Secure email, easy and automated

  • Email encryption, trust verification, phishing protection
  • Automates key and identity management
  • Non-intrusive, lowering cost and increasing security
  • Works with Outlook&Microsoft365, iOS and Android

Email remains the most prominent attack vector

Standard encryption can solve some of these issues but is either too complicated or not trustworthy. 

1
91%

of targeted attacks start with email

91%

of targeted attacks start with email

2

Centrally stored encryption and trust create a single point of failure

3

Key management is complicated, costly and unreliable

planck Secure Email Is The Answer

Next Generation Solution

Traditional Certificate Handling with Central Instances

1: Alice needs to register their Identity with the RA
2: The RA transmits a new Certificate to the Central Certification Authority which in turn issues the certificate to Alice
3: The VA confirms the Identity of Alice by validating the certificate allowing Alice and Bob to communicate

planck Secure Email Solution

1: Alice and Bob communicate seamlessly using planck Secure Email

Traditional Certificate Handling with Central Instances

planck Secure Email Solution

1: Alice needs to register their Identity with the RA
2: The RA transmits a new Certificate to the Central Certification Authority which in turn issues the certificate to Alice
3: The VA confirms the Identity of Alice by validating the certificate allowing Alice and Bob to communicate

1: Alice and Bob communicate seamlessly using planck Secure Email

Communication Architecture

planck architecture generates keys and trust at the endpoints, meaning an email in transit is always secure

Advantage

User Friendly Interface

  1. No interaction required
  2. Visual security status
  3. Guided user experience

Automation

  1. Key lifecycle management
    • Generation/prolong/revoke
  2. Key discovery and key renewal
  3. Private key handling
  4. Peer-to-peer synchronization of keys

Security Features

  1. Keys are generated on each device
  2. Trust is established between devices
  3. No reliance on central instances
  4. Encryption at rest and in transit
  5. Emails are always stored encrypted on local and cloud based servers
  6. Full Zero Trust Architecture

Operation

planck Secure E-mail is easy to install and self provisioning making it easy for corporations to deploy

Unlike traditional encryption key management tools, planck is fully automated and runs seamlessly in the background removing all complexity and ensuring all employees can effortlessly send and receive secure emails.

planck uses the authentication functionality of the device operating system as a basis for the automated sender authentication for each message.

As such, planck is directly compatible with any EPS, MDM, and IAM or SSO that also relies on the operating system's authentication for it sown source of identity

planck software is self-provisioned, no admin or extra infrastructure is needed. The normal tool chain can be used, lower operational risk for the user and making planck operationally more robust

Low complexity

Low operational risk

No additional infrastructure

three arrows icon

Works with Outlook&Microsoft365, iOS and Android

.

windows logo outlook logo
android logo apple logo

Customer support

Hello. How can I help you?
Your request has been submitted, our support will contact you shortly at [EMAIL].