:
- Cloud-Based End-To-End Encryption: Cloud-based end-t0-end encryption is the one most secure, seamless method of encrypting email messages.
- Policy-Based Data Loss Prevention: Policies and controls helps admins to ensure that sensitive information cannot be sent over email without being securely encrypted.
- Legal Compliance: The best email encryption solutions will be fully compliant with industry and data regulations.
- Range Of Delivery Methods Available: Encryption solutions should support users by offering a range of delivery methods.
- End User Controls: End users should be able to encrypt email messages and attachments easily, and many solutions enable end users to recall, unsend and edit previously sent messages. Recipients should be able to easily respond to encrypted email messages.
- Easy-To-Use Admin Console With Reporting: Admins should be able to easily set policies and controls for email messages, and view encryption metrics.
- Branding Options: Encrypted emails can be branded with your company logo and messaging to ensure consistency in communication to clients and customers.
- Accuracy and deliverability: Encrypted messages and replies to encrypted content should be delivered quickly to recipients.
What Is Email Encryption Software?
Email encryption software solutions enable users to encrypt their email traffic, ensuring that email content, meta-data and attachments are only available to the intended recipients. There are many use cases for encrypting email content – particularly when sending sensitive data, such as personal information, financial records, or health-related documents.
Enterprise email encryption solutions are often offered as cloud-based services with a SaaS model. There is often no deployment necessary, and admins are able to configure policies governing which messages are automatically encrypted, based on message content. End users should also be able to read and respond to encrypted email messages, whether they have the email encryption software deployed, or are an external recipient receiving an encrypted message.
Top Email Encryption Platforms Shortlist FAQs
Why should you trust this Shortlist?
This article was technically reviewed by Expert Insights CEO and founder, Craig MacAlpine, who has over 25 years’ experience in the email security. He previously founded an email security and encryption provider – EPA Cloud, which was acquired by J2 Global (now Ziff Davies Inc) in 2013. Craig is an experienced email security innovator and practitioner who has worked in front line email security management, in an MSP environment, and as an email security supplier and vendor in the course of his career.
This article was written by the Content Director at Expert Insights, who has been covering the email security market as a journalist for over 6 years.
Research for this guide included:
- Conducted first-hand technical reviews and testing of several dozen leading email security and email encryption providers.
- Interviewed 30+ executives in the email encryption and email security markets.
- Discussions with 200+ businesses over the course of several years about the most important requirements in an email security and email encryption solution.
- First-hand industry knowledge and expertise over many decades in the email security industry as an entrepreneur and innovator.
- We have conducted technical reviews, watched demos, or deployed trials for every vendor on the list. We have also reviewed vendor documentation and third-party user reviews and feedback.
This guide is updated at least every 3-months to review the vendors included and ensure features listed are up to date.
Who is this Shortlist for?
Email encryption is required for organizations of all sizes, but is most commonly used for organizations that must adhere to stringent data protection regulations for internal and external communications.
How was the Shortlist picked?
When considering email encryption solutions, we evaluated providers based on the following criteria.
Features: Based on conversations with vendors, end customers, and our own testing, we selected the following key features:
- Platform security: Security of the email encryption platform itself, the methods used to encrypt emails, and the security controls available for admins and end users are key considerations.
- Ease of use: From an end user perspective, ease of use for a compliance solution is critical. We have taken particular notice of how easy it is to send and receive encrypted emails, as well as additional end user controls, such as blocking email forwarding controls.
- Policies: DLP polices, compliance controls, and rules are key considerations when choosing an encryption solution and are a key factor in our list.
- Compliance and reporting: Breadth and depth of support for legal frameworks continue to become more important for email encryption, including detailed reporting and auditing.
- Additional capabilities: Further features are considered, such as white-labelling, deliverability, and other platform features such as integrated email security and DLP capabilities.
Market Perception: We reviewed each vendor included on the Shortlist to ensure they are reliable, trusted providers in the market. We reviewed their documentation, third-party analyst reports, and (where possible) have interviewed executives directly.
Customer Usage: We use market share as a metric when comparing vendors and aim to represent high market share vendors and challenger brands with innovative capabilities. We have spoken to end-customers, and reviewed customer case studies, testimonials, and end user reviews.
Product Heritage: Finally, we have looked at where a product has come from in the market. We have considered when companies were founded, their leadership team, their mission statements, and their successes. We have also considered product updates and how regularly new features are added. We have ensured all vendors are credible leaders with a solution we would be happy to use ourselves.
Based on our experience in the email encryption market, we have also considered bundle offers, such as offering encryption alongside a secure email gateway service, as well as the customer support on offer SLAs and other use cases.
There are over 30+ email encryption vendors we are tracking, and this list is designed to just be a selection of the best providers. Many strong and trusted solutions have not been included in this list; this is not intended as a criticism or rebuke of any unlisted solution.