Stealthphone Crypto E-mail
E-mail encryption
Stealthphone Crypto E-mail
- Stealthphone Crypto E-mail is a hardware-software solution designed to operate with secure E-mail on a PC through MS Outlook by means of the special plug-in functionality.
Description
Nowadays criminals can purchase a high performance PC with a processor capable of running more than 56 billion operations per second. Such technical capabilities allow hackers to break into almost all e-mails by 2015.
By now cybercriminals have hacked 40 million e-mail addresses.
Stealthphone Crypto E-mail is a hardware-software solution designed to work with secure E-mail on a PC through MS Outlook by means of the special plug-in functionality.
- Encryption of E-mail messages with attachments (all types of files and multimedia information) according to military standards, provided by the hardware Stealthphone Hard encryption device
- Compatibility with built-in E-mail client apps of subscriber solutions for Stealthphone Hard and Stealthphone Soft
- Visual control of the subscriber’s (sender’s) name on Stealthphone Hard screen for his secure authentication
- Easy to install and use
- Compatibility with OS Windows family
Stealthphone Crypto E-mail functions
The main function of StealthphoneCrypto E-mail is to secure E-mail messages, including E-mail messages with attachments (all types of files) sent over MS Outlook. Stealthphone Crypto E-mail encryption of E-mail messages and their attachments is seamless for the Stealthphone crypto network subscribers and is performed without any delays.
Stealthphone Crypto E-mail consists of:
- Hardware encryption device Stealthphone Hard
- Stealthphone Hard driver
- Stealthphone MS Outlook plug-in software
Cryptographic characteristics
- Strong symmetric encryption algorithm with 256 bit key length (proprietary manufacturer’s design)
- Physical random numbers sensor built in Stealthphone Hard is used to generate cryptographic keys
- Password protection against unauthorized access (password length from 8 to 20 digits)
- The encryption device is immune to computer viruses
- Two-factor authentication is the procedure to confirm user rights
Operational feature comparison of Crypto Email analogues
Product / Operational Features |
Crypto Email |
McAfee SaaS
|
Symantec Encryption |
Jetico BestCrypt |
1. EMail client plug-in |
+ |
+ |
+ |
- |
2. Transparent encryption/decryption of E-mail messages |
+ |
+ |
+ |
+ |
3. Users can exchange encrypted messages |
+ |
+ |
- |
- |
4. Two-factor authentication without inputting a PIN-code with a computer keyboard |
+ |
- |
- |
- |
5. Key storage on removable media |
+ |
- |
- |
- |
6. Hardware random number generator used to generate passwords |
+ |
- |
- |
- |
7. Hardware data encryption |
+ |
- |
- |
- |
8. File encryption/decryption in mobile devices |
+ |
+ |
- |
- |
- Crypto Email – a hardware-software data encryption complex designed by MTT. A hardware encryptor StealthPhone is used for data encryption and key storage.
- McAfee SaaS Email Encryption – a software solution designed by McAfee to encrypt E-mail messages.
- Symantec Encryption – a software solution designed by Symantec to encrypt E
-mail messages.
- Jetico BestCrypt - a software solution designed by Jetico to encrypt files and E-mail messages.
Have a question?
Submit your question on website and our specialist will call you back within 24-hours and answer your question. If you want to know more about our products, you can apply for a full-course training at your work place.