POP, IMAP, and Exchange
What’s the difference?
There are three protocols for accessing email services. They vary in features, as outlined below:
POP (Post Office Protocol), so named for the method in which mail is sent from the server to your computer, is the oldest and simplest protocol. The server (or post office) collects and then sends out the mail to your computer, but does not keep track of what happens with the email after it arrives on your computer. Therefore, any organization (ex. folder creation) is local, and you will not see it if you make a folder in Outlook and then look for the same folder in the email’s web client.
IMAP (Internet Message Access Protocol) synchronizes your inbox and other mail folders. Making a change on the server side will update any clients (ex. Outlook or the mail app on your phone) to match the same structure and vice versa. IMAP, therefore, is a good way to keep email organized while eliminating the risk of losing your emails in the event of your computer’s hard drive failing.
Exchange (Microsoft’s proprietary protocol) is much like IMAP in that it synchronizes your email messages and folders, but it goes one step further: Exchange synchronizes all of your contacts and calendars as well and even allows you to share calendars and contacts with other Exchange users. Exchange integrates seamlessly with Microsoft Outlook and works with both Android and iOS.
Policy-Based Encryption Service
- Centralized, policy-based email encryption for regulatory compliance
- Automatic retrieval and distribution of public encryption keys, enabling transparent email encryption between all encryption customers
- Automated content scanning of messages and attachments, providing transparent encryption for your company’s email senders
- Ability to encrypt, reroute or block emails based on your company’s policy
- “Push” recipient delivery method – sending an encrypted email directly to a recipient’s inbox and enabling secure read, reply and forward capability
Secure Message Portal
- “Pull” recipient delivery method including custom branding based on your company’s needs
- Hosted and maintained in SysTrust-certified and SAS-70 type II accredited Data Centers
- Encrypted read, reply and save capabilities for recipients
- Secured compose capability for your business partners, customers, members, patients, etc.
- Unique support for Blackberry and smartphone devices
Why Encrypt Email?
With an increase in regulatory pressures, identity theft and highly publicized security breaches in the media, companies that do not encrypt emails containing sensitive information are at risk of regulatory fines, lawsuits, negative PR and a loss of company intellectual property.
Companies dependent on building a relationship of trust with their customers and business partners cannot afford to risk such potential damages to their brand image. Email encryption is, therefore, an important piece of the security puzzle; it protects your company, your customers and business partners. The question then becomes how to implement this critical business process.
Why is this service different?
The power of the network
Encryption allows customers to communicate, seamlessly and securely – inbox to inbox – with no sender/recipient authentication necessary. This unmatched approach to email encryption is accomplished by customers enrolling in the Directory, a global (encryption key) repository with almost 30 million members and growing at over 100,000 new members per week.
Customers eliminate the need to build their own directory of encryption keys and instead leverage the hosted and shared secure network, which includes:
- The US Federal Banking Regulators and the SEC
- More than 1200 financial institutions
- 20 State Banking Regulators
- More than 1,000 US hospitals
- Over 30 Blue Cross Blue Shield Institutions
- 3 out of the 5 largest US health insurance companies
Policy-based Email Encryption
The email encryption service offers the ability for a company to encrypt outbound emails based on content, sender, and recipient.
The full content scanning of messages and attachments enables companies to comply with industry regulations with the help of pre-defined lexicons that automatically encrypt, reroute, or block email messages containing financial (GLBA), healthcare (HIPAA), PHI, PII and profanity content. A company’s sender can also trigger an email to be encrypted, as well as encrypting all emails destined for specific recipient email domains and email addresses.
These pre-defined lexicons will help your customers comply with each State Data Breach Notification Laws.