Stealthphone Crypto E-mail

← Back

E-mail encryption

Stealthphone Crypto E-mail

Stealthphone Crypto E-mail

Stealthphone Crypto E-mail is a hardware-software solution designed to operate with secure E-mail on a PC through MS Outlook by means of the special plug-in functionality.

Description

Nowadays criminals can purchase a high performance PC with a processor capable of running more than 56 billion operations per second. Such technical capabilities allow hackers to break into almost all e-mails by 2015.

By now cybercriminals have hacked 40 million e-mail addresses.

Stealthphone Crypto E-mail is a hardware-software solution designed to work with secure E-mail on a PC through MS Outlook by means of the special plug-in functionality.



  • Encryption of E-mail messages with attachments (all types of files and multimedia information) according to military standards, provided by the hardware Stealthphone Hard encryption device

  • Compatibility with built-in E-mail client apps of subscriber solutions for Stealthphone Hard and Stealthphone Soft

  • Visual control of the subscriber’s (sender’s) name on Stealthphone Hard screen for his secure authentication

  • Easy to install and use

  • Compatibility with OS Windows family

Stealthphone Crypto E-mail functions

The main function of StealthphoneCrypto E-mail is to secure E-mail messages, including E-mail messages with attachments (all types of files) sent over MS Outlook. Stealthphone Crypto E-mail encryption of  E-mail messages and their attachments is seamless for the Stealthphone crypto network subscribers and is performed without any delays.

Stealthphone Crypto E-mail consists of:

  • Hardware encryption device Stealthphone Hard

  • Stealthphone Hard driver

  • Stealthphone MS Outlook plug-in software

Cryptographic characteristics

  • Strong symmetric encryption algorithm with 256 bit key length (proprietary manufacturer’s design)

  • Physical random numbers sensor built in Stealthphone Hard is used to generate cryptographic keys

  • Password protection against unauthorized access (password length from 8 to 20 digits)

  • The encryption device is immune to computer viruses

  • Two-factor authentication is the procedure to confirm user rights

Operational feature comparison of Crypto Email analogues


Product / Operational Features

 Crypto Email 

  McAfee SaaS
 Email Encryption 

 Symantec Encryption 

 Jetico BestCrypt 

1. EMail client plug-in

+

+

+

-

2. Transparent encryption/decryption of E-mail messages

+

+

+

+

3. Users can exchange encrypted messages

+

+

-

-

4. Two-factor authentication without inputting a PIN-code with a computer keyboard

+

-

-

-

5. Key storage on removable media

+

-

-

-

6. Hardware random number generator used to generate passwords

+

-

-

-

7. Hardware data encryption

+

-

-

-

8. File encryption/decryption in mobile devices

+

+

-

-

  • Crypto Email – a hardware-software data encryption complex designed by MTT. A hardware encryptor StealthPhone is used for data encryption and key storage.

  • McAfee SaaS Email Encryption – a software solution designed by McAfee to encrypt E-mail messages.

  • Symantec Encryption – a software solution designed by Symantec to encrypt E -mail messages.

  • Jetico BestCrypt - a software solution designed by Jetico to encrypt files and E-mail messages.

Have a question?

Submit your question on website and our specialist will call you back within 24-hours and answer your question. If you want to know more about our products, you can apply for a full-course training at your work place.

Submit question
Request training