Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Covergence: Encrypt that E-mail

By Nigel Johnson
March 16, 2006
Nigel Johnson


With the constraints of regulatory compliance and the inundation of phishing and pharming attempts, corporate security executives, IT administrators and end users now seek solutions to protect the security and privacy of their e-mail. Solutions for encrypted e-mail are plentiful. But how does one match their needs with the most suitable solution?

End users must decide if they should be exploring ways to protect sensitive information through encrypted e-mail. It is even more important for e-mail messages sent among security personnel or from security to others be better protected, too.

Many vendors provide e-mail assessment services as an up-front way to introduce them and to help assess vulnerabilities in e-mail communications. Whether free or fee-based, an e-mail assessment can provide quantifiable statistics on the number of messages in a mail stream that contain sensitive information and need to be sent securely. They may also use content-filtering techniques that search for language specific to each specific industry.



Users need multiple delivery options for secure email.

Interoperability options

Security working with IT will likely need to determine which domains that secure e-mail needs to be sent and received from, and decide if they need to exchange encrypted messages with trusted partners and suppliers. If so, they should look for a vendor with a solution that supports interoperability with other vendors’ solutions.

A vendor’s solution may be based on several encryption methods or protocols (See Figure 1). Asymmetric, public key or PKI, systems often use PGP, TLS or S/MIME in their solutions. Common symmetric data encryption algorithms include 3DES, AES or RSA, which can be used within a public key solution. As a result of the many and varied methods of cryptography, many solutions are proprietary. The three-letter acronym that a solution is based on is important, but not more so than the features it provides.

Those who need to exchange secure messages with corporations that already have an e-mail encryption solution should look for a vendor that meets the interoperability standards defined for S/MIME, TLS or PGP. These full-featured gateway solutions provide for exchanging secure messages with partners and suppliers who have implemented another vendor’s solution. Messages may be decrypted at the gateway at the edge of a network and delivered plain text with a branded footer describing how the message was secured.



Transparency is key

User transparency is a key requirement for corporate-wide systems. End users should look for a system that uses corporate-wide policies implemented by their IT security administrators. Corporate-wide policies scan e-mail and attachments before they leave the mail server to verify if they contain sensitive information that needs to be encrypted. Users can depend on the system to decide when messages should be encrypted.

These systems will add a footer to the message, indicating that it was secured by the sender for the protection of the recipient. While this is reassuring for both sender and recipient, decrypting secure messages on the part of the end user can become burdensome.

For business-to-consumer needs, end users should look for a solution that is easy to deploy and easy to use for recipients. Decrypting a message always involves a password, a key or both. The less complicated the encryption process is for the recipient, the greater the level of acceptance.

Retrieving messages from a Web portal over a secure link such as SSL is a widely accepted solution. If requiring users to log into a Web portal introduces too much uncertainly (e.g. fear of phishing), some vendors are now able to push encrypted messages directly into the recipient’s inbox.



Encrypting at desktop

In addition to encrypting and/or decrypting at the gateway, mail server and portal, some individuals will invariably require the highest level of security and flexibility, a desktop-to-desktop capability.

When developing corporate-wide e-mail encryption policies, administrators typically must find a balance between policies that protect sensitive data within a range of industry-specific terms and the needs of individual employees within the company. With content-filtering policies, end users can meet the regulatory requirements for encryption of e-mail messages containing sensitive information. While these corporate policies will protect sensitive data, there will be individuals within the organization who have different needs not met by these general policies.

Specifiers should look for a provider with a solution that meets the needs of both types of users. For example, senior executives and users in finance and human resources may need to be able to ensure that specific messages they send are encrypted. This may be provided by a separate e-mail encryption method that is beyond the corporate-wide policies. These senders will need to download client software that gives them the power to encrypt (and decrypt) on demand. A user-specific encryption capability should be integrated within the overall corporate-wide solution.



A strategy that security can use to better protect organizational e-mail is for the system to provide even more information prior to opening messages. One example from Iconix is visual ID for e-mail in which the recipient can see who’s sending the e-mail.

Evaluating tradeoffs

The higher the level of security, the more complex it can be for users, support staff and IT administrators. Client software on the user’s desktop provides the highest level of security, but users become responsible for items like private key management, password management and downloading the latest version of the client software.

While issuing thousands of messages to subscribers in a secure portal is efficient on the sending side, security staff must ensure that subscribers are informed up front about the security of the portal. IT can provide easily accessible online or live support if users have questions about the method of delivery or lose their login credentials.

For server-based solutions with corporate-wide encryption policies, end users should ensure that the content-filtering techniques are flexible and can be customized to the terminology that is specific to their industry. Those who can fine-tune their policies and the lexicons used by the search engine can achieve a higher rate of accuracy in selecting messages that do need to be encrypted, avoiding the high false positive syndrome.

Furthermore, those who understand the needs of their employees, customers, partners and subscribers, matching them to a choice of e-mail encryption solutions will be a successful and rewarding endeavor.



Links

  • ZixCorp.
  • ZixCorp.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nigel Johnson is vice president of business development and product management for ZixCorp., Dallas. More information from the author through www.zixcorp.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • metrics-cyber-freepik1170.jpg

    To encrypt or not to encrypt — That is the question

    See More
  • E-gad! E-mail Security Gets More Complex

    See More
  • E-mail Fire Alarm Info

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing