ADSS Secure Email Server

Features

Server side email signing and email verification Solution

Ease of use

  • Configurable email server and filter
    Enables filter selection policies to be configured that define the type of emails to verify. E.g. the complete signed email and/or emails with signed attachments.
    Allows filter selection policies to be configured which identify emails needing to be server side signed based on keywords found in the ‘From’, ‘To’, ‘CC’, ‘Subject’ and/or email body. Email can also be filtered based on a particular type of attachment (e.g. PDF, DOC, TXT etc.).
  • Integration
    ADSS Secure Email Server can also sign emails and attachments which are coming into an organisation and even perform archival services.
  • Centralized validation policy
    Allows you to configure your final trust points and other aspects of signature validation, e.g. how to check the revocation status of certificates using OCSP or CRLs.

Signature formats

  • Server side emails signing and verification
    Signs emails filtered using the standard S/MIME specifications recognised by all popular email clients (e.g. Outlook®, Outlook Express®, Lotus Notes® etc.). Verifies emails that have been S/MIME signed with either clear or opaque signatures. It therefore supports signed emails from all popular email clients (e.g. Outlook®, Outlook Express®, Lotus Notes® etc.).
  • Corporate keys & unique user keys
    Emails and attachments can be signed using either corporate keys or unique user keys. Users can be identified from the sender’s email address or using other techniques.
  • Sign and verify attachments
    Supports the signing of attachments using signature formats including PDF, XML DSig, PKCS#7, CMS, CAdES-T, CAdES-X-Long, XAdES-T and XAdES-X-Long. When using PDF Signatures, sophisticated signature profiles can be set up which define the signature appearance and on which pages this appearance should be created. Invisible signatures and certified signatures are also supported.
    Verifies signed attachments including those with standard and complex signature formats including PDF, XML DSig, PKCS#7, CMS, ETSI CAdES and XAdES with formats ES, ES-T, ES-X-Long, ES-EPES and ES-A.

Security & scalability

  • Secure logs
    All signing transactions are securely logged to provide a detailed audit trail of what was signed and when. The logs are protected from unauthorised modification using standard ADSS Server features.
    All verification transactions are securely logged to provide a detailed audit trail of what was verified and when. The logs are protected from unauthorised modification using standard ADSS Server security features.
  • Powerful policy engine
    Allows you to configure how the verification results are to be provided to the original recipient (e.g. a simple and clear message inserted at the top of the email, detailed results attached to the email etc). It also allows you to configure how to route emails, both ones that pass verification checks and those that fail to be trusted, including blocking emails that failed to be trusted to sending a copy to an administrator for investigation.

Request Info

Submit

Sales Inquiries:
+44 (0)800 772 0 442

15

+
Years of Digital Signature
Innovation