p≡p closes the most threatening attack vectors for you and your company’s email communication, such as: - Attachment based attacks (ransomware, malicious email attachments, etc.) - URL based attacks (credential phishing, formjacking attacks, etc.) - Business Email Compromise (BEC), a social attack during which the attacker falsifies content, for instance bank account numbers on invoices - CEO fraud, another social attack in which the attacker impersonates the CEO
p≡p proposes easy and simple to implement solutions with a low TCO that offer: - No phishing with company email accounts on employees inside the company (eg. CEO fraud) - No phishing attacks on customers via company email accounts - No business email compromise with company email accounts on employees - No access to and no modification of email content by attackers - Guarantee to the client that only the recipient is able to read his or her email - Full GDPR and audit compliance
Categories |
|
---|---|
Website | pep.software |
Details $ | - |
Platforms |
Categories |
|
---|---|
Website | pgptool.github.io |
Details $ | |
Platforms |
No pep.security videos yet. You could help us improve this page by suggesting one.
Kleopatra - Kleopatra is a certificate manager and GUI for GnuPG.
GPGTools - Use GPG Suite to encrypt, decrypt, sign and verify files or messages.
GnuPG - GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP).
GPG Suite - Use GPG Suite to encrypt, decrypt, sign and verify files or messages.
GPG4Win - GPG4Win is an encryption program for files and emails. The program encrypts emails and files so that they can only be read by those intended to receive them.
GNUPGK - A GnuPG Frontend GUI made in C#.