Zix Blog

Tap into the Zix Encryption Network to Increase Ease of Use and Archiving Capabilities

Thu, 10/27/2016 - 08:45 by Dena Bauckman
If you ask most people to describe their experience when receiving an encrypted email, they will probably describe a disruptive process that requires clicking on a link or attachment and then having to register or enter a password to read the message. Even the best email encryption solutions, such as Zix, require the user to take extra steps to read a message. It’s simply the way the world’s email infrastructure works. BUT if you are a Zix customer communicating with another Zix customer, there are no extra steps. Zix provides automatic transparent email encryption between all...
Read More

Zix’s Strength in Community Shines for Blue Cross Blue Shield Customers and Their Members

Wed, 10/19/2016 - 10:53 by ZixCorp
Blue Cross Blue Shield (BCBS) organizations have an influential and prominent presence in healthcare, serving one in every three Americans who rely on their coverage for quality care. With such a profound responsibility to people and communities across the U.S., we are incredibly proud that more than 30 BCBS organizations rely on Zix and the strength of our community. How does Zix help BCBS organizations and their members? Email is as secure as a postcard traveling through the postal service. And just as healthcare companies and business associates can’t exchange protected health...
Read More

A List of Our Own

Thu, 12/20/2012 - 12:20 by ZixCorp
The holiday season is in full swing. Bright lights are filling the night sky, and holiday carols can be heard across Pandora everywhere. With all the festivities, we can’t help but think of the big guy in red, making his list and checking it twice. And because email encryption is near and dear to our hearts here at ZixCorp, we thought it was the perfect time to provide you with another list… an email encryption check list. In 2013, whether you’re implementing email encryption for the first time or replacing the old solution that has frustrated you for years, consider the list below and be...
Read More

The Role of Public and Private Keys in Email Encryption and Transparency

Tue, 12/11/2012 - 10:26 by Dave Robertson
A fundamental technology that makes email encryption possible (though not at all easy) is Public Key Cryptography (PKI). To understand how PKI works in email encryption, it’s important to start with three basic ideas: 1)Keys (public or private) are just big binary numbers (chains of ones and zeroes). 2)Emails are stored and transported in the form of big binary numbers as well. 3)Encryption and decryption are calculations (like what a spreadsheet ‘on steroids’ might do), each with two inputs and one result. With these in mind, we can outline how all three work together. When an email message...
Read More

TLS: Out with Old Risks, In with New Features

Wed, 02/08/2012 - 12:27 by Geoff Bibby
Many organizations try to reduce the risks of email by implementing transport layer security (TLS) between email servers. TLS is a protocol that’s designed to provide privacy between communicating servers and their users on the Internet. When an organization’s server and the recipient’s server communicate, TLS can ensure that no third party may eavesdrop or tamper with any message. The Limitations and Risks of TLS Traditionally, TLS is implemented through two methods – Mandatory and Opportunistic. Mandatory TLS requires a TLS connection be present before sending an email. If a TLS connection...
Read More

Survey Series, Part 1: Why organizations view email as a main source of data leaks

Thu, 09/29/2011 - 16:39 by Geoff Bibby
The 2011 “State of Email Encryption” study offered some startling results, beginning with the revelation that 59 percent of respondents strongly agree or agree that the use of email by employees is one of the main sources of data leakage in their organizations. Surprised by that number? We’re not. While IT, IT security and compliance practitioners may understand the risks of sending sensitive data in email, most employees perceive email as safe and easy. Easy it is; safe it isn’t. We confirmed this perception by analyzing user behavior. Respondents believe employee behavior continues to place...
Read More

The Origins of Push and Pull Email Encryption Delivery

Mon, 09/12/2011 - 16:02 by Dave Robertson
In a perfect world, the cloud would provide encryption between each and every email account, between company mail systems and consumers or any mix. If that were possible, all public internet email might eventually be encrypted with user transparency (no special software to fire-up, no need for user names or passwords to access secure messages). However, in the real world, the majority of email endpoints, especially consumers’ computers, are just not equipped to RECEIVE encrypted email transparently, and there is no practical, technical solution that will make that happen. There are just too...
Read More

Easy Living and Easy Email Encryption

Mon, 08/01/2011 - 15:06 by Geoff Bibby
Summer is such a positive time for so many. Its appeal is obvious: it’s a simple time. Simplified evenings (not as many kids obligations), simplified travel (no snow to battle), and simplified meals (fire up that grill). This theme of simplicity carries over nicely to many aspects of ZixCorp and its Email Encryption Services. Simple Choice: For anyone considering email encryption, ZixCorp is a simple choice for a variety of reasons. First, the ZixDirectory has tens of millions of members, which if you subscribe to a “safety in numbers” mentality, then ZixCorp is a clear choice. Second,...
Read More

Simplicity Must be the Priority in Security

Wed, 06/15/2011 - 11:30 by RickSpurr
For security solutions, simplicity is required for everyday use and real compliance. The protection of email and sensitive data is simple… as long as you stay within your company network. The complications begin when you introduce customers, business partners and regulatory entities into the mix. Expanding communication beyond your network, beyond your controlled environment, opens up your company to vulnerabilities you cannot manage and cannot afford to ignore. So, to combat those threats, you introduce a security “solution” for everyone to use – from employees, to customers, to business...
Read More
Subscribe to RSS - Transparency

Switching to Zix Just Got Better

50 percent or more off your first year when you switch to Zix Email Encryption by Feb. 28, 2017, from an eligible competing solution.

Learn More