Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:58 PM
Dark Reading
Dark Reading
Products and Releases

New Email Security Product Supports TLS Encryption

New Boundary Encryption feature encrypts inbound and outbound email content while in transit

Rohnert Park, Calif. " January 7, 2010 " Red Condor, an award-winning provider of fully managed email security solutions, today released version 7.0 of its anti-spam software. The latest software update, which powers the company's family of Message Assurance Gateway email security appliances and its hosted spam filtering service, includes several new features that enhance the confidentiality and trust of customers' email communications.

Among the new features in version 7.0 is support for Transport Layer Security (TLS) Encryption. Using digital certificates, Red Condor establishes private email networks that link Red Condor's customers with their defined partners. As a result, every email sent or received through the networks is fully encrypted and the encryption is transparent to both sender and recipient. Using TLS to encrypt communications between two email gateways protects all email content while in transit and ensures full compliance with privacy regulations. Red Condor's TLS Encryption is an optional service that is available at no charge to current and new customers. In addition to TLS Encryption, Red Condor version 7.0 also provides enhanced troubleshooting and certificate management for MAG antispam appliance administrators.

"Email has been the leading communications tool for businesses for many years, yet still today there is significant risk involved when using it to exchange intellectual property or other sensitive information," said Dr. Thomas Steding, president and CEO of Red Condor. "There is little doubt that the information within unsecured emails could be intercepted, read and altered before it reaches its intended destination. TLS Encryption eliminates these concerns and risks while ensuring the integrity of every message sent through our system."

Steding added, "Our solutions protect every part of the email message and ensure that the encrypted email is only sent to the correct destination. We make email security easy by automatically and consistently applying encryption policies to every message, thereby eliminating the need for users to take any special action to send or receive their encrypted communications."

For more information on Red Condor version 7.0 or its anti-spam solutions, contact 888-966-7726 or visit RedCondor.com.

About Red Condor

Red Condor is revolutionizing spam fighting with its next generation technology. Red Condor's highly accurate email filter, hybrid architecture Vx Technology, and fully managed appliances lead to a dramatic reduction in the cost of owning a premium spam filter. With solutions for small businesses, as well as ISPs with millions of email inboxes, Red Condor has a cost-effective, timesaving solution that is rapidly gaining market share. The system's design has built-in zero tolerance for lost email, and a near zero false positive rate while achieving long-term spam block rates greater than 99%. Red Condor Archive is a secure message archiving service with lifetime retention and unlimited storage. The company's next-generation technology is backed by a 24x7 customer care center staffed by email security experts at Red Condor's headquarters. For more information, visit www.redcondor.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-01
Python-RSA 4.0 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing exces...
PUBLISHED: 2020-06-01
modules/security/classes/general.post_filter.php/post_filter.php in the Web Application Firewall in Bitrix24 through 20.0.950 allows XSS by placing %00 before the payload.
PUBLISHED: 2020-06-01
An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.
PUBLISHED: 2020-06-01
An improper input validation in FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below CLI admin console may allow unauthorized administrators to overwrite system files via specially crafted tcpdump commands in the CLI.
PUBLISHED: 2020-06-01
In QuickBox Community Edition through 2.5.5 and Pro Edition through 2.1.8, the local www-data user has sudo privileges to execute grep as root without a password, which allows an attacker to obtain sensitive information via a grep of a /root/*.db or /etc/shadow file.