https://store-images.s-microsoft.com/image/apps.9551.8e77275b-8ead-4c15-8914-a59f0bab3fc4.12285d8a-ebf0-418b-9de1-95a001609469.8a07b261-f1e8-4282-bd1d-c681e501bbe6.png

StealthMail for Teams

by Stealth Mail

StealthMail makes your emails secure and invisible for Internet providers, hackers or 3rd parties

OVERVIEW

StealthMail gives you full and exclusive control over your encryption keys, data, and access rights so that your email communication is fully protected.

No integration is needed to start using StealthMail therefore there’s no risks for the existing IT infrastructure. The whole deployment takes less than 4 hours. Users get Outlook Add-in, and the server is deployed to the Microsoft Azure Cloud.


INDUSTRY’S PAIN POINTS

Email is a leading form of business communication that moves to the cloud and faces several problems:

  • Email protocol weaknesses - Email protocol (SMTP) prescribes to send emails in plain text (RFC 3207), which makes it easy for criminals to read, collect, and alter their content.
  • No real encryption - Most email security solutions offer only HTTPS, SSL/TLS channel security to the email server.
  • Public Internet - Emails are sent via third party email relays, which are often untrusted and not secure.
  • Human error - Employees and management errors, intended or not, create unlimited risks and can cause data breaches.
  • Legal compliance - GDPR, SOX, GLBA and other regulations require information protection and impose significant penalties for non-compliance.
  • Security keys ownership - Owning the encryption keys, service providers have complete access to all of their clients’ sensitive information.


STEALTHMAIL SOLUTION

StealthMail is based on the independent modular system that offers flexibility, which allows removing negative perception blockers. It includes a true end-to-end encryption, where security keys are generated and stored on the user’s side.

Moreover, only the user owns the keys and decides where to store his email content (on the company’s local servers, in the cloud, or in the STEALTHMAIL storage).

Encryption process transpires on the user’s side as well. It means that data leaves the user’s side already protected by advanced encryption algorithms.

  • Exclude sensitive email content and attachments from transferring via SMTP.
  • Manage access rights to the email content and attachments, revoke emails or any data.
  • Encrypt email content and attachments separately. Transfer and store data encrypted.
  • Check user identity and apply company policies.


WHAT'S NEW

  • Added support for team channels.
  • Improved performamnce.

App capabilities

When this app is used, it
  • Can send data over the Internet
  • This app can access personal information on the active message, such as phone numbers, postal addresses, or URLs. The app may send this data to a third-party service. Other items in your mailbox can’t be read or modified.

At a glance

https://store-images.s-microsoft.com/image/apps.23276.8e77275b-8ead-4c15-8914-a59f0bab3fc4.12285d8a-ebf0-418b-9de1-95a001609469.0c220c76-3662-440f-ab54-91e1794112a8.png
https://store-images.s-microsoft.com/image/apps.50314.8e77275b-8ead-4c15-8914-a59f0bab3fc4.12285d8a-ebf0-418b-9de1-95a001609469.5bca42e6-db01-4ce6-abc8-ba6030d0cf89.png
https://store-images.s-microsoft.com/image/apps.14434.8e77275b-8ead-4c15-8914-a59f0bab3fc4.b6213502-5dae-4387-8d48-4b8a83eff6d8.c8abaa3b-7709-4324-b645-9ef6e7562beb.png