Want to see who topped the 2019 Best Software Awards?

Paubox Encrypted Email

5.0
(40 reviews)

Paubox is an easy way to send and receive HIPAA compliant email.

Work for Paubox Encrypted Email?

Learning about Paubox?

We can help you find the solution that fits you best.

Paubox Encrypted Email Features

Encryption

Email Encryption

Encrypts the content of emails and their attachments.

97%
(Based on 18 reviews)

Messaging Encryption

Encrypts messages being sent via text or within an application.

100%
(Based on 10 reviews)

File Transfer Encryption

Protects data with within or as it leaves your secure or local network.

99%
(Based on 10 reviews)

Data Encryption

Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application.

Not enough data available

Document Encryption

Provides a level of encryption for text documents.

Not enough data available

Full-Disk Encryption

Encrypts entire device to secure data in case it is lost or stolen.

Not enough data available

Compliance

Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

98%
(Based on 7 reviews)

At-Risk Analysis

Identifies location of data that may be less protected and more vulnerable to threats.

n/a

DLP Configuration

Sets protocols to alert administrators and back-up or encrypt data at rest or as incidents arise.

Not enough data available

Sensitive Data Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data available

Compliance

Authentication

Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging

100%
(Based on 8 reviews)

Policy Enforcement

Abilities to set standards for database security and risk management.

100%
(Based on 8 reviews)

Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

100%
(Based on 8 reviews)

Administration

Database Management

Administrators can access and organize data related to incidents to produce reports or make data more navigable.

n/a

Deduplication

Deduplication, creating synthetic backup files, to reduce file size and eliminate redundant files.

Not enough data available

Backup

Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.

Not enough data available

API / integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data available

Management

Backup

Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.

Not enough data available

Recovery

Decrypts datasets or files or allows users access to a backup database for reintegration.

100%
(Based on 5 reviews)

File Management

Allows administrators to set levels of encryption for file types. Allows administrators to decide which files to encrypt.

100%
(Based on 5 reviews)

Anomaly Detection

Monitors activity within networks and alerts administrators when unusual activity occurs.

Not enough data available

Security

Multi-Factor Authentication

Requires a second level of authentication, such as sms messaging or customized tokens, to access data.

97%
(Based on 5 reviews)

Data Transport

Protects data with some form of encryption as it leaves your secure or local network.

Not enough data available

Data Types

Allows the secure storage of differend information types such as text, spreadsheets, or graphics.

Not enough data available

Security Tools

Provides tools that allow adminstrators to quarantine, block, or encrypt data.

Not enough data available