StealthMail 4+

Ultimate email security

STEALTHMAIL LTD

    • Free

Screenshots

Description

This application is only applicable to the StealthMail Enterprise solution that should be integrated on premise or in the cloud

StealthMail Mobile Viewer allows previewing secure, encrypted StealthMail emails. Only one click on the Stealth-link in your default email client is required to preview the secure email.

StealthMail makes your emails secure and invisible to email relays, hackers, or public Internet threats. It uses regular email only to send Stealth-links that do not contain any user information whatsoever. Only through the Stealth-links can an authorized user access encrypted email content and attachments.

This approach to protecting emails makes the gaping vulnerabilities of SMTP and SSL/TLS a complete non-issue.

StealthMail provides true end-to-end encryption, where security keys are generated and stored on the user's side.


[Major StealthMail Features
]

INVISIBLE EMAIL - Mail servers are only used to send Stealth-links. Email content and files are not exposed to the Public Internet.

EMAIL ENCRYPTION - Email is only used to transfer the Stealth-link. The actual content is sent via secure channels in an encrypted state.

SECURE EMAIL CHANNEL - Protect yourself and clients from phishing (whaling, spear, clone, etc.) and Business Email Compromise attacks.

EMAIL CERTIFICATE - Senders, recipients, and their devices are identified and authorized to make spear phishing impossible.

ENCRYPTION KEYS - Encryption keys are stored inside your company’s secure perimeter.

END-USER DEVICE ENCRYPTION - End-to-end encryption is performed on the end user's device.

What’s New

Version 1.5.3

- Multi account support
- UI improvements and bug fixes

App Privacy

The developer, STEALTHMAIL LTD, indicated that the app’s privacy practices may include handling of data as described below. For more information, see the developer’s privacy policy.

Data Not Collected

The developer does not collect any data from this app.

Privacy practices may vary, for example, based on the features you use or your age. Learn More

More By This Developer