Cyber Security Products 

PGP Data Protection Products

PGP PDF Messenger

FAQ

Overview

Vast amounts of mission-critical information move in and out of businesses through email. Everyone expects instant availability of digital documents. However, the ability to ensure data confidentiality and verify its content and sender is one of the biggest security challenges today to any size organization. Concerns about protecting information privacy, preventing fraud, meeting ever tighter regulatory compliance guidelines, and secure, confirmed delivery of sensitive information are now vital requirements for all business communications. Unprotected email poses a critical risk to an enterprise’s most sensitive data: customer information, financial data, trade secrets, and other proprietary information. Exposure of this information can result in financial loss, legal ramifications, and brand damage.

PGP PDF Messenger

PGP® PDF Messenger provides clientless email encryption for secure email communications with large groups of customers and partners. By encrypting data down to the individual recipient, PGP PDF Messenger protects data from unauthorized access in transit over the public Internet, at rest on recipient mail servers, and at the endpoint. With PGP PDF Messenger, organizations can minimize the risk of a data breach and comply with partner and regulatory mandates for information security and privacy.

PGP PDF Messenger automatically secures email messages as they leave the enterprise network according to highly configurable encryption rules, eliminating the need for client software or user intervention. Leveraging the broad adoption of PDF reader software, PGP PDF Messenger enables enterprises to address regulatory requirements and data breach risks without requiring special software or using proprietary email attachment encryption software. Among its benefits are the following:

  • Easy, automatic operation–Protects sensitive email from sender to recipient without changing the user experience.
  • Enforced security policies–Automatically enforces data protection using centrally managed policies without storing messages.
  • Accelerated deployment–Delivers email encryption to a broad range of users using the existing infrastructure.
  • Reduced operation costs–Result from eliminating training and help desk costs through transparent, clientless operation.