Skip to content

Email Encryption

The Easiest Email Encryption for Achieving Compliance

Keeps your email confidential, simplifies compliance, and reduces management costs by removing the complexity associated with PKI encryption. All you need is the recipient’s email address to encrypt sensitive mail.

Email Encryption

Identity-based encryption and hosted key management

  • Simplifies compliance with identity-based encryption
  • Requires only a recipient’s email address
  • Lowers IT costs with our Hosted Key Service
  • Ensures access to email with 24x7 Key Recovery

Trend Micro Email Encryption frees you to send encrypted mail to anyone. And you can choose from multiple solutions to fit your needs:

Email Encryption Client plugs into Microsoft® Outlook® for user-driven encryption.

Email Encryption Gateway offers policy-based encryption to automatically protect sensitive content with no end user involvement.

Hosted Email Encryption offers a maintenance-free encryption service as an add-on to Trend Micro Hosted Email Security.

Effortless Key Creation

Unlike other solutions, Trend Micro Email Encryption features dynamic key generation, built with Trend Micro™ Private Post™ technology, eliminating the pre-enrollment and certificate management hassles of PKI encryption. All you need is a recipient’s email address to create encryption keys.

No-Maintenance Key Management

Hosted key management helps ensure the availability of encryption keys 24x7, providing password and key recovery without the need for IT involvement.

Easier for Email Recipients

Our web-based Zero Download Reader enables your intended recipients to decrypt emails without requiring them to install client software. Plus, our solutions help you comply with the regulations and requirements of partners and customers by allowing you to secure both incoming and outgoing emails and attachments.

Lower IT Costs

Our email encryption solutions minimize IT administration and lower overall costs thanks to all of the above: effortless key creation, hosted key management, plus ease of use for both senders and recipients.

Read analyst white paper (PDF)

Trend Micro Email Encryption Client

Our client-based encryption plugs into Microsoft® Outlook®, making it easier for end users to select which emails should be encrypted. Secure, encrypted email is as simple as sending regular email—no special training is needed.

View datasheet (PDF)

Key Features

  • Empowers end users to encrypt email that’s not protected by gateway encryption
  • Automates key creation—all you need is a recipient’s email address
  • Minimizes IT administration and costs with our Hosted Key Service
  • Ensures access to email with 24x7 password and key recovery support
  • Provides a free, web-based reader— so recipients can decrypt without installing software

Trend Micro Email Encryption Gateway

Automatically encrypts email at the gateway based on content policies—for a critical layer of data protection that doesn’t rely on end user discretion. A recipient’s email address is all that’s needed to create encryption keys, lifting the burden from IT staff.

View datasheet (PDF)

Key Features

  • Ensures compliance with automated, policy-based encryption
  • Adds a critical layer of protection that doesn’t rely on end users
  • Removes the hassles of key management with our Hosted Key Service
  • Eliminates the need for recipients to install client software
  • Delivers real-time logging and reporting—to speed remediation and simplify compliance audits

Hosted Email Encryption

Policy-based encryption from Trend Micro automatically enforces compliance requirements and protects confidential information—all while minimizing administration and lowering TCO. This add-on service integrates seamlessly with Trend Micro™ Hosted Email Security—for comprehensive messaging security in a fully hosted solution.

View datasheet (PDF)

Key Features

  • Reduces the risk of non-compliance with automatic, hosted encryption
  • Lowers TCO by reducing complexity and deployment time with Hosted Key Service
  • Provides uninterrupted access to email with 24x7 global password and key recovery support
  • Allows recipients to decrypt and view email on any device with a web browser
  • Integrates with Hosted Email Security—requiring no additional hardware or software

Client Encryption

Compatible Operating Systems

  • Microsoft™ Windows™ 2000, Windows XP, Windows Vista Ultimate, Business, Home Premium, Home Basic

CPU and Memory

  • Intel™ Pentium™ 800 MHz or better
  • 256 MB memory minimum, 512 MB recommended

Required Disk Space

  • 15 MB available for installation

Compatible Web Browsers

  • Internet Explorer 6.x or better
  • Firefox 1.5 or better

Compatible Email Clients

  • Outlook XP, Outlook 2003, Outlook 2007, Outlook Express 6

Internet connection required for encryption key distribution, configuration, and automatic updates

Email Encryption Gateway


  • Server: VMware ESX 3.5 or ESXi 3.5

Virtual Host*

  • HDD: 10GB Free Hard Disk Space
  • CPU: Intel Xeon or AMD Opteron (supporting VT)
  • RAM: 1GB RAM

Virtual Appliance*

  • HDD: Virtual SCSI HDD 8GB—Pre-allocated
  • CPU: 1 Virtual Processor
  • RAM: 512MB RAM

*SCSI hard-drives are recommended for optimal performance

Hosted Email Encryption

As a hosted service, Trend Micro Hosted Email Security does not require additional hardware or software located on your premises since all scanning hardware and software is operated and maintained offsite at Trend Micro’s secure datacenters.

To access your local Hosted Email Security administration account, a personal computer with Internet access and either Microsoft™ Internet Explorer 6.0 or 7.0 , or Mozilla™ Firefox™ 2.0, and JavaScript™ and Sun™ Java™ Runtime Environment (JRE) 1.4 or higher is required.

To start using Hosted Email Security, environments must also have an existing Internet gateway or workgroup SMTP connection and access to the DNS mail exchange record required to redirect the MX mail host record. If you have hosted email, then contact your service provider for more information or configuration help in redirecting your MX record.

Media społecznościowe

Połącz się z nami