Certificates, signed emails, symmetric and asymmetric encryption, S/MIME, TLS and PGP – for many who do not regularly deal with email encryption these terms are quite foreign. However, with the new basic data protection regulations (DSGVO) these terms have been pushed to the top of the to-do lists for many SMBs. Although, many companies lack the necessary knowledge to implement the new requirements in regards to the encryption of their email communication. In this article, Hornetsecurity aims to explain some of the basic terms and technologies around email encryption.
Asymmetric and symmetric email encryption – what are the differences?
If you take a closer look at asymmetric and symmetric email encryption you will very quickly discover that these two are fundamentally different. Essentially, they differ in the number and type of keys used.S/MIME, PGP and TLS – what are the abbreviations?
How to implement email encryption – there is no “one” way
All roads lead to Rome – but which ones lead to legally compliant email encryption? In fact, there are several ways for companies to implement legally compliant email encryption. The most prominent are on-premise and cloud-based solutions.Weiterführende Informationen:
- Hornetsecurity Service: Email Encryption
- Information on IT security topics can now be found in the Hornetsecurity Knowledge Base.
- Information graphics for e-mail encryption.