E-Mail with Secured Seal and Signature Replaces Expensive Legal Fax and Courier Service
The Hague, ID Control, the specialist in advanced online identity and access management, helps organizations cutting down on post, courier, fax, handling and administrational costs. ID Control today announces the launch of MailID, the worlds most easy and secure e-mail signing, encryption and decryption software to enforce compliance requirements and to ensure that confidential information is delivered securely via e-mail.
The Hague, Netherlands, January 16, 2009 --(PR.com)-- With MailID, of which the software license is free of charge, documents can be exchanged securely with signed and completely sealed and secured e-mail. MailID assures the digital integrity, confidentiality and signature of the e-mail and its message contents. Sensitive information can now be securely exchanged and sealed via e-mail, such as with banking statements and loan offers from banks, electronic invoices from enterprises and annual statement from accountants, recipes from doctors and pharmacies and files from lawyers.
MailID can be activated by writing the word “secure” into the subject of the e-mail. The e-mail will then be automatically encrypted and signed. The visible content of the recipient’s e-mail shows only the MailID number and a notification that a SMS is delivered to the mobile phone of the recipient containing a one time password. This dynamically generated and via SMS distributed password, MessageID, is connected to the MailID. Only with this MessageID, and copying the right one time password received via SMS, the e-mail message can be opened, decrypted and read and if wanted securely responded to the sender by the recipient.
MailID looks a lot like a courier service, but goes further by sealing the message and enclosed information with a signature of the sender by which only the recipient with the access key sent by SMS related to his or her mail slot can read the locked information. E-mail is compared to postcards in a glass mailbox, but could also be opened or faked. Is the message the receiver receives the same message as the sender has sent? MailID reduces these risks and threats related to e-mail and therefore can be used for highly secure purposes. MailID empowers a tremendously huge cost reduction by evading the usage of traditional fax, courier service or postal exchange by introducing secure document exchange and distribution by e-mail.
Hans Kortekaas, CEO of ID Control, indicates that with MailID ID Control cuts down on the budgets for traditional secure communication and exchange of documents such as invoices, statements and contracts by introducing this secure and affordable alternative. The calculation of dematerializing the traditional paper invoice and the related distribution process is relatively simple to be made taken into account that this costs for most organizations a minimum of 1 Euro and even far above. Various studies and real-user cases demonstrate that electronic Invoicing can significantly enhance business efficiency through reducing costs of handling invoices by up to 80%. According to the conclusions of an EU expert group on e-invoicing last year, the claim is that e-invoicing would lead to annual savings of 240 billion. Last but not least the risks and threats related to normal e-mail were tremendous last year and should not to be denied and show the demand for securing e-mail.
ID Control, www.idcontrol.com located in The Hague, provides next to e-mail encryption, decryption and authentication with MailID and One Time Password (OTP) via SMS with MessageID, advanced strong authentication tokens and unified management. The range of tokens is composed of HandyID, MessageID, KeystrokeID, the ID Control OTP Key and USB Token. HandyID is an OTP generating application running on your mobile device, the ID Control OTP Key is an OTP generating hardware token, the ID Control USB Token stores and generates digital signatures and KeystrokeID recognizes users on the basis of their typing behaviour while logging in. All tokens are managed by ID Control Server hosted at the partner’s or customer’s side, by which users are strongly authenticated. Above all organizations with different authentication methods and tokens for a variety of systems, applications, users and services can manage all of them in one web based central authentication environment with the “ID Control Server”.
###
MailID can be activated by writing the word “secure” into the subject of the e-mail. The e-mail will then be automatically encrypted and signed. The visible content of the recipient’s e-mail shows only the MailID number and a notification that a SMS is delivered to the mobile phone of the recipient containing a one time password. This dynamically generated and via SMS distributed password, MessageID, is connected to the MailID. Only with this MessageID, and copying the right one time password received via SMS, the e-mail message can be opened, decrypted and read and if wanted securely responded to the sender by the recipient.
MailID looks a lot like a courier service, but goes further by sealing the message and enclosed information with a signature of the sender by which only the recipient with the access key sent by SMS related to his or her mail slot can read the locked information. E-mail is compared to postcards in a glass mailbox, but could also be opened or faked. Is the message the receiver receives the same message as the sender has sent? MailID reduces these risks and threats related to e-mail and therefore can be used for highly secure purposes. MailID empowers a tremendously huge cost reduction by evading the usage of traditional fax, courier service or postal exchange by introducing secure document exchange and distribution by e-mail.
Hans Kortekaas, CEO of ID Control, indicates that with MailID ID Control cuts down on the budgets for traditional secure communication and exchange of documents such as invoices, statements and contracts by introducing this secure and affordable alternative. The calculation of dematerializing the traditional paper invoice and the related distribution process is relatively simple to be made taken into account that this costs for most organizations a minimum of 1 Euro and even far above. Various studies and real-user cases demonstrate that electronic Invoicing can significantly enhance business efficiency through reducing costs of handling invoices by up to 80%. According to the conclusions of an EU expert group on e-invoicing last year, the claim is that e-invoicing would lead to annual savings of 240 billion. Last but not least the risks and threats related to normal e-mail were tremendous last year and should not to be denied and show the demand for securing e-mail.
ID Control, www.idcontrol.com located in The Hague, provides next to e-mail encryption, decryption and authentication with MailID and One Time Password (OTP) via SMS with MessageID, advanced strong authentication tokens and unified management. The range of tokens is composed of HandyID, MessageID, KeystrokeID, the ID Control OTP Key and USB Token. HandyID is an OTP generating application running on your mobile device, the ID Control OTP Key is an OTP generating hardware token, the ID Control USB Token stores and generates digital signatures and KeystrokeID recognizes users on the basis of their typing behaviour while logging in. All tokens are managed by ID Control Server hosted at the partner’s or customer’s side, by which users are strongly authenticated. Above all organizations with different authentication methods and tokens for a variety of systems, applications, users and services can manage all of them in one web based central authentication environment with the “ID Control Server”.
###
Contact
ID Control BV
Susan de Wolf
0888732873
www.idcontrol.com
Van Diemenstraat 202
2518 VH THE HAGUE
Contact
Susan de Wolf
0888732873
www.idcontrol.com
Van Diemenstraat 202
2518 VH THE HAGUE
Multimedia
7 Steps to e-mail security
White paper on Secure E-mail (encryption, decryption and digital signing of e-mails) giving answers to: 1. Why should we use secured and signed e-mail?; 2. Seven Steps to E-mail Security; 3. Who needs, is using and is going to use what in secure e-mail?.
Categories