FEATURED TOP LISTS Follow us on twitter
AppAdvice AppAdvice/TV WatchAware

This application is only applicable for StealthMail Enterprise solution

StealthMail

by STEALTHMAIL LTD

What is it about?

This application is only applicable for StealthMail Enterprise solution. StealthMail solution should be integrated on the company side (on-premises or in the cloud).

App Details

Version
1.5.3
Rating
(1)
Size
27Mb
Genre
Business Productivity
Last updated
April 11, 2023
Release date
December 3, 2018
More info

App Screenshots

App Store Description

This application is only applicable for StealthMail Enterprise solution. StealthMail solution should be integrated on the company side (on-premises or in the cloud).
StealthMail Mobile Viewer allows previewing secure, encrypted StealthMail emails. Only one click on the Stealth-link in your default email client is required to preview the secure email.

StealthMail makes your emails secure and invisible to email relays, hackers, or public Internet threats. It uses email only to send Stealth-links that do not contain any user information whatsoever. Only through the Stealth-links can an authorized user access encrypted email content and attachments.

This approach to protecting emails makes the gaping vulnerabilities of SMTP and SSL/TLS a complete non-issue.

StealthMail provides true end-to-end encryption, where security keys are generated and stored on the user's side.


Major StealthMail Features
INVISIBLE EMAIL - Mail servers are only used to send Stealth-links. Email content and files are not exposed to Public Internet.

EMAIL ENCRYPTION - Email is only used to transfer a Stealth-link. The actual content is sent via secure channels in an encrypted state.

SECURE EMAIL CHANNEL - Protect yourself and clients from phishing (whaling, spear, clone, etc. ) and Business Email Compromise Attacks.

EMAIL CERTIFICATE -Senders, recipients, and their devices are identified and authorized making spear phishing impossible.

ENCRYPTION KEYS - Encryption keys are stored in your company’s secure perimeter.

END-USER DEVICE ENCRYPTION - End-to-end encryption is performed on the end user's device.

Disclaimer:
AppAdvice does not own this application and only provides images and links contained in the iTunes Search API, to help our users find the best apps to download. If you are the developer of this app and would like your information removed, please send a request to takedown@appadvice.com and your information will be removed.