ZSentry Quick Start

Quick Start Guide


1. FREE Trial
Request TrialClick to receive your FREE live ZSentry Trial by secure email, then send a Secure Quick Reply with 1-click. No installation or setup.

ZSentry works two-way with whatever solution you and your recipients use, with no changes, offering end-to-end encryption, HIPAA / regulatory compliance, and improved Data Loss/Leak Prevention (ZSiDLP).
2. What is it all about?
All-In-One: simple to buy. ZSentry includes App, Client, and API. Month and year plans, freedom to cancel at any time. Unique Lifetime Benefit™. From $49/year or $9.99/month.
Expand / CollapseTell me more... (tap to expand)

3. Why ZSentry for Google Apps? How does it work?
No add ons, not just web mail, not just one brand of web browsers. Use Gmail, mail clients, phones or a cloud provider without storing private information. ZSentry is the only Safe Harbor HIPAA end-to-end encryption solution that works with cloud providers that do not comply with HIPAA, or would otherwise ask you to sign their BAA. No plugin or installation — not even of a digital certificate. Send secure email that is received as... email, not just in one brand of web browsers.

From your point of view, after setup, ZSentry is invisible. Works with both Google Apps and Gmail, without storing PHI in your Google account. The user is logged in to the Google web interface, going about a task, and then decides to send a secure email. The user clicks Compose and sees a drop-down list for the 'From' address. The user selects the 'From' address that uses ZSentry, writes the email, then clicks Send. That's all! The email is sent encrypted, securely, with all the ZSentry options.
Expand / CollapseEncryption, Privacy and Regulatory Compliance
4. How does ZSentry work with Outlook? Phones?
You can use Outlook, phones, or a cloud provider without storing private information. ZSentry is the only Safe Harbor HIPAA end-to-end encryption solution that works with Outlook, Apple Mail, and phones, in any platform, without plugin and installation — not even of a digital certificate. Send secure email that is received as... email, not just in a web portal.

From your point of view, after setup, ZSentry is invisible. The user is going about a task in their desktop or in the phone, and then decides to send a secure email. The user clicks on the device's native mail app (for example, Outlook, Apple Mail or Mail app), then clicks Compose and sees a drop-down list for the 'From' address (the user can also setup ZSentry to be the only way to send email, with only that 'From' choice). The user selects the 'From' address that uses ZSentry, writes the email, then clicks Send. That's all! The email is sent encrypted, securely, with all the ZSentry options.
5. Can ZSentry scan my messages to prevent leaks?
That would already be a leak, and could negate the ZSentry HITECH Safe Harbor protection that stands between your organization and the multitude of breach and reporting rules and fines, according to US state and federal laws, EU rules, and worldwide.

Second, if message scanning would actually work 100% to prevent undesirable messages then no one would have email spam problems today.

Instead, ZSentry allows organizations to both prevent leaks and not increase risk. This feature, included in the ZSentry All-in-One product, is called ZSiDLP — for ZSentry improved Data Loss/Leak Prevention. ZSiDLP works while assuring regulatory compliance and HITECH Safe Harbor protection. If your organization wants to verify or block the content of outgoing messages, you can control ZSiDLP yourself before or after ZSentry encryption. This means that your organization can hold privacy close and avoid the con game of conventional message scanning or DLP (so-called Data Loss/Leak Prevention).
6. Can I test using my own account?
Yes, and using your custom domain name and branding, with one or more devices and apps. Click Sign Up below and test ZSentry with one user for $9.99/month, cancel at any time.
7. How can I get pricing? Sign up?
 Sign Up  Click Sign Up for pricing, sign up, or to request a quote. Starts with one user for $49/year or $9.99/month. Get ZSentry App, Client and API for full use. Freedom to cancel at any time. Earn or join the Lifetime Benefit™. Add or change devices, solutions and users at any time.
8. After sign up, what are the next steps?
You will receive an email from zsentry.com with instructions and will follow them according to your case:
  • Individual or two Users: Follow steps 1-2-3 in the Sign In instructions»
  • Organizations (>2 Users): One or more ZSentry Account Managers (ZAM) in the organization will be appointed to work more closely with ZSentry, control account roll-out, add and remove users. For >10 users, users do not need to know their access codes. Account Roll-Out, Centralized Management, and other instructions for organizations are given in the Sign In instructions»
9. How can I setup my device and apps? Google Apps?

 Choose your OS.


 Choose your OS.


 Choose your cloud.


 Enhanced Google use.



... More Devices / Apps
  device / app choices» (update your choices at any time)
... More Solutions
  ZSentry Empowers Your Solutions» (update your choices at any time)

ZSentry Trial and First Questions
What is the Trial about?
The live Trial shows how ZSentry works two-way with whatever solution you use, with no changes.

The Trial also includes a Quick Summary of ZSentry functions. You can see that your ZSentry-secured solutions will feel exactly like what you use today on the desktop and phone, and your recipients’ solutions will also benefit from your use of ZSentry and yet feel exactly like what they use today. For example, using any mix of email, webmail and SMS (texting) with multiple recipients, each using their own platform, even if they are not ZSentry users.
What can I use the ZSentry Trial for?
Use the Trial to see how ZSentry works for secure reading and reply in any platform, on first contact and in a live test (not just screenshots). You can also use the many other functions described in our inlined Quick Summary (placed below the Trial message signature line).

The most important Trial function is for you to see how ZSentry can easily help your recipients communicate securely with you, by using the complimentary Secure Quick Reply button in the Trial. You can use that button to talk back to us with no installation or setup, using desktop systems, cloud providers, or phones.
Can I trust my information in the cloud?
With ZSentry you do not need to, and you can then safely use Google Apps, Gmail or other cloud providers. Read more:
  Why ZSentry»
  Cloud Data Privacy and Security»
  Security goes BAD (Bring Any Device)»
How does ZSentry control access to messages?
The conditions include mandatory Login With Two-Factor Authentication, Registration, or Click to Read™. The sender never has to bother sending any passwords to recipients. All ZSentry access conditions work also on first contact, and can be personalized using the ZSentry Dashboard.
What is ZSentry Click to Read™?
How are access and keys controlled?

Click to Read™ is the default method that senders can use to authenticate recipients, offering multiple channel end-point authentication and identity confirmation. We demonstrate this method in the ZSentry Trial. The recipient is just asked to confirm identity and click to access the message. However, even in this simple case, ZSentry collects more, and more varied, evidence than the Postal Service when delivering mail with return receipt.
How does the sender know that someone else did not open the mail envelope at the destination?

Unlike the Postal Mail, that cannot answer that question even when a return receipt is signed, ZSentry can provide proof that the message was not intercepted before delivery to the desired person.
How it works: Starting with the ZSentry message received in your Inbox, your device received a first decryption key then, with your first click, your mailbox, IP number, ISP, transit time, route, device, agent, connection and other information were measured and authenticated by means of a non-forgeable, traceable, and unique second decryption key that no one could create, see or tamper with, evidence was collected that you control the password and/or access to that mailbox, your access was timestamped in reference to the US NIST, your time window for message access was accepted, and you were asked to EXIT or confirm your identity, which actions were thereafter approved under a mandatory control policy for message decryption, and sent back to the sender a comprehensive Who-Where-When-What-How audit record with sending and receipt evidence; all in accordance with control profile options that senders can easily select.

Both ZSentry self-destruct technology and international copyright law prohibit anyone else reading or using copies of the Trial message, even after the granted days of use (15, in this case). Any attempt to intercept and access the Trial message in motion or at rest is logged, and no one could access the Trial message otherwise. Before the Trial message is even received at your end-point device, or if an intercept is attempted, evidence about the access means, time, end-point, and path will be collected.

Then, after all that work that ZSentry did not bother you with, you are ready to encrypt your reply with another 1-click, which also includes more work that will not bother you or the sender.

Other delivery conditions can be requested by customers. Through their configuration profiles (ZSentry Dashboard) or per message, customers can define in seconds, for example, when ZSentry should request mandatory login with two-factor authentication, registration, the default Click to Read™ with end-point authentication and identity confirmation (as used with the Trial), or custom methods including time-token and live authorization.

In general, to see the access conditions that apply to a ZSentry message, go to the header above the decrypted message in ZSentry App and touch the button (more) after Expires.
Can other access information and conditions be used?
Yes. Options can include the name of the sender's organization (Sender Identity and Branding), sender's digital signature (Fingerprint), delivery confirmation (Return Receipt), message self- destruct (expiration and physical file deletion), and secure archiving (Vault). The ZSentry Secure Vault can also be used to protect the sent mail folders, particularly critical when using cloud providers, phones, and online systems.
Can I use my phone?
Yes, you are welcome to BYOD (bring your own device). ZSentry enables and improves mobility. Your users can use the device they know and love. Test reading this message and replying with your choices of phone, tablet, and desktop. What users see is automatically matched to access level, experience, and device capability. Read more at Choose your Devices and Apps»
How does ZSentry protect messages?
When you send secure email, THERE IS NO MESSAGE SCANNING UNDER ZSENTRY CONTROL. If your organization wants to verify or block the content of outgoing messages, you can do that yourself before or after ZSentry encryption. Please consult us With ZSentry, the message and attachments are treated as an opaque “data blob” and ZSentry-encrypted per-recipient, and then sent to each recipient by regular email. All ZSentry messages (including any attachments) are protected by end-to-end high-grade encryption (privacy) and digital signature (tamperproof), onsite, online, and at rest. You and the recipient, not ZSentry or your provider, hold the keys and there is no functional copy at ZSentry that would allow decryption from our servers. Read more at Cloud Security»
Can I see the encrypted ZSentry message?
Yes, you can see how the encrypted message is sent and received. Please go to the header above the decrypted message and touch the link “Original” in the menu.
More
...Frequent Questions
  FAQ»
... Automation / Savings
  ZSentry Empowers Your Business» (30+ examples)
... Options
  Use Options» (including onsite and online)
Main Technical Notes
Overview   Key Features   ZSentry App   ZSentry Client   API   Smart IT   SAML & SSO
  Security   Usability   HIPAA & HITECH   Experience   Why ZSentry?   Red Flags   SUMMARY

Development and © by NMA

Trademarks and Copyrights as described in our Legal Statement. We protect Your Privacy.