Menu Close

Secure Email

Automated email security

It's safe to send email again

Sending confidential data by email is no longer a problem.  Whether you wish to protect the whole email or just attachments.   DOQEX allows protection of email sent by automated systems or manually by users.

Any Email Client.  DOQEX does not require a plugin and will therefore work with any email client and infrastructure.  We’ve tested it using mutt on a Sun SPARC workstation but it’s no problem if you’re using Office365 instead.

Microsoft Outlook Plugin.  Of course many customers choose to use our plugin.  Configurable and simple to use we don’t bog your users down with decisions and menus – simply send the mail securely!


Policy Driven Mail Processing

Automated security.   Applying security by policy allows users to forget about security settings and just get on with their work.  Users are terrible at figuring out sensitivity classifications, security options and password settings so why take the risk.

Process secure email from existing software systems.   All email is processed by the DOQEX mail gateway so you can apply processing rules for mail from in-house systems.  No need to beg a development budget or schedule a project with the software vendor.

Compatible and Smart.  As a smarthost the DOQEX gateway plays nicely and fits snugly into your mail processing chain.  Whether you wish DOQEX to deliver directly, back to you or out via your AV vendor it’s no problem!

Sender based routing.   Many Microsoft Exchange administrators have found the lack of sender-based routing an issue.  DOQEX mail gateway allows full control over mail rules based upon individual senders and sender domains.

All data is encrypted at rest and in transit.   All data processing is via ISO27001 compliant mechanisms and FIPS 140-2 approved encryption algorithms. Click here for more details on our security processes.

Attachment Protection

Attachment protection.  Automatically convert email attachments to secure, traceable download links.   Configure the link text (in any language) and decide on the placement position.

Automated password protection.   Strip email attachments and protect the download links with a password.  Configure pre-shared passwords or have the system generate a password for you. If you are really brave allow users to set their own.

“Recall” email attachments.  Users and administrators have the ability to revoke email attachments.  We’ve all sent email to the wrong address and we usually notice pretty quickly but by deleting the download shares the unintended recipient can no longer access the attachment. 

On by default. Opt-in. Opt-out.  Define each mail processing rule so that enforcement is appropriate for your use case.  Whether you need a rule active all the time or wish to allow users to select it when needed or opt-out when not needed the choice is yours.

Lifetime and auto-expiry.   Attachments which are converted to links are subject to compulsory expiry and TTL policy.  Whether you set links to last just one day or one year you avoid having your files hanging around recipient mail boxes forever.   Most of us are guilty of abusing email clients as a form of perpetual storage.  This is bad for security and really bad for anyone paying to store or backup bloated .pst files! 


Securemail - protecting the whole email

Captivemail portal.  Securemail is called a captivemail portal because email never leaves your service.  Recipients no longer receive your original emails, instead recipients are directed to your private securemail service.  The service is branded and configured to process mail according to any business need.

Recalling email.  Users can be granted the ability to recall email by clicking a button from the email in their sent items folder.   Web-based securemail users can recall and restore any email.  Administrators and service desk teams can recall email on users behalf and and mark recipient email as read.

Restricted reply and forward list.  By default recipients are prevented from doing anything except replying to the original sender.  Administrators can configure reply lists to enable responses to shared addresses and teams.

Prevent attachment download.    Attachments may automatically discarded or marked as view only preventing recipients downloading files.   File viewing may be watermarked with audit trail data for extra security.

Authentication options.   Choose an authentication option for recipients appropriate to their capabilities and the sensitivity of the data.   Options include multi-factor auth, SMS tokens, single and multi-use direct login links. 

Multiple Recipients Divisions.  Along with granular recipient routing processing rules each rule can segregate recipients into discrete divisions.  This enables alternate auth, download rights and other settings to be applied for each rule.