REDDOXX MailSealer

The REDDOXX MailSealer is the security solution for your e-mail traffic. Outgoing emails are signed and encrypted, incoming emails are checked and decrypted. MailSealer supports the internationally established encryption standard S/MIME and is therefore compliant with other solutions used by your communication partners. Encryption and signing are rule-based and therefore centralised and automatic - user-independent.

S/MIME stands for Secure / Multipurpose Internet Mail Extensions. It is the worldwide established standard for the encryption of e-mails - based on a hybrid cryptosystem. The use of S/MIME requires corresponding certificates with which the contents of an e-mail can be reliably encrypted by the sender and then decrypted again exclusively by the authorised recipient.

Feature / Function Comment
Basic settings
- Automatic recognition and storage of certificates (public keys) storage can optionally take place without validation on a valid ROOT-CA
- Optional Online Certificate Status Protocol (OCSP) check
- Optional Certificate Revocation List (CRL) check
- Optional clear text signing
- Optional signing before encryption
- Optional inclusion of the sender key
- S/MIME certificate retrieval from LDAP directory service
- signature encryption: MD5, SHA-1, SHA-256, SHA-384, SHA-512
- different signature algorithms: RSA, RSASSA-PSS
- supported encryption algorithms: RC2 (40, 64, 128 bit), DES (56 bit), 3DES (168 bit), AES (128, 192, 256 bit) the encryption depths can be freely selected depending on the algorithm
- certificate encryption algorithms: RSA, RSAES-OAEP
Free definable set of rules
- outgoing signature rules per mail address, mail domain definition via wildcards for sender and recipient addresses
- outgoing encryption rules per mail address, mail domain the definition is made via wildcards for sender and recipient addresses
- use of gateway certificates requires a corresponding function on the remote terminal (recipient)
- Validation of the signature for incoming mails E-mails with invalid signatures can optionally be rejected
Certificate management
- optional use of own CA with automatic issuance of e-mail certificates in this case, the remote peer must recognise the ROOT-CA
- import and export of private and public keys
- Automatic or manual validation of ROOT CAs
- Automatic or manual validation of public or private keys