{"id":9205,"date":"2023-10-23T17:43:33","date_gmt":"2023-10-23T15:43:33","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/en\/how-to-automate-your-email-encryption-with-retarus"},"modified":"2024-05-07T11:01:26","modified_gmt":"2024-05-07T09:01:26","slug":"how-to-automate-your-email-encryption-with-retarus","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/en\/how-to-automate-your-email-encryption-with-retarus\/","title":{"rendered":"How to automate your email encryption with Retarus"},"content":{"rendered":"\n
Email encryption remains a core aspect of any IT security concept, granting confidential business information the best possible protection from unauthorized access. Even so, it is seldom put to use in daily business. One of the chief reasons is that setting up and managing encryption activities is usually very tricky \u2013 both for the end users and admins. So, how can companies set about simplifying the use and management of encryption, thereby increasing user acceptance?<\/p>\n\n\n\n
Retarus provides the solution \u2013 an Email Encryption<\/a> service which proceeds fully automatically in the background with virtually no effort from the user and even works when the communication partner hasn’t deployed an encryption solution of their own, thanks to the Secure Webmailer<\/a>.<\/p>\n\n\n\n But how can administrators ensure that all data and signatures are kept up to date in the gateway-based approach to encryption, especially without investing too much time and human resources?<\/p>\n\n\n\n Retarus once again offers the fitting solution. The User Synchronization for Encryption (USE) service<\/em> allows encryption managers to automate a number of their core tasks:<\/p>\n\n\n\n The USE service is based on a CSV file which customers can transfer securely to Retarus via SMTP. We have opted for CSV because the format is simple, flexible to use and easily readable for humans. All that needs to be entered is the email address of the respective encryption user, the preferred encryption type (S\/MIME or PGP) and the chosen status (1 for active, 0 for inactive). Optionally, a group ID and passphrase can also be included. Retarus then processes the CSV file and executes the required actions fully automatically. Admins subsequently receive an email containing a report outlining the status of the synchronization and the encryption keys which have been generated.<\/p>\n\n\n\n If you would like to find out more about the USE service to optimize and automate your email encryption further with Retarus, please feel free to contact your dedicated Retarus representative<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" The User Synchronization for Encryption (USE) service greatly simplifies the management of email encryption activities for administrators.<\/p>\n","protected":false},"author":12,"featured_media":9204,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_s2mail":"yes","footnotes":""},"categories":[9,15],"tags":[254,102],"dipi_cpt_category":[],"class_list":["post-9205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-product-news","category-security","tag-email-encryption","tag-email-security"],"acf":[],"yoast_head":"\nEasier to manage \u2013 for admins too<\/h2>\n\n\n\n
\n
What benefits does the service offer?<\/h2>\n\n\n\n
\n
How does User Synchronization for Encryption<\/em> work?<\/h2>\n\n\n\n