Paubox Encrypted Email

(34)
5.0 out of 5 stars

Paubox is an easy way to send and receive HIPAA compliant email.

Work for Paubox Encrypted Email?

Learning about Paubox?

We can help you find the solution that fits you best.

Paubox Encrypted Email Features

Encryption
Email Encryption

Encrypts the content of emails and their attachments.

97%
(Based on 14 reviews)
Messaging Encryption

Encrypts messages being sent via text or within an application.

100%
(Based on 8 reviews)
File Transfer Encryption

Protects data with within or as it leaves your secure or local network.

98%
(Based on 8 reviews)
Data Encryption

Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application.

Not enough data available

Document Encryption

Provides a level of encryption for text documents.

Not enough data available

Full-Disk Encryption

Encrypts entire device to secure data in case it is lost or stolen.

Not enough data available

Compliance
Multi-Factor Authentication

Requires a second level of authentication, such as sms messaging or customized tokens, to access data.

Not enough data available

Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

97%
(Based on 6 reviews)
Security and Compliance

Abilities to set standards for database security and risk management.

100%
(Based on 7 reviews)
Compliance
Authentication

Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging

100%
(Based on 5 reviews)
Policy Enforcement

Abilities to set standards for database security and risk management.

100%
(Based on 5 reviews)
Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

100%
(Based on 5 reviews)
Administration
At-Risk Analysis

Identifies location of data that may be less protected and more vulnerable to threats.

n/a
Database Support

Supports different database platforms and data types. Often integrates with existing databases.

n/a
DLP Configuration

Sets protocols to alert administrators and back-up or encrypt data at rest or as incidents arise.

Not enough data available

Database Management

Administrators can access and organize data related to incidents to produce reports or make data more navigable.

n/a
Management
Backup

Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.

Not enough data available

Recovery

Decrypts datasets or files or allows users access to a backup database for reintegration.

Not enough data available

File Management

Allows administrators to set levels of encryption for file types. Allows administrators to decide which files to encrypt.

Not enough data available

Anomaly Detection

Monitors activity within networks and alerts administrators when unusual activity occurs.

Not enough data available