- Cybersecurity Solutions -

Advanced Email Protector

No Apps or Plugins

Send fully encrypted emails without downloading and installing numerous apps or plugins. With Advanced Email Protector, just wrap the subject in brackets and hit send.

Secure File Transfer

Every Advanced Email Protector user gets their own personalized file transfer page with an easy Share link they can give to anyone. Shared files and messages show up in your inbox just like a regular message.

Easily Send Large Files

Send files up to 1GB in size with up to 25 files allowed per message when sending from Advanced Email Protectors webmail interface or secure file transfer.

Superior Data Encryption

Advanced Email Protector is built on a distributed, multi-layer AES256 encryption design with automatic key rotation. This means you never have to wonder if your data is safe.

Ephemeral Message Storage

All data is temporary with no mailbox quotas to keep track of. Messages expire in 1 year, but can be set to expire sooner. Seamless archive integration and 'Export to Inbox' features allow you to securely journal your data to an archive or transfer to your normal email box.

Personal Data Keys

For ultimate control of your encrypted message, turn on this feature to require a personal data key in order to decrypt the data. Since this key is never stored in Advanced Email Protector, only you hold the key to reading your messages. 

Accurate Email Filtering

Icon-based scoring indicators clearly communicate various levels of safety. Messages containing offensive, harmful, or policy violating content are held for user review, while good messages continue on their way. 

Detailed Analytics

Quickly see why an email was held and where it came from to determine if the sender is trustworthy. Add or remove users to your allowed or blocked addresses in one simple step.

Email Compliance

Define which email content is not permitted for distribution to secure data such as Social Security or credit card numbers, or create custom rules to cover your specific outbound spam filter policy or legal email compliance needs.

Securely sign in without a password

Simply request to sign in using your email address, then click the secure link from your inbox - the same way most password resets are handled.

Expiring, one-time-use links

Sign-in links expire 15 minutes after being delivered and each sign-in link only works once, so you never have to worry about someone rummaging through your inbox and opening old links.

Geolocation of sign-in requests

As an additional layer of security, sign-in request notifications include the requesting device IP and approximate location.

Advanced device fingerprinting

Sign-in links will only work from the device that originally requested access. If a different device attempts to sign in, the link is invalidated and the session is blocked.