Product Overview: ZixEncrypt
ZixEncrypt is a comprehensive email encryption and data loss prevention solution designed to secure sensitive email communications for organizations across various industries, including healthcare, finance, and government. Here’s a detailed look at what ZixEncrypt does and its key features.
What ZixEncrypt Does
ZixEncrypt automatically secures email communications by scanning the content of all outbound emails and encrypting or quarantining them based on predefined policies. This ensures compliance with regulatory standards and protects sensitive information from unauthorized access. The solution integrates seamlessly with existing email environments, including Microsoft 365, on-premise Exchange, and Google Workspace, making it versatile and easy to implement.
Key Features
Policy-Based Email Encryption and Data Loss Prevention
ZixEncrypt allows organizations to define custom policies for automatic email encryption and data loss prevention. This ensures that sensitive information, such as financial data, healthcare records, or legal documents, is encrypted and secured without requiring manual intervention from users.
Content Scanning and Compliance Filters
The solution includes robust content scanning with advanced compliance filters that check outbound emails for sensitive content. This ensures that emails comply with industry regulations such as HIPAA, GLBA, FINRA, and more.
Best Method of Delivery (BMOD)
ZixEncrypt uses its patented Best Method of Delivery (BMOD) to automatically determine the most efficient way to securely deliver encrypted emails. This method ensures that emails are delivered transparently, often without requiring any extra steps or passwords from the recipients.
Bi-Directional Transparent Encryption
One of the standout features of ZixEncrypt is its bi-directional transparent email encryption. This allows senders and recipients to exchange encrypted emails seamlessly, even if they are not within the same organization, without the need for additional steps or passwords. This feature is particularly beneficial as it ensures that over a third of recipients can receive encrypted emails transparently.
Multiple Secure Delivery Options
ZixEncrypt offers multiple secure delivery options, ensuring that encrypted emails can be accessed by recipients even if they do not use Zix. Recipients can access encrypted emails via a secure web portal, making the process convenient and user-friendly.
Policy-Based TLS with Secure Fail-Over
The solution includes policy-based TLS (Transport Layer Security) with secure fail-over, ensuring that email communications remain secure and uninterrupted even in the event of a failure.
Automated Key Management and Simplified Implementation
ZixEncrypt features automated key management, which simplifies the encryption process and reduces the administrative burden. The implementation is also streamlined, requiring no special training or procedures for users.
Advanced Reporting and Compliance
The solution provides an innovative dashboard with instant access to over 30 reports, helping organizations maintain visibility and proof of compliance. This is crucial for meeting regulatory requirements and ensuring continuous updates to security protocols.
Secure File Sharing and Large File Support
ZixEncrypt supports secure file sharing with the ability to send and receive files up to 100 GB per message using the Secure Large File Add-on. This feature is integrated into Outlook and other email clients, making it easy to share large files securely.
Customer Support and Deployment Options
ZixEncrypt offers 24/7 customer support through various channels, including phone, email, and live chat. The solution can be deployed in cloud-based, on-premise, or hybrid configurations to fit the specific needs of different organizations.
In summary, ZixEncrypt is a robust email encryption solution that combines automatic policy-based encryption, advanced content scanning, and seamless delivery options to protect sensitive email communications. Its ease of use, comprehensive reporting, and compliance features make it an essential tool for organizations that handle confidential information.