PGP

PGP News

PGP Blogs

PGP Careers

PGP Corporation Blogs

PGP Podcasts

Ask the Expert Blog

PGP Advisory Board Blog

PGP Perspectives Blog


Email Protection

Comprehensive suite of email encryption products



Email is an essential business tool that enables organizations to efficiently communicate - both internally with colleagues and externally with customers, clients, and partners. Yet, unprotected email stored on devices and servers or sent across the Internet in clear text poses a critical risk to an organization's most sensitive data: legally protected information such as customer records as well as confidential corporate information such as financial and intellectual property data. Exposure of this information to unauthorized parties can result in financial loss, legal ramifications, and brand damage.

Best practices for securing confidential company information and compliance related data sent via email is through the use of encryption. With email encryption, organizations can minimize the risk of a data breach and comply with partner and regulatory mandates for information security and privacy. Protecting email against threats like viruses and worms are important. Yet, when it comes to the last line of defense, encryption protects the target of the email threats – it protects the data itself.

PGP's comprehensive suite of email encryption products enables companies to customize their email protection to best meet business needs. PGP gateway, end-to-end, and clientless solutions can work standalone or in combination. They also work unmanaged or centrally managed and policy based using PGP Universal™ Server. PGP® solutions are standards based to offer a high level of interoperability with recipient's encryption solutions.

PGP email encryption solutions include:

GATEWAY

  • PGP Universal™ Gateway Email – Secure emails going external to the company, even to recipients without encryption software
  • PGP® PDF Messenger – Secure communications to large groups of customers or partners, such as monthly statement delivery, even to recipients without encryption software
END-TO-END

PGP Universal Gateway Email

Secure email communications without client software

Email has evolved into the most important business communications system in the world, enabling organizations to efficiently interact with customers, clients, and business partners. Unfortunately, unprotected email poses a critical risk to an enterprise's most sensitive data: customer information, financial data, trade secrets, and other proprietary information. Exposure of this information can result in financial loss, legal ramifications, and brand damage.

PGP Universal Gateway Email

PGP Universal™ Gateway Email provides centrally managed, standards-based email encryption to secure email communications with customers and partners. By encrypting data at the gateway, PGP Universal Gateway Email ensures data is protected from unauthorized access in transit over the public Internet and at rest on a recipient's mail server. With PGP Universal Gateway Email, organizations can minimize the risk of a data breach and comply with partner and regulatory mandates for information security and privacy.

  • Easy, automatic operation–Protects sensitive email without changing the user experience.
  • Enforced security policies–Automatically enforce data protection with centrally managed policies.
  • Accelerated deployment–Deliver email encryption using the existing infrastructure.
  • Reduced operational costs–Result from eliminating training and help-desk costs through clientless operation.

Secure Delivery Solutions

PGP Corporation provides two options for deploying secure, clientless email delivery:

  • PGP Universal Gateway Email–Provides multiple, flexible secure delivery options for secure webmail using PGP Universal™ Web Messenger, encrypted PDF messages using the built-in PDF Messenger feature, and standards-based OpenPGP and S/MIME message formats.
  • PGP® PDF Messenger–stand-alone product version provides secure delivery using encrypted PDF messages, maximizing the options for communicating with a broad range of email recipients.

PGP Encryption Platform Enabled

As a PGP® Encryption Platform-enabled application, PGP Universal Gateway Email is used with PGP Universal™ Server to manage existing policies, users, keys, and configurations, expediting deployment and policy enforcement. PGP Universal Gateway Email can also be used in combination with other PGP® encryption applications to provide multiple layers of security.

PGP PDF Messenger


Vast amounts of mission-critical information move in and out of businesses through email. Everyone expects instant availability of digital documents. However, the ability to ensure data confidentiality and verify its content and sender is one of the biggest security challenges today to any size organization. Concerns about protecting information privacy, preventing fraud, meeting ever tighter regulatory compliance guidelines, and secure, confirmed delivery of sensitive information are now vital requirements for all business communications. Unprotected email poses a critical risk to an enterprise’s most sensitive data: customer information, financial data, trade secrets, and other proprietary information. Exposure of this information can result in financial loss, legal ramifications, and brand damage.

PGP PDF Messenger

PGP® PDF Messenger provides clientless email encryption for secure email communications with large groups of customers and partners. By encrypting data down to the individual recipient, PGP PDF Messenger protects data from unauthorized access in transit over the public Internet, at rest on recipient mail servers, and at the endpoint. With PGP PDF Messenger, organizations can minimize the risk of a data breach and comply with partner and regulatory mandates for information security and privacy.

PGP PDF Messenger automatically secures email messages as they leave the enterprise network according to highly configurable encryption rules, eliminating the need for client software or user intervention. Leveraging the broad adoption of PDF reader software, PGP PDF Messenger enables enterprises to address regulatory requirements and data breach risks without requiring special software or using proprietary email attachment encryption software. Among its benefits are the following:

  • Easy, automatic operation–Protects sensitive email from sender to recipient without changing the user experience.
  • Enforced security policies–Automatically enforces data protection using centrally managed policies without storing messages.
  • Accelerated deployment–Delivers email encryption to a broad range of users using the existing infrastructure.

PGP Desktop Email

Email encryption for desktops and laptops

Email is the most important business communications system in the world, enabling organizations to efficiently interact with customers, clients, and business partners. Yet unprotected email poses a critical risk to an enterprise’s most sensitive data: customer information, financial data, trade secrets, and other proprietary information. Exposure of this information to unauthorized parties can result in financial loss, legal ramifications, and brand damage.

PGP Desktop Email

PGP® Desktop Email provides enterprises with an automatic, transparent encryption solution for securing internal and external confidential email communications. With PGP Desktop Email, organizations can minimize the risk of a data breach and comply with partner and regulatory mandates for information security and privacy.

  • Easy, automatic operation–Protects sensitive email without changing the user experience.
  • Enforced security policies–Enforce data protection automatically with centrally managed policies.
  • Accelerated deployment–Achieves end-to-end email encryption using the existing infrastructure.
  • Reduced operation costs–Result from centralized automation of email encryption policies.

PGP Desktop Email also enables users to encrypt and compress files for sharing or backup using:

  • PGP® Virtual Disk–For secure storage, PGP Virtual Disk enables storage of files and folders in a single encrypted file that is used like a removable disk drive.
  • PGP® Zip–For storing backups or sharing files, PGP Zip stores files and folders in a single, encrypted and compressed file.

PGP Mobile

Protect email and data on Windows Mobile® smartphones

Smartphones enhance productivity and enable new ways of conducting business beyond the confines of the office. They contain all the confidential corporate email and data once reserved for laptops, but in a much smaller, highly mobile form factor that professionals carry with them 24/7.

However, these same devices that provide a competitive advantage also present new security risks to the enterprise. A smartphone that is lost or stolen with unencrypted data or email that is sent unencrypted significantly increases the risk of a corporate data breach.

PGP Mobile

PGP® Mobile solves this problem with comprehensive email1 and data encryption for Windows Mobile smartphones and storage cards that provides powerful protection for the data stored, in transit, and shared with others.

  • Maximum protection – Protects email, email attachments, and data with few changes to the user experience. Email encryption happens automatically right on the smartphone which provides maximum protection by enabling true end-to-end encryption.
  • Enforced security policies – Leverages PGP Universal™ Server to automatically, transparently, and consistently enforce email security policies without user intervention.
  • Accelerated deployment – Using over-the-air deployment, centralized management, and integration with existing enterprise infrastructure.
  • Reduced operation costs – Results from centralized deployment, management, and consistent policy enforcement across all PGP® applications.
  • Strategic, leveraged, extensible approach – As a PGP® Encryption Platform–enabled application, PGP Mobile is deployed and managed using PGP Universal Server.

PGP Support Package for BlackBerry

Extending PGP email security to enterprise smartphones

Mobile devices such as Research in Motion (RIM) BlackBerry® smartphones are popular tools for digital communications, both in the office and on the road. As more employees and executives begin to carry these wireless devices, the amount of sensitive and confidential information put at risk increases. Lacking the right protection, sensitive email that is stored or transmitted on mobile devices may be breached. The resulting damages can include lost revenue, regulatory penalties, and brand damage.

PGP Support Package for BackBerry

PGP® Support Package for BlackBerry® enables enterprises to extend market-leading PGP® messaging security solutions for laptops and desktops to BlackBerry smartphones. Developed in partnership between RIM and PGP, PGP Support Package for BlackBerry is already integrated into the native BlackBerry OS. It simply needs to be purchased and activated to begin providing encryption protection for BlackBerry emails.

PGP Support Package for BlackBerry is a comprehensive email security solution that providesdata encryptiondigital signaturesecured attachments, and automated key lookup (view example screenshots). Additional benefits include:

  • Easy, automatic operation–Protects data with few changes to the smartphone user experience.
  • Enforced security policies–Automatically enforces data protection with centrally managed policies, keys and logs when using PGP Universal Server.
  • Accelerated deployment–Reduces setup time and speeds enterprise data protection.
  • Reduced operation costs–Results from fast deployment and intuitive user interface, plus the automation of email encryption policies if using PGP Universal Server.

Консультации




Endpoint Data Protection

Complete data protection for all endpoints—laptops, desktops, USB drives, optical media, and smart phones



Laptops, USB devices, optical media, and smart phones are a convenient way to work and exchange data with colleagues, partners, and even customers. The challenge is that this convenience brings with it a security risk if these devices are lost, stolen, or compromised by unauthorized software. To solve this problem, many organizations resort to solutions that either compromise security for productivity, or force a significant change in user behavior, or worse, are just "good enough."

With PGP Endpoint Data Protection, there’s no need to choose between convenience, productivity, and security. Rest easy with complete endpoint data protection from PGP Corporation:

  • PGP® Whole Disk Encryption – Full disk encryption for desktops, laptops, and Windows® servers. Supports Windows®, Mac OS® X, and Linux® platforms.
  • PGP® Portable – Portable, software-based, and self-contained encryption on any USB device or optical media. Access data on Windows and Mac OS X without installing any software.
  • PGP® Endpoint Device Control – Granular device control with whitelisting technology to ensure authorized use of removable devices.
  • PGP® Endpoint Application Control – Policy-enforced, application whitelisting for protection from malicious and unauthorized software.

PGP Whole Disk Encryption

High-performance full disk encryption for desktops, laptops, and USB devices

Protecting sensitive data, personal identifiable information (PII) and personal health information (PHI) on laptops, desktops and removable devices from theft or loss is critical for enterprises and the public sector. Exposure of sensitive data can result in financial loss, legal penalties and fines, loss in reputation, brand damage, loss in intellectual property and loss in customer trust. PGP Whole Disk Encryption provides organizations with comprehensive, platform-independent, and high performance full disk encryption for all data (user files, swap files, system files, hidden files, etc.) on desktops, laptops, and removable media. The encrypted data is protected from unauthorized access, providing strong security for intellectual property, customer data, partner data and brand.

PGP Whole Disk Encryption

Key Features

  • Rapid deployment–Automated deployments, platform independent, includes USB encryption.
  • Centralized management–Automatic, centralized policy enforcement with single web-based management console for all clients.
  • Easy passphrase and machine recovery–Local self-recovery, one-time-use token and other recovery options.
  • Built PGP® strong–High performance, optimized, and strong encryption, built with PGP® Hybrid Cryptographic Optimizer (HCO) technology. FIPS 140-2 validated, CAPS-approved, DIPCOG-approved, CC EAL 4+ pending.
  • User-friendly–Background encryption with throttle capabilities. Fewer passwords to remember with support for Windows® Single sign-on.

PGP Endpoint Device Control

Prevents data loss from removable storage and portable device connections

Removable digital storage devices (such as USB flash drives and CD/DVD drives) and mobile connection technologies (such as Wi-Fi, FireWire, and Bluetooth) are increasingly popular in the enterprise environment. They are convenient and enhance productivity, but present new security risks to the enterprise. The data on these removable endpoint devices and media may contain intellectual property or sensitive customer information. Company policy and employee education can be insufficient to safeguard the data from insider threats and accidental data leakage. The exposure of sensitive data that results from the loss or theft of a removable storage device or medium can result in financial expenses, legal ramifications, and brand damage.

PGP Endpoint Device Control

PGP® Endpoint Device Control provides built-in security that detects, authorizes, and secures removable storage devices and media (such as USB drives, CDs, and DVDs).

  • Easy, automatic operation–Permits safe and authorized removable storage use, without changing the user experience or reducing productivity.
  • Enforced security policies–Enforces policies for device usage via USB, FireWire, Wi-Fi, and Bluetooth connections; automatically encrypts removable storage based on policy; can also log usage and demonstrate compliance to auditors.
  • Accelerated deployment–Reduces setup time and speeds enterprise protection without requiring user intervention and by leveraging existing enterprise directory infrastructure.
  • Reduced operation costs–Result from fast deployment, ease of use, centralized management, and automated enforcement of security policies.

PGP Endpoint Application Control

The solution that protects data from unauthorized and malicious software

The battle to protect your network from malware can seem insurmountable.

PGP® Endpoint Application Control provides granular, policy-based enforcement of application use to proactively secure endpoints from data leakage, malware, spyware, keyloggers, Trojans, rootkits, worms and viruses, zero-day threats and unwanted or unlicensed software. With PGP Endpoint Application Control, administrators can centrally manage, monitor, and control applications with a whitelist approach that allows only authorized applications to run, ensuring no unwanted or unlicensed software will execute on the corporate network and disrupt business.

PGP Endpoint Application Control

  • Reduces the risk of a data breach –Ensures sensitive corporate data is not compromised by unauthorized and malicious software.
  • Proactive and automatic protection - Reduces helpdesk and administrative burdens. Provides automatic, zero-day protection from known and unknown application threats.
  • Supports Compliance–Detailed audits of application execution assist in demonstrating compliance.
  • Business continuity–Prevents business downtime caused by proliferation of malicious software applications.
  • Transparent user experience–Automatic and background operation ensures user productivity is unaffected.

PGP Portable

Portable, self-contained encryption for removable storage devices and optical media

With USB memory devices now able to store gigabytes of data and available in hundreds of different form factors, it’s no surprise that they have become a key way to exchange data with colleagues, partners, and even customers. The challenge is that their convenience also presents a security risk if one of these devices is lost or stolen. Many of the data breaches now being experienced by public and private enterprises have occurred because these small, convenient devices are dropped in a public setting or stolen from cars, briefcases and in some cases out of the offices of those using them.

PGP Whole Disk Encryption

Advantages of PGP® Portable

  • Protect any device or any media–Software-based encryption for any removable storage device or optical media. Patent-pending extension to validated and trusted AES 256-bit PGP® Virtual Disk technology.
  • Share, distribute, collaborate–Access encrypted data on both Microsoft® Windows and Apple® Mac OS X without installing additional software. Provides in-place viewing and editing without altering the native user experience.
  • Integrates easily with enterprise workflow–Provides support for automation and provisioning. Passphrase management and corporate access to data enable security and compliance without disrupting user productivity.


File and Server Protection

Complete protection for files, from team collaboration to server processes to external transfer



Documents are the lifeblood of any business process. Whether spreadsheets, patient records, product plans, purchase orders, or any other of range of document types, these files make up the vast majority of enterprise data. As they are stored, shared and transferred every day, these files need strong protection to secure the sensitive information they contain.

For users collaborating or sharing large documents, a file server is typically the means for sharing these files. Unfortunately, unprotected files pose a critical risk to an enterprise's most sensitive data: customer information, financial data, trade secrets, and other proprietary information. Exposure of this data can result in financial loss, legal ramifications, and brand damage.

In addition, organizations typically need to exchange large volumes of information between internal systems, suppliers, and customers. But legacy data transfer systems are especially prone to security breaches, because traditional file transfer and email protocols have no built-in security.

  • PGP® NetShare – Policy-enforced file and folder encryption for team collaboration
  • PGP® Command Line – Centrally-managed file encryption for server protection and file transfer

PGP NetShare

Network file encryption for collaborating teams

File servers have emerged as an industry-standard tool for enabling users to collaborate and share large files. Unfortunately, unprotected files pose a critical risk to an enterprise’s most sensitive data: customer information, financial data, trade secrets, and other proprietary information. Exposure of this data can result in financial loss, legal ramifications, and brand damage.

PGP NetShare

PGP® NetShare enables teams to securely share documents on file servers by automatically and transparently encrypting the files for fine-grained group access. This approach ensures that only authorized users can read or modify files, fulfilling partner and regulatory requirements for information partitioning and security.

  • Easy, automatic operation – Protects shared files without changing the user experience.
  • Enforced security policies – Automatically enforce data protection with centrally managed policies.
  • Separation of duties – Increases security by separation of roles between system administrators and security officers.

As a PGP® Platform-enabled application, PGP NetShare can be used with PGP Universal™ Server to manage policies for data protection, users, keys, and configurations. This expedites deployment and policy enforcement. PGP NetShare can also be used in combination with other PGP® encryption applications to provide multiple layers of security.

PGP Command Line

Protect confidential files on servers and sent to business partners

Data transfer and processing systems are at the heart of every organization, exchanging large volumes of information between internal systems, suppliers, and customers. However, legacy data transfer systems are especially prone to security breaches, because traditional file transfer and email protocols have no built-in security.

Diagram_Command_Line

For organizations that need to securely exchange large volumes of information, PGP® Command Line can protect business-critical data easily and with little impact on existing systems. PGP Command Line can also be used to protect large volumes of information stored on servers from unauthorized access.

  • Trusted data transactions - Secures data in back-end systems to ensure confidentiality and authenticity in transactions.
  • Fast and flexible deployment - Integrates easily into new and legacy business processes.
  • Comprehensive protection - Secures data in transit and at rest.
  • Enterprise standard - Leverages a common encryption application across enterprise systems.

As a PGP® Platform-enabled application, PGP Command Line leverages keys managed by PGP Universalš Server, expediting deployment and systems management. PGP Command Line can be used in combination with other PGP® encryption solutions to provide multiple layers of security.

PGP® Command Line enables organizations to integrate encryption into batch processes, data transfer, and backup processes to ensure the security of corporate data at rest or in transit. Whether it is credit card information, financial transactions, payroll, medical records, or other confidential information, PGP Command Line makes it straightforward to secure data from end to end during automated operations and backup procedures.


Management

Reduce complexity and cost through consolidated administration

In order to streamline operations, reduce costs and assert better control over their environment, many IT organizations are looking at how to make security administration easier. One of the most prominent problems is the difficulty of managing multiple encryption products due to the proliferation of administrative consoles.

The PGP Platform helps companies stay on top of the administrative work behind managing encryption. The design core starts around the principle that central management is the cornerstone to a long term security strategy.

  • PGP Universal™ Server – Provides centralized management for all of the PGP® Data Protection Applications.
  • PGP® Key Management Server – Delivers an enterprise class key management server designed to manage cryptographic keys and PKI certificates with 3rd party and custom applications.

PGP Universal Server

Centralized management for PGP® Encryption Applications

comprehensive data protection strategy starts with a plan to defend data on multiple fronts. Some companies start with disk encryption to address near term compliance concerns, and then add protection for email and files over time.

Prescient IT organizations understand that deploying multiple point solutions can lead to an operational headache. Over time, the complexity and administrative work load creates an escalating burden.

PGP Universal Server

PGP Universal™ Server provides organizations with a single console to manage multiple encryption applications from the PGP® Platform. IT organizations can manage users, automate administrative activities and establish policies to defend sensitive data and avoid the financial loss, legal ramifications, and brand damage from a data breach.

PGP Universal Server provides:

  • Central administration - Manage multiple PGP encryption applications using a single console.
  • Policy enforcement - Delivers centralized policy configuration to automate administration and to ensure that data protection is operating within expected parameters.
  • Reporting and logging - Provides visibility into the current state of data protection to provide oversight.
  • Key management - Creates, distributes, and stores encryption keys while maintaining the organization's ability to recover data.

Using PGP Universal Server, an organization can address immediate near-term requirements and prepare for a long-term encryption strategy using the same environment. This strategic approach to encryption allows the enterprise to quickly adapt to emerging requirements for encryption using a single encryption management console.


PGP Key Management Server

Enterprise key management for 3rd party and custom applications

Encryption is an essential element of any data protection plan. It applies from the employee desktop to the data center and the cloud, and all points in between. IT organizations are adding cryptographic measures to maintain consumer privacy, preserve data integrity, avoid data loss, prevent intrusions, and address compliance demands. Each new data protection technology contributes to a growing volume of keys that need to be managed, and fractures the hope of maintaining control.

PGP Key Management Server

PGP® Key Management Server provides organizations with the infrastructure and tools to manage large scale deployments of encryption keys and certificates. Instead of using proprietary standalone key repositories or custom single purpose tools, PGP Key Management Server delivers a better approach to managing encryption keys by starting with a design core around supporting different types of keys, trust models and applications.

  • Pare down operational cost and complexity - Maintaining multiple key repositories requires extensive labor, resources, and expertise. PGP Key Management Server simplifies the environment with a consistent administrative interface.
  • Reduce risk of unrecoverable data - Ensure that dependable key recovery methods are in place before the need arises.
  • Prevent unexpected downtime - Unanticipated certificate expirations can bring business to a standstill. Automate certification updates and eliminate certificate accidents that lead to system outages.
  • Stay in control - IT leaders need to know if their security policy matches reality. Key management helps organizations account for encryption keys throughout their environment and demonstrate proof of compliance.

PGP Key Management Server provides a versatile foundation to centralize management of encryption throughout the enterprise to help organizations take control over their encryption keys, strengthen security, and reduce operational cost.