Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

1/7/2010
06:58 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New Email Security Product Supports TLS Encryption

New Boundary Encryption feature encrypts inbound and outbound email content while in transit

Rohnert Park, Calif. " January 7, 2010 " Red Condor, an award-winning provider of fully managed email security solutions, today released version 7.0 of its anti-spam software. The latest software update, which powers the company's family of Message Assurance Gateway email security appliances and its hosted spam filtering service, includes several new features that enhance the confidentiality and trust of customers' email communications.

Among the new features in version 7.0 is support for Transport Layer Security (TLS) Encryption. Using digital certificates, Red Condor establishes private email networks that link Red Condor's customers with their defined partners. As a result, every email sent or received through the networks is fully encrypted and the encryption is transparent to both sender and recipient. Using TLS to encrypt communications between two email gateways protects all email content while in transit and ensures full compliance with privacy regulations. Red Condor's TLS Encryption is an optional service that is available at no charge to current and new customers. In addition to TLS Encryption, Red Condor version 7.0 also provides enhanced troubleshooting and certificate management for MAG antispam appliance administrators.

"Email has been the leading communications tool for businesses for many years, yet still today there is significant risk involved when using it to exchange intellectual property or other sensitive information," said Dr. Thomas Steding, president and CEO of Red Condor. "There is little doubt that the information within unsecured emails could be intercepted, read and altered before it reaches its intended destination. TLS Encryption eliminates these concerns and risks while ensuring the integrity of every message sent through our system."

Steding added, "Our solutions protect every part of the email message and ensure that the encrypted email is only sent to the correct destination. We make email security easy by automatically and consistently applying encryption policies to every message, thereby eliminating the need for users to take any special action to send or receive their encrypted communications."

For more information on Red Condor version 7.0 or its anti-spam solutions, contact 888-966-7726 or visit RedCondor.com.

About Red Condor

Red Condor is revolutionizing spam fighting with its next generation technology. Red Condor's highly accurate email filter, hybrid architecture Vx Technology, and fully managed appliances lead to a dramatic reduction in the cost of owning a premium spam filter. With solutions for small businesses, as well as ISPs with millions of email inboxes, Red Condor has a cost-effective, timesaving solution that is rapidly gaining market share. The system's design has built-in zero tolerance for lost email, and a near zero false positive rate while achieving long-term spam block rates greater than 99%. Red Condor Archive is a secure message archiving service with lifetime retention and unlimited storage. The company's next-generation technology is backed by a 24x7 customer care center staffed by email security experts at Red Condor's headquarters. For more information, visit www.redcondor.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-25329
PUBLISHED: 2021-03-01
The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previousl...
CVE-2021-25122
PUBLISHED: 2021-03-01
When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request...
CVE-2021-27225
PUBLISHED: 2021-03-01
In Dataiku DSS before 8.0.6, insufficient access control in the Jupyter notebooks integration allows users (who have coding permissions) to read and overwrite notebooks in projects that they are not authorized to access.
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.