Safely Open - Protect yourself

Safely Open

Cloud container based malware protection where you open your emails in a disposable container.

Safely Open is an entirely new way to help protect you and your organisation from threats, including those not yet identified by antivirus software. If you can think of existing mechanisms as acting like vaccines, where they work against known infections, Safely Open acts like a quarantine station, where you can interact with and look at suspicious emails and documents in a safe environment, without risking your organisation.

Safely Open works by opening your suspicious emails in a disposable, one time use environment in the cloud, as an entirely anonymous user, each time. Your email and any attachments are opened in our Safely Open cloud environment, yet we let you see what the contents looks like on your screen in your web browser so you can read it just like you would on your normal screen.

However, the big difference, and what protects you is that while you can see the contents of the email on your screen, the actual document is opened inside the Safely Open environment. If there are any pieces of malware in the emails, documents or web sites, or if the document is not really a document, then the infection is contained within our Safely Open environment. Once you are finished with an email, the Safely Open environment is destroyed, and any infection is destroyed along with the environment, preventing its spread. It works just like a containment box in somewhere like a nuclear power plant. Dangerous substances are contained in a secure place, yet you are able to interact with these materials protected by heavy rubber gloves. If anything goes wrong, the damage is contained to the containment box.

Please note - This add in requires a subscription to Safely Open to function. A free trial is available to determine if Safely Open is right for you.

Add-in capabilities
When this add-in is used, it
  • Can send data over the Internet
  • This add-in can read or modify the contents of any item in your mailbox, and create new items. It can access personal information -- such as the body, subject, sender, recipients, or attachments -- in any message or calendar item. It may send this data to a third-party service.
  • At a glance