Encrypt confidential information in email communication effectively and securely.

Email Encryption

Business emails often contain in-house, personal or other sensitive content that could be intercepted and accessed without authorization if inadequately protected. Ensure all-round encrypted exchange of emails with Email Encryption from Hornetsecurity for reliable, secure email communication.

E-Mail Verschlüsselung für Unternehmen

Business emails often contain in-house, personal or other sensitive content that could be intercepted and accessed without authorization if inadequately protected. Ensure all-round encrypted exchange of emails with Email Encryption from Hornetsecurity for reliable, secure email communication.

What are the benefits of cloud-based email encryption?

Fully automated encryption and decryption of your emails

Outgoing emails are automatically encrypted with one of the common encryption technologies (PGP, S/MIME or TLS), depending on the set policy and availability of the corresponding certificates, without any further user intervention. If the sender’s public key is available, the emails are automatically decrypted and delivered to the recipient.
Encryption of data has become a priority due to compliance requirements and enactment of the General Data Protection Regulation. In a business environment, exchange of sensitive files and information takes place mainly via email communication. Cyber criminals rely on the “Man-in-the-Middle” to pick up valuable information here. Encryption of the transmission path is essential to protect this data.


of the Germans send e-mails still unencrypted


is using the current means an e-mail encryption too complex

Verschlüsselung des Transportweges und der E-mail selbst

Various email encryption technologies

Email Encryption supports all standard encryption technologies, including S/MIME, PGP and TLS including Perfect Forward Secrecy. The so-called PKI-based email encryptions (S/MIME = Secure / Multipurpose Internet Mail Extensions and PGP = Open Pretty Good Privacy) ensure the confidentiality of the transmitted messages between sender and recipient and protect the transported data using cryptographic encryption methods. The Hornetsecurity encryption service offers this protection directly in the cloud and thus secures the transmission route completely. The TLS protocol is used to ensure confidentiality, authenticity and integrity when transmitting data over insecure networks.

Manage email encryption with minimal effort

Hornetsecurity provides IT administrators with a variety of ways to create and manage email traffic encryption very easily, such as handling user certificates or customizing encryption policies.

Encryption settings can be made either globally or individually for specific users, groups or domains.

Overview of all Hornetsecurity email encryption features

Testing option for encryption suitability

On the control panel you can check which encryption options the communication partner supports. The email address of the recipient is entered and the encryption technology that can be used in communication with this address is then displayed.


Automatic digital signing & encryption of outgoing emails via S/MIME and PGP

Secure emails against unauthorized modification or access by third parties during transmission over public networks.

Automatic certificate management & key storage

Hornetsecurity handles procurement and installation of the certificates required. These are stored in a central certificate store.


Individual setup and definition of encryption policies

Email EncryptionT Zoom

Clear rules for encryption of email traffic can be set for the entire company. The control panel is used to define which encryption types are used to establish contact with communication partners: TLS, S/MIME or PGP. This is possible either as a package or individually for specific users, groups or domains. In addition, you can define how to proceed if the key of a recipient is not available.

Personal email certificates

T Zoom

Hornetsecurity uses 2048 bit coded certificates, one of the largest and most reliable certificate authorities (CA). When encrypting with S/MIME and PGP, each user receives their own certificate. With PGP it is also possible to use a single certificate for an entire domain. Alternatively, certificates supplied by the customer can also be imported and used.

Confidential communication via Websafe

T Zoom

Even if the communication partner cannot receive encrypted emails, the encryption and confidentiality of email communication with certain individuals is still guaranteed.

Integration of Email Encryption into the email management system

Email Encryption from Hornetsecurity handles all aspects of certificate management.


Encryption, decryption and signing take place fully automatically and transparently for incoming and outgoing emails.


In order to guarantee the functionality and efficiency of Email Encryption, integration of spam and malware protection is required.

Business Email Encryption from Hornetsecurity – Minimal administrative work for IT administrators

Handling of user certificates

The control panel can be used to request, renew or permanently obtain new certificates for users (subscription function).


Adaptable scalability

Because Email Encryption is based on cloud technology, it is always possible to adjust the number of encrypted email users to the needs of the customer.

Individual adaptation of encryption guidelines

Administrators typically set identical encryption policies for an organization. Exceptions to this standard can be defined at domain, group and user level. This ranges from different encryption technologies through to deactivation of encryption.


Automatic updates

The cloud-based encryption service ensures that companies always have the latest version of the service available. Administrators do not need to worry about software or hardware updates.

Email Encryption: Request a free and non-binding quote now!

Without payment information. Set up in a few minutes.


Data Sheet

Case Study

Any questions?

These customers rely on the services of Hornetsecurity

Kunden Hornetsecurity Cloud Security E-Mail Security