Kiteworks Chief Product Officer Yaron Galant speaks about how the benefits of the Email Protection Gateway (EPG) capabilities in Kiteworks remove the complexity of email encryption for sender and recipient. As part of this process, Kiteworks automates coverage of all email sent and received within the Kiteworks Private Content Network.

The Kiteworks Email Protection Gateway (EPG) secures and automates encryption and decryption. It ensures that confidential business communications, such as customer information and financial transactions, are always secure and can be shared securely with customers, partners, and suppliers. At the same time, Kiteworks EPG removes the friction of encryption and decryption between senders and recipients.

Providing a simple yet effective user interface, the encryption gateway allows you to easily access and manage your email encryption policies. It enables you to define email encryption and decryption rules based on a variety of criteria such as recipient email domain, email subject, and more. This allows you to easily automate the encryption and decryption of emails based on user-defined rules, reducing manual effort and human errors.

EPG also provides administrative visibility and control to allow you to track, audit, and monitor encrypted emails in transit and at rest. Additionally, you can manage access to emails with two-factor authentication, with the option to configure an expiration date. You can also set automatic alert and notification policies to inform users of any encryption or decryption errors and ensure timely response to them.

With Kiteworks, you can deploy email protection, control, and tracking that meets the industry’s toughest standards by applying a flexible selection of email protection gateway and automated encryption features. You have full confidence that sensitive emails are encrypted per your policies while users work as usual, with their standard clients, and without needing plugins, training, or extra steps. Administrators save time and reduce mistakes with centralized policy controls and automation of key and certificate handling. Finally, you can execute strategic risk-reduction requirements, such as keeping content out of the hands of cloud service providers, interfacing with partners’ differing encryption standards, or applying data loss prevention (DLP), anti-malware, anti-phishing, and Microsoft’s RMS and AIP.