No-touch key management
Email Encryption eliminates the administrative overhead of key management. As keys are generated, they are securely stored, managed and made highly available through our cloud-based infrastructure. Administrators can even allow end users to revoke, expire, or restore access to encrypted email messages.
Coverage across email, network shares, and the cloud
Email Encryption makes the most of your existing investments in our Email and Information Protection solutions. The products share more than 80 template-based policies—including PCI, HIPAA, PII and more—across email and files on network shares and SharePoint sites. Custom policies can extend to both data in motion and at rest, all encrypted through Email Encryption.