SlideShare a Scribd company logo
1 of 2
Download to read offline
Cloud-based email encryption
Email is the most important communication tool for an organization. However, a
single email containing confidential information could put your entire organization at
risk if it’s not securely transmitted. Preventing leakage of confidential information and
meeting the regulatory requirements are two significant challenges for your business.
Dell EMS Policy Based Encryption is a high performance email encryption service
that will help you overcome your email security challenges and meet compliance
regulations, including:
•	 Health Insurance Portability and Accountability Act (HIPAA)
•	 Gramm–Leach–Bliley Act (GLBA)
•	 Payment Card Industry (PCI) Data Security Standards
•	 Sarbanes–Oxley Act (SOX)
Our encryption solution protects email in a way that’s transparent to employees and
includes secure, easy to use message retrieval of encrypted emails. It quickly scans all
content and attachments of outbound email to ensure adherence to your policies.
Solve your email regulatory compliance challenges today
With our cloud-based service, you can secure email communications across your
organization in days instead of months. There’s no need to install or maintain any
on-premise appliances or software, and we take care of complex digital certificate
and encryption key management.
The policy-based encryption engine not only automatically encrypts emails based
on your organizational policies, it redirects and prevents confidential information
from being sent to the wrong people. Dell EMS also supports secure desktop and
mobile encrypted email message delivery, so you can rest assured there will be no
disruption in email communications with your partners and customers.
Key benefits
•	 Ensure federal and state
compliance with regulations
automatically without end user
or IT staff intervention
•	 Prevent confidential information from
being sent to unauthorized recipients
outside of your organization
•	 Reduce implementation and
maintenance costs using a
100 percent cloud-based system
with digital certificate and
encryption key management
•	 Quickly implement a comprehensive
email encryption solution that
seamlessly integrates with your
current email infrastructure
•	 Send encrypted email outside your
organization with secure web-based
message retrieval on all desktop and
mobile devices
Meet regulatory
requirements
with automatic
cloud-based
email encryption
for even the most
complex email
environments.
Easily secure your sensitive or
confidential email communications.
DellTM
Email Management Services (EMS): Policy Based Encryption
Product and service availability varies by country. To learn more, customers and Dell Channel Partners should contact their
sales representative for more information. This document is provided for informational purposes only. Dell makes no warranties,
express or implied, about the information contained herein. The products or services described in the document are accurate
upon the date of publication but are subject to availability or change without notice at any time. Dell’s terms and conditions of
sale and service apply and are available upon request. Dell and the Dell logo are trademarks of Dell Inc. Dell disclaims proprietary
interest in the marks and names of others. ©2013 Dell Inc. All rights reserved.
March 2013 | Dell EMS Policy Based Encryption Datasheet.indd | Rev. 1.0
Scan or click
this code to
learn how
Dell Services
can help your
organization.
Dell Email Management Services (EMS): Policy Based Encryption
How does EMS Policy Based
Encryption work?
•	 Encryption policies are created
using the flexible policy
management engine
•	 Outbound email travels between your
email infrastructure and the service
via a Transport Layer Security (TLS)
encrypted tunnel
•	 Email message content is quickly
scanned and compared against
your policies
•	 The service automatically encrypts and
delivers email based on your policies
•	 Delivers non-confidential email as
unencrypted messages
The Dell EMS difference
•	 100% mail delivery
•	 100% scanning of email subject,
message and attachments
•	 100% cloud-based and does
not require on-premise software
or appliances
•	 24 /7 customer support
For more information about any
of our service offerings, please visit
Dell.com/services or contact our
sales team at US: 1-888-318-3201
or BePrepared@dell.com.
Features	Description
Policy management
Automatic email
encryption
Secure encrypted
email delivery
methods
Secure reply &
compose
Read receipts
Supports industry
standards
Multi-language
support
The highly customizable policy engine can be configured to support your
organization’s specific needs. With comprehensive, flexible and intuitive rule-
building, administrators can easily define and enable email policies to reduce
the risk of data loss and facilitate your regulatory compliance measures.
Policies can be configured to scan email content, subject and attachments.
Email encryption is automatically enforced based on your organization’s
encryption policies, without requiring user intervention or changing how your
users create and send emails.
The Dell EMS Policy Based Encryption service offers convenient and flexible
email retrieval options for external recipients of encrypted emails. Encrypted
email can be retrieved by any email recipient on any computing platform, and
does not require you to exchange encryption keys prior to sending. By default,
your customers and partners retrieve encrypted email from a secure web
portal, accessible from their desktop or mobile device.
External recipients of an encrypted email use the secure portal to reply to
the message and compose secure messages. This provides two-way email
security.
Enables the encrypted email sender to know when the message was read by
the recipient.
Dell EMS Policy Based Encryption supports standards based encryption
including PKI, X 509 certificates, S/MIME and OpenPGP.
Supports multiple languages for secure global communications.
Email sender
Email recipient
Secure web portal
for email access
Email servers
Inbound/outbound
email (TLS)
Inbound/
outbound(SSL)
Inbound/
outbound
Firewall
Dell EMS Policy
Based Encryption
In/out (TLS)

More Related Content

Viewers also liked

Politics of morocco
Politics of moroccoPolitics of morocco
Politics of moroccoAdil Diani
 
2015년 3분기 주요 정보보안 소식 차민석 20160117_공개판
2015년 3분기 주요 정보보안 소식 차민석 20160117_공개판2015년 3분기 주요 정보보안 소식 차민석 20160117_공개판
2015년 3분기 주요 정보보안 소식 차민석 20160117_공개판Minseok(Jacky) Cha
 
PARTNERSHIP & INVESTMENTS
PARTNERSHIP & INVESTMENTSPARTNERSHIP & INVESTMENTS
PARTNERSHIP & INVESTMENTSAzalnarziev
 
ISC West 2014 Korea Pavilion Directory
ISC West 2014 Korea Pavilion DirectoryISC West 2014 Korea Pavilion Directory
ISC West 2014 Korea Pavilion DirectoryCindy Moon
 
Codigo para insertar al blog
Codigo para insertar al blogCodigo para insertar al blog
Codigo para insertar al blogyaniris226
 
Dhs Private Sector Resource Catalog
Dhs Private Sector Resource CatalogDhs Private Sector Resource Catalog
Dhs Private Sector Resource CatalogCliff Veale
 
Dr Dev Kambhampati | USITC- Poultry Industry & Trade Summary
Dr Dev Kambhampati | USITC- Poultry Industry & Trade SummaryDr Dev Kambhampati | USITC- Poultry Industry & Trade Summary
Dr Dev Kambhampati | USITC- Poultry Industry & Trade SummaryDr Dev Kambhampati
 
102 國內外創意、創新、創業或發明競賽等獎項例示表-詹翔霖教授
102 國內外創意、創新、創業或發明競賽等獎項例示表-詹翔霖教授102 國內外創意、創新、創業或發明競賽等獎項例示表-詹翔霖教授
102 國內外創意、創新、創業或發明競賽等獎項例示表-詹翔霖教授翔霖 詹
 
Twitter as communication tool for cosmetic companies
Twitter as communication tool for cosmetic companiesTwitter as communication tool for cosmetic companies
Twitter as communication tool for cosmetic companiesWebRadar.lv
 
Korea sports tourism
Korea sports tourismKorea sports tourism
Korea sports tourismMike Starling
 

Viewers also liked (16)

Politics of morocco
Politics of moroccoPolitics of morocco
Politics of morocco
 
2015년 3분기 주요 정보보안 소식 차민석 20160117_공개판
2015년 3분기 주요 정보보안 소식 차민석 20160117_공개판2015년 3분기 주요 정보보안 소식 차민석 20160117_공개판
2015년 3분기 주요 정보보안 소식 차민석 20160117_공개판
 
.
..
.
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
PARTNERSHIP & INVESTMENTS
PARTNERSHIP & INVESTMENTSPARTNERSHIP & INVESTMENTS
PARTNERSHIP & INVESTMENTS
 
Reporte Final de Residencia Profesional
Reporte Final de Residencia ProfesionalReporte Final de Residencia Profesional
Reporte Final de Residencia Profesional
 
ISC West 2014 Korea Pavilion Directory
ISC West 2014 Korea Pavilion DirectoryISC West 2014 Korea Pavilion Directory
ISC West 2014 Korea Pavilion Directory
 
Vol_in_c week 2
Vol_in_c week 2Vol_in_c week 2
Vol_in_c week 2
 
Codigo para insertar al blog
Codigo para insertar al blogCodigo para insertar al blog
Codigo para insertar al blog
 
Dhs Private Sector Resource Catalog
Dhs Private Sector Resource CatalogDhs Private Sector Resource Catalog
Dhs Private Sector Resource Catalog
 
Team Teacher Malfunction *Communication Error*
Team Teacher Malfunction *Communication Error*Team Teacher Malfunction *Communication Error*
Team Teacher Malfunction *Communication Error*
 
Dr Dev Kambhampati | USITC- Poultry Industry & Trade Summary
Dr Dev Kambhampati | USITC- Poultry Industry & Trade SummaryDr Dev Kambhampati | USITC- Poultry Industry & Trade Summary
Dr Dev Kambhampati | USITC- Poultry Industry & Trade Summary
 
Ecologiae poluicao pb
Ecologiae poluicao pbEcologiae poluicao pb
Ecologiae poluicao pb
 
102 國內外創意、創新、創業或發明競賽等獎項例示表-詹翔霖教授
102 國內外創意、創新、創業或發明競賽等獎項例示表-詹翔霖教授102 國內外創意、創新、創業或發明競賽等獎項例示表-詹翔霖教授
102 國內外創意、創新、創業或發明競賽等獎項例示表-詹翔霖教授
 
Twitter as communication tool for cosmetic companies
Twitter as communication tool for cosmetic companiesTwitter as communication tool for cosmetic companies
Twitter as communication tool for cosmetic companies
 
Korea sports tourism
Korea sports tourismKorea sports tourism
Korea sports tourism
 

Recently uploaded

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Dell Email Management Services- Policy Based Encyption for Healthcare

  • 1. Cloud-based email encryption Email is the most important communication tool for an organization. However, a single email containing confidential information could put your entire organization at risk if it’s not securely transmitted. Preventing leakage of confidential information and meeting the regulatory requirements are two significant challenges for your business. Dell EMS Policy Based Encryption is a high performance email encryption service that will help you overcome your email security challenges and meet compliance regulations, including: • Health Insurance Portability and Accountability Act (HIPAA) • Gramm–Leach–Bliley Act (GLBA) • Payment Card Industry (PCI) Data Security Standards • Sarbanes–Oxley Act (SOX) Our encryption solution protects email in a way that’s transparent to employees and includes secure, easy to use message retrieval of encrypted emails. It quickly scans all content and attachments of outbound email to ensure adherence to your policies. Solve your email regulatory compliance challenges today With our cloud-based service, you can secure email communications across your organization in days instead of months. There’s no need to install or maintain any on-premise appliances or software, and we take care of complex digital certificate and encryption key management. The policy-based encryption engine not only automatically encrypts emails based on your organizational policies, it redirects and prevents confidential information from being sent to the wrong people. Dell EMS also supports secure desktop and mobile encrypted email message delivery, so you can rest assured there will be no disruption in email communications with your partners and customers. Key benefits • Ensure federal and state compliance with regulations automatically without end user or IT staff intervention • Prevent confidential information from being sent to unauthorized recipients outside of your organization • Reduce implementation and maintenance costs using a 100 percent cloud-based system with digital certificate and encryption key management • Quickly implement a comprehensive email encryption solution that seamlessly integrates with your current email infrastructure • Send encrypted email outside your organization with secure web-based message retrieval on all desktop and mobile devices Meet regulatory requirements with automatic cloud-based email encryption for even the most complex email environments. Easily secure your sensitive or confidential email communications. DellTM Email Management Services (EMS): Policy Based Encryption
  • 2. Product and service availability varies by country. To learn more, customers and Dell Channel Partners should contact their sales representative for more information. This document is provided for informational purposes only. Dell makes no warranties, express or implied, about the information contained herein. The products or services described in the document are accurate upon the date of publication but are subject to availability or change without notice at any time. Dell’s terms and conditions of sale and service apply and are available upon request. Dell and the Dell logo are trademarks of Dell Inc. Dell disclaims proprietary interest in the marks and names of others. ©2013 Dell Inc. All rights reserved. March 2013 | Dell EMS Policy Based Encryption Datasheet.indd | Rev. 1.0 Scan or click this code to learn how Dell Services can help your organization. Dell Email Management Services (EMS): Policy Based Encryption How does EMS Policy Based Encryption work? • Encryption policies are created using the flexible policy management engine • Outbound email travels between your email infrastructure and the service via a Transport Layer Security (TLS) encrypted tunnel • Email message content is quickly scanned and compared against your policies • The service automatically encrypts and delivers email based on your policies • Delivers non-confidential email as unencrypted messages The Dell EMS difference • 100% mail delivery • 100% scanning of email subject, message and attachments • 100% cloud-based and does not require on-premise software or appliances • 24 /7 customer support For more information about any of our service offerings, please visit Dell.com/services or contact our sales team at US: 1-888-318-3201 or BePrepared@dell.com. Features Description Policy management Automatic email encryption Secure encrypted email delivery methods Secure reply & compose Read receipts Supports industry standards Multi-language support The highly customizable policy engine can be configured to support your organization’s specific needs. With comprehensive, flexible and intuitive rule- building, administrators can easily define and enable email policies to reduce the risk of data loss and facilitate your regulatory compliance measures. Policies can be configured to scan email content, subject and attachments. Email encryption is automatically enforced based on your organization’s encryption policies, without requiring user intervention or changing how your users create and send emails. The Dell EMS Policy Based Encryption service offers convenient and flexible email retrieval options for external recipients of encrypted emails. Encrypted email can be retrieved by any email recipient on any computing platform, and does not require you to exchange encryption keys prior to sending. By default, your customers and partners retrieve encrypted email from a secure web portal, accessible from their desktop or mobile device. External recipients of an encrypted email use the secure portal to reply to the message and compose secure messages. This provides two-way email security. Enables the encrypted email sender to know when the message was read by the recipient. Dell EMS Policy Based Encryption supports standards based encryption including PKI, X 509 certificates, S/MIME and OpenPGP. Supports multiple languages for secure global communications. Email sender Email recipient Secure web portal for email access Email servers Inbound/outbound email (TLS) Inbound/ outbound(SSL) Inbound/ outbound Firewall Dell EMS Policy Based Encryption In/out (TLS)