How ZSentry Works click What’s Inside click ZSentry Sign In click Support Ticket click
FAQ

ZSentry is the only security that lets you do what you want.™

Expand / CollapseHow to search the FAQ? The site? (tap to expand)
Mobile optimized: This site may load or display certain page segments only by demand, in order to make your experience faster and more usable especially in cell phones. This needs to be taken into account if you want to search a page or the site.

FAQ search: To search within this FAQ page, find the link below that says "Click here to read all answers" and click it. Then, use the search function in your Web browser (usually, Ctrl-F) and search what you want.

Page and site search: To search any other page, do the same. To search the site, first go to your preferred search engine. Most Web browsers today incorporate the search function at the top of the page, or with a mouse right-click after word selection. Then, type what you want to search followed by our mark ZSENTRY.

Improved: For improved relevance in site search, please click Submit Search and send your request to us. Please add any comments that you think may be useful.
Top Answers:
  • Quick Start Guide »
  • NO MESSAGE SCANNING, DLP (Data Leak Prevention) available after encryption
  • Use Google Apps, Microsoft, phones or a cloud provider without storing private information
  • Your data is protected by end-to-end encryption, onsite, online, and at rest
  • The user and not ZSentry or a provider holds the keys
  • Secure two-factor login »
  • HIPAA and regulatory compliance »
  • Reach any user device securely with anyway mobility »
  • NO CHANGES to email addresses, services, devices, software, carrier, MX / DNS.
  • Recipients can read and reply securely on first contact, with no setup or registration.
Click Expand / Collapse to read answer, Expand / Collapse to close. Click here to read all answers.
NMA ZSentry
Expand / CollapseCan ZSentry encrypt my email and attachments? Files?
Yes. Messages, attachments and files are encrypted end-to-end and they are never at rest at ZSentry. The users hold the keys to decrypt and there is no key copy anywhere else (not even encrypted or hashed). Also works for secure webmail, secure SMS (texting), local and cloud archiving, phones, and more.

For sending/reading encrypted email and SMS using the Web, and to create a personalized Web Portal for your recipients, you need only step 1 below. To use phone, GMail, or Mail clients (as easy to use as regular email), follow through step 3.
  1. Signup and/or Login using ZSentry App »
  2. In your ZSentry account screen, click "Dashboard > Personalize > Save".
  3. A [ZMAIL INFO] email will be sent to your Inbox, with your setup settings for devices and apps » of your choice.
You can use more than one device and app at the same time. ZSentry works without installation or plugins. Your recipients can read and reply securely, and securely download attachments, without added cost. Works directly with phones for secure SMS. ZSentry Signup »
Expand / CollapseHow do I send/receive ZSentry Mail?
ZSentry works with whatever you have, as follows:

Decrypt, Read, Reply, and Save: You receive the secure message in your regular Inbox, encrypted. Follow the message instructions. Usually, just click the secure link -- where the link MUST begin with https://zsentry.com/. For added security, you can copy the link and paste it in the location bar of your web browser and then (visually or automatically by a white-list control proxy) make sure that the link begins with https://zsentry.com/ before you use the Enter or Go key in your device. Your actions will also decrypt and load any attachments.

Encrypt and Send: With ZSentry Client (*), your use your own Mail client to compose the email and load attachments, then you select the secure account (ZSentry) in your device, and touch Send. With ZSentry App(*), you use a Web browser to compose the email and load attachments, then touch "Encrypt & Send". In either case, that's all! The email will be encrypted and sent according to your account's ZSentry Dashboard settings, which you can personalize. Some devices may require setup.

(*)You use ZSentry App just with your Web browser. You use ZSentry Client with a Mail client (Outlook, iPhone, Android) or a Cloud client (GMail, Google Apps, Zoho, FastMail).

Read more: Sign In instructions»
Expand / CollapseCan I personalize ZSentry?
Yes. The organization or users can personalize their configuration profiles (Dashboard), defining how ZSentry sends secure email and what is required from recipients according to their access class. The users' configuration profiles are individually encrypted. In their domain, organizations may centralize and lock their users' personalized choices.

Before you personalize, please note that ZSentry is already provided "out of the box" with a Default HIPAA-compliant configuration that improves usability. The configuration is auditable, with access control by means of automatic mailbox and end-point authentication, login monitoring, and expiration control. It enables secure first-contact and reply (Secure Quick Reply) with verified recipient online identity, without requiring the recipient to register.  To enable Secure Quick Reply, the Expiration Time is set by default to 15 days (and should not be more than 31 days).

Read more: ZSentry Dashboard »

GMail and Google Apps users: See also ZSentry for Google How-To »
Expand / CollapseCan I use ZSentry for HIPAA compliant forms on my website or by email?
Expand / CollapseWhat is ZSentry? Zmail?
ZSentry provides end-to-end encryption and two-factor authentication where the user and not ZSentry or a provider holds the keys. ZSentry works two-way with whatever solution you and your recipients use, with no changes.

ZSentry is a bit different. ZSentry does not store your password anywhere. Zero message scanning, changes, or download. Your ZSentry-secured solutions will feel exactly like what you use today on the desktop and phone, and your recipients' solutions will also benefit from your use of ZSentry and yet feel exactly like what they use today. For example, using any mix of email, webmail and SMS (texting). And you can do secure back-and-forth with multiple recipients each using their own platform, even if they are not ZSentry users, send and receive attachments, store files securely, and much more.

ZSentry works with the devices people already own and love, with no changes for anyone while everyone gets more value from what they have. When you or your organization use ZSentry, you immediately get more utility and usability with certified HIPAA and security compliance for your apps and services across every platform. Your correspondents also get the same benefits, at zero added cost, with FREE Secure Read & Reply for your recipients.

With ZSentry, your data is protected by end-to-end encryption, onsite, online, and at rest. The user and not ZSentry or a provider holds the keys. ZSentry was tested and is CHPL certified as a Health IT EHR Product providing ARRA, HIPAA and HITECH compliance; also complies with Safe Harbor, GLBA, SOX, and other regulations.

Quick Start
Click Quick Start Guide»

FREE Trial
Click to learn more with your FREE Trial»

Technical Reading
- On the NMA ZSentry architecture, click Network Middleware Application»
- For follow-up questions, click Questions»

Zmail (ZSentry Mail) is the secure Mail function of ZSentry (NMA trademarks since 2001).
Expand / CollapseWhy would I need ZSentry?
With cloud services, anything with HIPAA-protected information that people send, save, share or use (including Mail, Drive, Docs, Spreadsheet, Texting, Projects, and Calendar) has to be encrypted or it will expose your organization to a HIPAA compliance break.

The problem is that someone could hack into your cloud account, or read copies on their servers that “who knows who can access”.

The same can happen if you are sending or sharing information online, your phone is lost, or desktop security is breached.

ZSentry solves these problems by enabling users to send, text, save, and share ZSentry encrypted messages in all desktop and phone platforms. The user and not ZSentry or a provider holds the keys.

You do not need to use fragmented solutions. You can use only ZSentry in all platforms, for example with Google Apps, Outlook, iPhone, Android, and Outlook, for more benefits and cost savings. For a list of the top five reasons customers tell us they choose ZSentry, touch The Top Five »

How it works with Google Apps: You just have to send the file or email through ZSentry, to encrypt.  Access to Google Apps does not change. The encrypted file in Google Apps (including Mail, Drive, Docs, Spreadsheet, and Calendar) will have the access controls that you choose when sending the file using ZSentry.  You can then store and share documents encrypted with ZSentry in Google Apps (including Mail, Drive, Docs, Spreadsheet, and Calendar), and they can be retrieved for decryption without Google scanning.

For examples, go to the "Google" section in this FAQ.
Expand / CollapseDo you have data sheets on ZSentry in PDF format?
In the site, you can find tutorials in PDF for specific devices and apps (for example, iPhone and Mail app, Google and Outlook), and get specific documents such as the HIPAA BAA.

However, there are ever so many new devices and apps out there, and more BYOD users, while ZSentry is so interactive with whatever users have, that an introductory data sheet in PDF format would be already outdated and too flat to show what ZSentry can do.

We solve this in a more elegant and efficient way. We provide an always up-to-date, interactive ZSentry "data sheet" in web format (also faster & safer than PDF), using your own device (whatever that device may be). You can get one by simply requesting our Free Trial »

The approval time takes a couple minutes. There is no credit card requested. You can test it with live user-controls for 15 days, see how each screen looks and works in any device, and use the included Secure Quick Reply to see how ZSentry also helps your users.
Expand / CollapseDo I need to get a new email address or app?
No. ZSentry works with your current email address, Inbox and app.

You receive secure messages directly, without ZSentry intervention, at your regular mail Inbox. You can use any mail provider without any changes, including Google Apps, GMail, Microsoft 365, and Yahoo Mail.

You can send, read and reply with any choices of desktop Mail client, cloud app, web browser, and phone. After decryption, you can also save messages locally (for example, in your hard drive or USB stick), which helps relieve privacy and value concerns when using cloud solutions.
Expand / CollapseCan ZSentry reduce my IT administrator workload?
Expand / CollapseWe're using a cloud service. What's the best way to integrate ZSentry?
The best practice, if your user interface is a Mail Client such as Outlook or phone, is to directly use the ZSentry SMTP settings to send secure email and the cloud service SMTP settings (eg, Google Apps, Office 365, Yahoo, Zoho) to send regular email. The Inbox is the same email address for both uses. Click Mail Client setup»

Second alternative is to use only a Web browser as the user interface, and then use the ZSentry SMTP settings to send secure email as an external server/From in the cloud service (eg, GMail, Google Apps, Zoho) itself. Click Cloud Client setup»

Third alternative is to use only a Web browser and ZSentry App» (no setup)

Other choices are presented in Use Options»
Expand / CollapseHow easy is it for people to read and reply to my email?
Your secure message will be sent encrypted to the recipient's email address and will be received as usual. The recipient can click the link (or copy-and-paste) to open it in a secure browser window (no setup) or in a Mail Client (may need setup). The recipient will be authenticated as you (the sender) requested, and can read, reply and save the message as well as any attachments.

To reply, the recipient can click the button  Secure Quick Reply 

That's all! In both cases, the service is provided securely but without burdening the recipient with anything more than a mouse click.

Just like with regular email, there is no password to send to the recipient, no signup, cost, installation, setup, or extra work demands. Recipients can use any desktop, tablet or phone. To see for yourself, click FREE Trial >>
Expand / CollapseHow can ZSentry help with first contacts?
When you use ZSentry, your email stands out and recipients can read it with the effort of a single mouse click, without setup and even without registration (if you allow it). They can also reply securely to you, without cost and setup.

With regular email, Inbox clutter and spam overload are often making people not even open your emails, or be afraid to reply.

To further help overcome first-contact hesitation and confusion, and prevent phishing, ZSentry enables senders to add an interpersonal touch. We created a Znote space, which is a custom plaintext note from the sender, visible without decryption, in the email envelope. The Znote is visible in the email summary that, for example, GMail provides before reading the actual email.

And, of course, you can write the Znote in the language of the recipient! This is useful to enhance the interpersonal context and help flag spam.

In addition, the Znote is also searchable, so that you can easily add externally-visible keywords to your secure message.

Through ZSentry authentication, people will know that your email is not spam, is actually from you and not something to be suspicious about, such as a phishing attack. ZSentry provides Free Reply choices so that a customer, patient or just website visitors can also send you a Zmail — and you can verify that it is safe to open before you actually do it.

And you can easily verify that your Zmail was read, with a Return Receipt providing full "When, Where, Who, What, How" information. You can control how your information is used, delivered and tracked, by using Expiration Time (self-destruct) and other ZSentry controls.
Expand / CollapseDo both parties (sender & receiver) have to use ZSentry for it to work?
No. It can be more secure if both do, but it works with just the sender using the service.

Secure first contact is a business-critical capability provided by ZSentry. Senders can choose how to protect their messages as well as their delivery. For example, in the most simple case that the sender can choose, ZSentry collects more and more varied evidence than the Postal Service when delivering mail. While in the simplest case the recipient only has to click to access the message, before the message is read ZSentry will authenticate the device and the mailbox, timestamp the connection in reference to the US NIST, obtain evidence that the recipient owns or controls the password to access that mailbox, record the message's fingerprint and also how and where the message was accessed, request identity confirmation from the recipient (as a legally valid declaration, protected by US copyright law), and make available other auditing records, such as when the message was sent and when it expires.

This also means that ZSentry is less intrusive on the receiving party than requiring keys, passwords, software installation, or even a setup. This is very useful when you do not want to bother the receiving party, as in a first contact. You can request a Return Receipt upon reading, and also set the email to self-destruct, to track and protect your information. For more, read Quick Start Guide»
This item includes online contributions by the community.
Expand / CollapseWhat is routed through ZSentry? Where are the emails stored?
Nothing is routed through ZSentry when you receive secure email, and the email is received in your regular Inbox. There is no protected data that is permanently stored, although encrypted. The user and not ZSentry or a provider holds the keys.

When you send secure email, there are two cases, controlled by the sender:
  1. Automatic: (higher usability, requires expiration less or equal to 31 days) The message is encrypted per-recipient and then split in three non-functional parts. One part is sent to the recipient along with a first decryption key and the other two parts are controlled and temporarily stored in the ZSentry servers. All three encrypted parts are needed for decryption and reading. The result is that even if an attacker has full access to all the servers, and knows the recipient's or sender's Usercode / Password, the ZSentry message still cannot be decrypted.
  2. Inline or Attached: the ZSentry message is fully sent encrypted to the recipient, and there's no part with ZSentry.
Regulatory Compliance, HIPAA, HITECH Safe Harbor
Expand / CollapseIs ZSentry certified by a third-party to be HIPAA compliant?
Yes. ZSentry is ONC/CHPL certified to provide a HIPAA-compliant EMR (Electronic Medical Records) solution (CHPL Product Number: IG-2482-11-0040), including encryption when exchanging electronic health information (170.302.v) and providing an electronic copy of health information (170.304.f).

ZSentry is also CHPL certified to satisfy HIPAA requirements in U.S. Federal incentive payment programs with Medicare (up to $44,000) and Medicaid (up to $63,750), where ZSentry works with partners providing qualified solutions for meaningful use of certified EMR. ZSentry can also be used with the U.S. Federal incentive program for Eligible Professionals (EP) who are successful electronic prescribers. The bonus is 2% of the Medicare allowed charges for the year.

Regarding HIPAA and other regulatory requirements, such as FERPA and U.S. state privacy laws, the levels and extent limits of ZSentry compliance are specified in the ZSentry Compliance Statement» including safeguarding protected health information (PHI), privacy, security, and integrity.

In summary, ZSentry provides compliance on a technical level, under HIPAA, HITECH Safe Harbor, and other rules as well, and exempting customers of signing a Business Associate Agreement (although a BAA can be signed if desired).

In these applications, ZSentry provides per-message encryption, de-identification, two-factor authentication, control, data loss protection, secure archive and auditing, protecting information in transit and at rest. ZSentry HIPAA conformance can also be verified by you or anyone else. It's quite straightforward and we are also at your disposal for any questions. Read more»
Expand / CollapseWhy is ZSentry secure?
There are well-known and recognized standards for encryption of email, including ITU-T and IETF X.509/PKI with S/MIME, and PGP with or without PGP/MIME encoding. ZSentry was developed after these standards and improves upon them in both usability and security.

ZSentry provides per-message encryption, de-identification, two-factor authentication, data loss protection, secure archive, message control, and auditing, protecting information in transit and at rest. ZSentry reduces the trust and control requirements in several critical areas, making it easier to attain and demonstrate a higher level of security while increasing usability, for example:
  1. Physical Safeguards: ZSentry enforces per-message, end-to-end encryption for every message, so that data is always protected in transit and at rest. Additionally, ZSentry eliminates (rather than just protects) attack targets, which technology we call Sans Target.

    The ZSentry Sans Target technology helps allay staff concerns and reduces risk for everyone, including in the cloud and at the client's end. For example, ZSentry does not store your keys, Password and Usercode anywhere, not even encrypted. As another example, if you use the default ZSentry Automatic Skin, a part of your encrypted message may be stored online but the stored part is Sans Target and does not by itself allow the message to be decrypted.

    Access to hardware and software is limited to properly authorized individuals. All hardware is located in the US, and customers can also use ZSentry Director to host and physically control their own ZSentry hardware.

  2. Technical Safeguards: ZSentry uses adaptive security, which can reduce and even eliminate the probability of common attack vectors, and also reduce reliance on the actions of users, or other agents. ZSentry adds password hardening with two-factor authentication to protect your ZSentry Password from someone trying to guess it (see next FAQ item).

    To reduce exposure, senders can set an expiration period for their ZSentry message to physically self-destruct. This safeguard includes a forensic control perimeter with an effective combination of technical and legal protection in three areas: infringement of copyright, breach of contract, and circumvention of a technological protection measure, to help prevent and control leaks.

    To assure secure, server-certified and CRL-verifiable PKI exchange with third-party servers, both the SSL SMTP and SSL HTTP certificates for zsentry.com are issued by leading Certification Authorities, including Thawte Premium Server CA, and support High-grade Encryption (AES-256 256 bit).

    SSL bridge and re-direction attacks are prevented by protocol and also by enforcing an SSL connection for any link which sources protected data (e.g. page or message) or contains links to protected information or for protected information entry, even if the link was initially presented as http:// — i.e., without an SSL request (for example, to allow proper operation with some Mail clients). To allay spoofing concerns, our trademarked name ZSENTRY (used in zsentry.com) was crafted to visually prevent letter or number confusions that could lead users to a false site, such as between the number 1 and the letter l in app1esauce vs. applesauce.

  3. Administrative Safeguards: ZSentry operates within the Safe Harbor provision that is legally enabled by privacy rules such as U.S. State Security Breach Notification Laws, HIPAA and HITECH. With ZSentry there are no fines, no loss of reputation, and no liability to notify users in the breach notice context, as no user identity and data can be compromised (Sans Target, see item #1).

    This also makes it simpler to demonstrate compliance levels and extent limits regarding HIPAA and HITECH Safe Harbor, with the important benefit that customers are not required to sign a HIPAA Business Associate Agreement (however, ZSentry can sign a BAA if desired). The same beneficial considerations apply to the Federal Financial Institutions Examination Council (FFIEC), the International Standards Organization (ISO) 17799 norm, and other regulations.

  4. External Safeguards: ZSentry technology was first qualified by the Swedish Government's Ministry of Justice Statskontoret in 2001. ZSentry and secure email ZSentry Mail have been extensively peer reviewed, with continuous use online for secure email since 2004, including millions of secure messages sent and received across many different platforms and thousands of organizations worldwide. All procedures use standard and well-known cryptography functions, with a choice of ZSentry encoding (ZS), PKI or PGP.
Only ZSentry has this comprehensive technology. Because only you have your keys, and it would take a staggeringly long time to have a good chance of guessing them, only you can, for example, access your encrypted email address book and decrypt a Zmail sent to you (see next FAQ item). Read more: ZSentry Compliance Statement»
Expand / CollapseWhy can't an attacker get or guess my ZSentry Password?
ZSentry has several properties that distinguish it from other security technologies using passwords, such as:
  1. Two-factor authentication: The ZSentry Usercode and Password enable two-factor, strong authentication. You create your ZSentry Password (something you know) and receive your ZSentry Usercode (something you get)
  2. Usable: The ZSentry Usercode is unpredictable but mnemonic. The ZSentry Password is not solely responsible for access security (see next properties), is security hardened by the Usercode, which allows it to be shorter and easier to remember.
  3. Not a password: just for familiarity, the ZSentry Password is called "password" but it is not a password. It is not verified by how it "looks" but by how it works.
  4. Sans Target: Uniquely, ZSentry does not store your Usercode or Password, not even hashed or encrypted. Only you have your ZSentry Usercode and Password and we do not know them. There are no password or usercode files that could be targeted anywhere. We call this unique property "Sans Target", and is used by ZSentry also to protect your user-keys and user files. The only attack possible is guessing by trial-and-error, which is made harder by the other properties.
  5. Password Hardening With Two-Factor Authentication: ZSentry is not as dependent on password quality for security, as conventional systems are. ZSentry uses password hardening with two-factor authentication to help protect your ZSentry Usercode and Password from someone (even knowing your Password) trying to guess them. For your ZSentry Password, you can also use ANSI codes from #32 to #255 (keyboard ALT-number), enabling more than 132 bits of entropy with just 13 ZSentry Password characters (and the Usercode).
  6. Asymmetry: Because computers work quickly and can network in parallel, security can also be broken very quickly, for example using dictionary attacks to break passwords. Unlike other technologies, while ZSentry prevents too many unsuccessful attempts at access, it does not need to rely on such prevention (which can be bypassed, technically and socially). Instead, ZSentry introduces a critical asymmetry. Although ZSentry authentication is very quick, trial-and-error guessing would take a prohibitively longer time than with a conventional username/password system even if a user would choose a lame password (found in password dictionaries).
To put these points into perspective, if a dictionary attack would take just one millisecond (1/1,000 of a second) to break a conventional system, the same attack for the same password could require more than two million years to break the ZSentry system. Read more»
Expand / CollapsePeople are easily fooled by phishing. Can ZSentry help?
ZSentry makes it much harder to fool people, sending or receiving email. Received messages can be verified to be authentic, by ZSentry and also independently.

For sending, ZSentry Client is spoof-free and provides hands-free Single-Sign-On and Mail after setup. The web service includes spoof prevention. In all cases, the ZSentry Usercode and Password are not online, not even encrypted or hashed.
Expand / CollapseWhat is Safe Harbor compliance?
The HIPAA HITECH rules, as well as breach notification laws in more than 45 U.S. states and other countries, provide "safe harbors" for encrypted information.

According to HIPAA rules, encryption of protected health information (PHI) data at rest and in motion provides a safe harbor that protects organizations from the costs and losses associated with data breach notifications, and fines that can range from $10,000 to $1.5 million per violation.

ZSentry provides Safe Harbor compliance with HIPAA HITECH and other rules, with no fines and no liability in the breach notice context, as no user identity and data can be compromised.

ZSentry HIPAA customers are exempt of signing a Business Associate Agreement (BAA), although a BAA can be signed if desired. Read more»
Expand / CollapseCan I delete all email after 30 days? IT says it won't work.
Conventionally, you cannot. Sending an email necessarily entails copying the message to other systems, which you may not have access to or even know of, potentially archiving the email forever. Senders and recipients may delete email files but, often, files can be easily undeleted or copied from a back-up. Senders and recipients may also get a screenshot of the email and save it. The result is undesired email retention, and an open risk for disclosure.

ZSentry Self-Destruct solves the various facets of this problem. You can actually eliminate the disclosure risk of email, webmail, SMS, IM, and file storage by setting it to self-destruct after the time you want, for example 30 days or even one hour. Read more»
Expand / CollapseWhy is ZSentry better? What is the Sans Target technology?
The ZSentry differential is not just about encryption, as that needs to follow well-known standards such as AES, but about many points missing in other products and that are even more critical than encryption for privacy and security.

With ZSentry, your data is protected by end-to-end encryption, onsite, online, and at rest. The user and not ZSentry or a provider holds the keys.

ZSentry provides IT with assurance that only trusted users are accessing confidential communications and services, and that their devices comply with established policies even with no setup. ZSentry can be easily personalized and centralized settings are available. Users' configuration profiles (Dashboard) are individually encrypted and can be locked by IT so that settings cannot be changed.

The ZSentry advantage further includes:

Design: simpler and complements rather than replaces existing solutions, operating Sans Target and providing an "All-In-One" seamless approach for anyway mobility.

No Plugins, Already Works: provides SSL/HTTP and SSL/SMTP service interfaces with no installation or plugins for all leading, familiar solutions including Google Apps, Outlook, Android, iPhone, iPad, and Exchange Server.

Foolproof: avoids common problems caused by human error or misuse, while providing two-factor authentication, multi-channel identification, anti-spoofing, end-to-end encryption, data loss protection, secure archive, secure first-contact and quick reply options with no recipient signup required, document life-cycle management with self-destruct, control, delivery and tracking options, automatic key management, and private-key protection.

Sans Target: the ZSentry technology eliminates (rather than just protects) common attack targets. This helps allay staff concerns and reduces risk for everyone, including in the cloud and at the client's end. For example, ZSentry does not store your keys, Password and Usercode anywhere, not even encrypted. As another example, if you use the default ZSentry Automatic Skin, a part of your encrypted message may be stored online but the stored part is Sans Target and does not by itself allow the message to be decrypted.
Android / Apple / BlackBerry / Google / Microsoft / More
Expand / CollapseCan I prevent Google from reading my Inbox?
Yes, and anyone else. Protecting messages in the Inbox and other incoming folders is particularly critical when using cloud providers, phones, and online systems. You can continue to use Google Apps or GMail while ZSentry provides five concurrent barriers to prevent this privacy issue:
  1. End-to-End Encryption: (DEFAULT) All ZSentry messages and attachments are protected before transmission by end-to-end encryption, onsite, online, and at rest, AND
  2. Sans Target: (DEFAULT) The user and not ZSentry or a provider holds the keys, with no storage of users' Usercode, Password, or keys anywhere, not even encrypted or hashed, AND
  3. Access Control: Senders can restrict who can decrypt the messages, from end-point authentication to mandatory two-factor authentication, AND
  4. 24/7 Auditing: Senders can request the Return Receipt service, whereby an auditing confirmation with What-Who-Where-How-When and other tracking information can be sent and logged every time there is even an attempt to access a ZSentry-protected message, AND
  5. Self-Destruct: More than just expiration could provide, this service can be requested by senders to protect and self-destruct data with no action by a sender or recipients, with release and expiration time control of a disclosure window. The technology also provides a forensic control perimeter, defined by the sender and legally protected by well-established international laws.
For more information on each item, go to Powered by ZSentry. The latter three privacy options are controlled in the ZSentry Dashboard »

These options dovetail well with a HIPAA-compliant ZSentry Secure Vault copy that can be automatically created and stored in the Google Apps Inbox or Google Drive; see items #4, #5 and #6 in the ZSentry for Google How-To »
Expand / CollapseCan I prevent Google from reading my sent mail?
Yes, and anyone else. Protecting messages in the sent mail folders is particularly critical when using cloud providers, phones, and online systems. You can continue to use Google Apps or GMail while ZSentry provides two options to solve this privacy issue:
  1. Within Google Apps: Use item #3 in the ZSentry for Google How-To »
  2. Outside Google Apps: Use item #8 in the ZSentry for Google How-To »
The latter privacy option (Outside Google Apps) works with other cloud providers and offers users the benefit of mandatory control (does not depend on Google's actions).

Both options dovetail well with a HIPAA-compliant ZSentry Secure Vault copy that can be automatically created and stored in the Google Apps Inbox (and Google Drive); see items #4, #5 and #6 in the ZSentry for Google How-To »
Expand / CollapseCan ZSentry also secure Google Drive, Docs, Spreadsheet, and Calendar?
Yes. You can store and share documents encrypted with ZSentry in Google Apps (including Mail, Drive, Docs, Spreadsheet, and Calendar), and they can be retrieved for decryption without Google scanning.

For example, ZSentry lets you store information encrypted in Google Calendar and this can be automated by IT through the ZSentry API, or can be done manually, all in an easy way.

With Google Drive, you normally click "upload file to Google Drive" from an email attachment. ZSentry uses the same Google process. By using ZSentry you will encrypt the file and send it as an attachment, which encrypted file you can then upload to Google Drive. There is more than one way to do so and this can be automated by IT through the ZSentry API, or can be done manually, all in an easy way.
Expand / CollapseWhat productivity and collaboration tools can I use with ZSentry?
The choice is yours. ZSentry works cross-platform, as a middleware in-between the end-points, so that there are no changes for anyone while everyone gets more value from what they have. ZSentry functionality is already included in cloud-based, on-premise, and mobile solutions, which can now become regulatory compliant with anyway mobility, as well integrated and improved in new ways.

For example, use with any or all of Android (Samsung, HTC, Motorola), Apple (including Mac, iPhone, iPod, Mail, iPad, iCloud, Safari), BlackBerry (RIM devices, Mobile Fusion), Google (Apps, GMail, Chrome), Linux (including Apache, Postfix, Dovecot), Microsoft (Windows, Phone 7, Outlook, Outlook Express, Live, Windows Mail, Office, Office 365, Exchange, Internet Explorer), Mozilla (Thunderbird, Firefox), Nokia (S60, Lumia), Yahoo, and other products, for secure mail, webmail, SMS, IM, web forms, Single-Sign-On, file storage, and other applications.
Expand / CollapseHow can ZSentry help manage information sharing?
This question fits in our larger theme, where ZSentry is used to improve applications and user devices in many areas, in addition to adding end-to-end encryption and HIPAA compliance.

Sharing information is a key benefit of using email, SMS, and Google Apps, for example, but can also be a big problem as we all know. In particular, organizations and individuals want to prevent undesired information sharing and disclosure.

Google Apps itself and other tools in the marketplace offer some solutions to this problem, whereby sharing of documents outside the domain can be restricted, or sending email outside the domain may be prohibited.

These solutions, to use technical terms, are discretionary rather than mandatory. When using email or a cloud service for example, a "restriction" provides no assurance that the information is not being shared in an unintended way. Mandatory control requires encryption, which is effective with the caveat that the customer must control the keys (not the service or cloud provider).

ZSentry provides this higher-level of assurance. With ZSentry, user data is protected by end-to-end encryption, onsite, online, and at rest, where the user and not ZSentry or the provider holds the keys.

ZSentry can then be used effectively to control information sharing when using email, Google Apps or other application, and also add tracking and use data.

This can be useful (for example) with student accounts provided by an educational organization, even if the organization is not interested in encryption or HIPAA. That's because the organization may benefit by ZSentry's higher-level of assurance in protecting information sharing, as well as providing tracking and use data.

ZSentry has been noted for this application, often as the only solution mentioned to better protect information sharing with GMail and Google Apps for example.
This item includes online contributions by the community.
Expand / CollapseCan people read and reply to me, even if they are not a ZSentry user?
Yes, in desktop and mobile devices, with no setup. Your recipient (even if not a ZSentry user) can use the FREE Secure Read & Reply»
Expand / CollapseCan I use ZSentry to send and receive secure SMS?
Yes and, as chosen by you, your ZSentry SMS can also Self-Destruct (Expire), send back a Return Receipt upon delivery, authenticate the recipient, and provide you with a Secure Vault copy. The specific instructions for SMS (texting) are at ZSentry SMS»

Reply: ZSentry also lets you reply securely by SMS or email. Instead of texting back, and be limited by SMS, your recipient (even if not a ZSentry user) can then use FREE Secure Read & Reply»
Expand / CollapseCan I use ZSentry to securely store and receive fax? Can I reply securely?
Yes. The specific instructions for secure fax are at ZSentry Fax»

Reply: ZSentry lets you get out of fax use and reply securely for example by email or SMS (text). And you can also set your reply to Self-Destruct (Expire), send back a Return Receipt upon delivery, authenticate the recipient, and provide you with a Secure Vault copy. Instead of sending another fax, your recipient can then use FREE Secure Read & Reply»
Expand / CollapseCan I use ZSentry to securely store and hear my voicemail and voice files?
Yes. The specific instructions for secure voicemail are at ZSentry Voicemail»

Reply: ZSentry lets you get out of phone use and reply securely for example by email or SMS (text). And you can also set your reply to Self-Destruct (Expire), send back a Return Receipt upon delivery, authenticate the recipient, and provide you with a Secure Vault copy. Instead of calling or leaving another voicemail, your recipient can then use FREE Secure Read & Reply»
Expand / CollapseWhat advantages can ZSentry offer when using cloud solutions?
First, privacy and security. And new functions such as Self-Destruct and Secure Vault, allowing users to do more while keeping costs down. ZSentry also provides seamless integration and more reliability for cloud, desktop, mobile, and web solutions, allowing users to greatly benefit from their integration.

With ZSentry could users can, for example, keep a plaintext copy of their sent emails in local files only, for privacy. They can also mashup with desktop data/services, including Outlook and Excel, which are much easier for corporate setup and dealing with moderate to high mail volume, incoming or outgoing.

ZSentry enables users to securely integrate data from different applications and different sources on the desktop in ways that people can't do so well yet with just cloud solutions, such as in sending secure personalized messages merging each recipient's name and records.

Using ZSentry, this can all be integrated with cloud systems such as Google Apps, GMail, Office 365, and Yahoo, offering redundancy, higher availability, easy access from anywhere, much lower cost (even free), 24/7 maintenance, and other benefits.
Expand / CollapseHow about iPad, iPhone, Android and phone security?
In the current Apple iOS version, iPad and iPhone devices store in keyboard cache files whatever the user types. However, Apple says that the iOS keyboard cache does not store data entered into a password field. All ZSentry services, including ZSentry Mobile and ZSentry App, use password fields to request both the user's ZSentry Usercode and Password, and should not have the user access credentials stored by the iOS.

Typing a secure email using iPad, iPhone, or any another device that has a keyboard cache file, can create a local plaintext copy of the message, even if the application does not store a plaintext copy (in a Sent folder, for example). If those are concerns in your case, we have solutions that may fit your needs; please submit a Support TicketGo
Expand / CollapseCan ZSentry help if my phone or tablet is lost?
ZSentry can help in many ways, even not requiring phone preset.

For example, you can safely keep your ZSentry messages encrypted in the cloud or keep ZSentry Secure Vault messages in your phone, tablet or any device, where every message is individually encrypted and requires your ZSentry two-factor authentication to read.

ZSentry will also self-destruct any messages using end-point authentication that expire, reducing everyone's window of exposure. When you use Secure Quick Reply, no copy is left in your device. When the message uses ZSentry Return Receipt, it automatically sends a notice to the sender with Who, Where, When, What and How information from the device upon reading the message.

With preset, ZSentry is compatible with third-party solutions to provide online access to self-service smartphone security functions, which let users reset a device password, lock a device remotely or wipe data from a device if it is lost or stolen. For more information, please submit a Support TicketGo
Expand / CollapseHow about email continuity? Network failure?
ZSentry is a complement to Microsoft, Google, and other platforms, so that your ZSentry setup can use any or all of them, with redundancy and diversity, and change the mix at any time.

This allows you to easily "route around" and overcome a failure affecting a system or its network. For example, you can use a cell phone to send and receive secure email if your office Internet line is down.

With ZSentry you do not have to choose between desktop, cloud, web, and mobile setups. Read moreGo
Expand / CollapseHow does ZSentry work with Google Apps and GMail? Single-Sign-On?
From the end user's point of view, after setup, ZSentry Single-Sign-On (SSO) is invisible, just as with an installable Google App, albeit without storing PHI in your Google account. The user is logged in to Google Apps, going about a task, and then decides to send a secure email. The user clicks Compose and sees a drop-down list for the 'From' address. The user selects the 'From' address that uses ZSentry, writes the email, then clicks Send. That's all! The email is sent encrypted, securely, with all the ZSentry options. The SSO operation occurs behind the scenes, in-between clicking Send and the email being actually sent. If the user notices anything, it will be the absence of an intermediate login step.

Behind the scenes, when you click Send in Google Apps, your email is protected by ZSentry using encryption and authentication before transmission (by Google-ZSentry server-to-server authenticated SSL/SMTP), and will be delivered encrypted per-message, end-to-end (by ZSentry). You receive ZSentry secure email at your own Inbox (in GMail, Google Apps, or in a Mail Client using your Google account), can read & reply securely, and avoid online breach notification liability.

How this works internally at ZSentry? There are well-known and recognized standards for encryption of email, including ITU-T and IETF X.509/PKI with S/MIME, and PGP with or without PGP/MIME encoding. ZSentry was developed after these standards and improves upon them in both usability and security. ZSentry reduces the requirements in four critical areas, as mentioned in this FAQ (see item "Why is ZSentry secure?").

Thus, from the technical viewpoint, standard encryption technology with the unique ZSentry Sans Target method keeps email safe and HITECH Safe Harbor compliant, sending data between parties as regular email without pre-arranged passwords. Even Google can't read or scan it. It doesn't require installation of any software, which promotes usability, and it even adds functionality such as self-destruct, with message level access control. It's also free for patients and personal use. Price starts at $9.99.
This item includes online contributions by the community.
Expand / CollapseIf I send a ZSentry mail to user@gmail.com, how do they receive it?
This answer is not specific to GMail and applies also if you send a ZSentry mail to user@yahoo.com or any other address.

They receive ZSentry secure email at their own Inbox (in GMail, Google Apps, Yahoo, or in a Mail Client). Both you, the sender, and the recipient can choose how they can read it, within your different roles. Suppose the sender chooses 'Automatic Skin', which is the default. The recipient gets a link to see an encrypted copy in the browser, and may also get a link to read the email directly in a Mail client (including Outlook, Apple Mail), where in both cases the recipient can reply securely with the From address that uses ZSentry. Alternatively, the sender can choose a different Skin and send the whole message encrypted, not just a link.

How does GMail or Yahoo know how to decrypt the message? The link in GMail or Yahoo connects in SSL to zsentry.com where the request is processed according to the sender's delivery request: for example, recipient must login. Or, recipient's mailbox must be authenticated. In each case, the sender may allow reading only until expiration (self-destructing afterward), request a return receipt with Who, Where, When, What, How information, and request other options such as to send back a secure archive copy that does not expire.
This item includes online contributions by the community.
Expand / CollapseDo we need Google Message Encryption?
No. ZSentry does not use Postini, Google Message Encryption, any other add-on, or plugin.

ZSentry makes it simpler and safer for customers, because ZSentry is HIPAA-compliant with or without a HIPAA Business Associate Agreement (see this FAQ), and is also HITECH Safe Harbor compliant.

Even if your current encryption solution is HIPAA compliant, if it is not also HITECH Safe Harbor compliant then your organization is still subject to large fines, breach notification duties, loss of reputation, and can be sued by users in case of a breach.

Furthermore, beware of security solutions that use passwords for security, which is neither usable for the recipient nor secure. ZSentry uses two-factor, strong authentication, without passwords (even though, for familiarity, the second-factor is called ZSentry Password).

ZSentry is already integrated with Google Single-Sign-On and Mail in Web browsers, Mail clients, and ZSentry App. The ZSentry for Google solution provides end-to-end security and usability, with no required Business Associate Agreement to sign, and eliminates (rather than just reduces) breach notification duties, operating in the Safe Harbor condition.
This item includes online contributions by the community.
Expand / CollapseCan Medical Practices use GMail, Google Apps, MS Office 365?
Yes. Google Apps, GMail, MS Office 365 or any email you use, can be HIPAA compliant using ZSentry. There are no add-on, plugins, or changes to the user interface.

For example, ZSentry encrypts all data stored and transmitted via Google Apps, per message and such that Google administrators or anyone breaking into your Google account would never be able to read the PHI. This means HIPAA/HITECH Safe Harbor compliance. You can use Google Apps and GMail also through Outlook, or use ZSentry directly with Outlook. And patients can use GMail + ZSentry without cost to send and receive PHI, using Free Reply choices that you can easily provide to them.

This item includes online contributions by the community.
Expand / CollapseWhere I can find help on using ZSentry for GMail / Google Apps?
Expand / CollapseWhere I can find help on using ZSentry in general?
Please go to ZSentry How-To»
Expand / CollapseHow about Hosted Exchange on the MS Office 365 platform?
ZSentry works in both environments. For example, you can set an Android phone to use Office 365 through Exchange to receive all email and send regular email, while the ZSentry account sends all secure email (and receives no email).
Expand / CollapseDoes the sender always have to select the secure account?
With ZSentry App, ZSentry always sends encrypted. With ZSentry Client, the behavior depends on the Mail client.

For example, Outlook can lock sending to be done by ZSentry as default, as exclusive option, as defined by the user, or as defined by policy (as a function if Subject or recipient, for example). Exchange Server can do the same, but centralized. Google Apps can also be set to send securely by default, or as selected by the user.
Expand / CollapseWhy would some people think that email is hard to encrypt?
Because that's how it has ever been, for more than a generation. Before ZSentry, people thought that secure email was one of those things that you can't really explain to people. It was seen as something that senders and recipients had to see in action, something that they both had to experience.

That has all been solved with the launch of ZSentry, which improves, secures, and aggregates user's services on the desktop, phone, and web browser. Without any service or device changes, ZSentry users can do more — they can send, store, and read secure, HIPAA compliant data on multiple platforms, all at once. User services include email, webmail, SMS, IM, file storage, and single-sign-on. ZSentry works with leading solutions including Google Apps, Outlook, and iPad.
This item includes online contributions by the community.
Roll-out & Use questions
Expand / CollapseWhy is ZSentry easy to use?
You already know how to use ZSentry, all you need to do is one mouse click.There is NO download, NO installation process, NO plugins, NO digital certificates to buy or send, NO changes at all in your system. Zmail ends the encryption / decryption hassle that for more than 15 years has prevented the widespread use of email encryption.
Encrypt with 1-click. You send encrypted Zmail using your own desktop Mail client such as Outlook and Apple Mail, a Cloud app such as Google Apps and GMail for any email address including Yahoo and Hotmail, or the Zmail app using only your web browser. Easy to send, even on first contact.

Decrypt with 1-click. You receive zmail as a regular email message at your current email address at your desktop, webmail, or mobile device, using your current software and service, including Outlook, Mac Mail, Thunderbird, or web mail services such as GMail, AOL, and Yahoo.

Zmail is easy to read. This makes it also easy for you to decide sending a secure email, because you know that any recipient can read it securely, without cost or installation, and (if you allow it) even without login or registration. You can send a secure email on first contact, to anyone.
In summary, senders and recipients can easily use ZSentry to improve, secure, and aggregate their current services, without any changes in the user interfaces. ZSentry works with leading solutions including Google Apps, Outlook, Android, iPhone, and iPad. Protected services include email, webmail, SMS, IM, file storage, and single-sign-on. Improvements include complementary ZSentry functions for document control, delivery, tracking, and auditing, such as Self-Destruct, Return Receipt, Secure Vault, Secure SMS, and Certified Delivery.
Expand / CollapseHow can ZSentry help my workflow?
As you use ZSentry, you can improve business flow and mitigate the regulatory burden facing your organization.

People are concerned about someone leaking confidential messages, password and keys. People also know that, in spite of best efforts, an online server can be attacked and information copied, in a service provider or even in their own secure server. Organizations also have a legal obligation to prevent privacy breaches, and not just for medical records (HIPAA).

There are other reasons, as well. For example, did you ever need to call to see if your email arrived? Do you think that someone could falsely claim that they did not receive your email, say that they sent it at an earlier time, or say that they received it later than they actually did? Are you concerned about email phishing and identity theft?

Today, those problems are recognized as major sources of fraud losses and concern, posing significant challenges to anyone from individuals to large corporations. Those problems are solved by ZSentry Mail. For more, read Encrypt & Self-destructGo
Expand / CollapseWhat can I use ZSentry for?
ZSentry has several modules. For example the Mail module, which is used to provide ZSentry Mail (Zmail) services.

Organizations can use Zmail to protect their business information and also to protect their customers from phishing emails; health care organizations and professionals can use Zmail to protect the confidentiality of private and health information in their email exchange; associations can use Zmail to send secure ballots for their members to vote securely without paying postal mail; law firms can send electronic and scanned documents with Zmail to cut down on FedEx costs and time. To track if their email was actually opened, when, where, and how, Zmail users can easily request a return receipt as a condition for the recipient to decrypt their message. Zmail messages can be further controlled, with release date, expiration date, unforgeable digital signature, and other features.

Varied business processes, from lead generation to online sales and requesting payment, can be done securely in 1-click using your existing email solution or web browser, with no plugin or download, and without requiring new investments, by means of "instant-on" ZModules such as, for example, Secure Mail, Secure Forms, and Secure Vault.
Expand / CollapseDo I need to install ZSentry?
No. ZSentry works using technologies already built into your Web browser and Mail client software, on Windows, Mac OSX, or Linux.

ZSentry is compatible with Outlook, Thunderbird, Mac Mail, Eudora, GMail, Yahoo, AOL, Firefox, Internet Explorer, Safari. There is NO download, NO certificates to install, NO pre-enrollment of recipients, NO password exchange with your recipients.

With nothing to download or learn by your recipients, you can use ZSentry right now to control and protect your email address, your identity online, emails and attachments.
Expand / CollapseWhat if I need to update or change my phone? computer?
ZSentry does not change, store or setup anything in your computer or phone.

If you update an app in your phone that uses ZSentry, the setup for ZSentry should be automatically transferred when you update the app. For example, if you use ZSentry for GMail in your phone, or if you use ZSentry App. Otherwise, you may need to setup the app. There is no download or installation in any case. After the device or app update, just please test and everything should work fine.
Expand / CollapseDo I need to change my domain's DNS MX or SPF record?
Short answer: No. More details below.

A mail exchanger record (MX record) is a type of record in the Domain Name System (DNS) that specifies a mail server responsible for accepting email messages on behalf of your domain. ZSentry does not receive email for your domain. Therefore, there is no change to your domain's MX record.

A Sender Policy Framework (SPF) record is a type of record in the DNS that identifies which mail servers are permitted to send email on behalf of your domain.

ZSentry sends secure email on behalf of your domain. If your domain does not have a SPF record, or the SPF record does not identify the ZSentry mail servers, then your email should receive a "neutral" classification in terms of spam (neither permitted nor denied). The intended result in terms of the SPF specification should be "accept". Therefore, there should be no need to change your domain's SPF record.

However, if desired, you can change your domain's SPF record by adding the following mechanism:
include: zsentry.com
which will include the ZSentry mail servers that can send secure email on behalf of your domain.
Expand / CollapseHow about support for setup, roll-out, and ongoing if needed?
ZSentry provides initial and ongoing support. Please go to ZSentry Signup » for signup and roll-out procedures for organizations and individuals.

For organizations, the roll-out process is usually done in two phases:
  1. Managers: The customer chooses one or two ZSentry Account Managers (ZAM), then their accounts are setup and verified by ZSentry or a partner.
  2. Users:The ZAM provides local support or helps users set up the other accounts, with ZSentry or partner support.
Support includes a detailed Support Center, 24/7 self-management tools including password reset and recovery, Support Ticket submission, and phone support. The support interface is integrated with ZSentry AppGo
Expand / CollapseHow can I see the encrypted ZSentry message?
The answer depends on sender choices. If the sender used the Automatic Skin (default), after you click to read and your identity is authenticated (as chosen by the sender), then click "Original". The encrypted message will be shown to you, as it was sent. If the sender used the ZSENTRY Skin (set in the ZSentry Dashboard or Task Code), you will see the encrypted message directly in your Inbox and will then decrypt it through ZSentry App (requires login).

For example, a typical encrypted message would look as follows:
This page shows the message as received. It is protected by encryption and
matches exactly the message that was sent.

WARNING: Unauthorized access or use of this message are monitored and may
subject violators to criminal and/or civil action.

 ----v3.1------------------------BEGIN_ZSentry_Mail--------------------------
 =Fs7v1iQxI4N/uji7M4Y6vIGq6uzZFWjY8HMRQjseJd74hkgFCJmCx4it8IXlMLogkz/11kDCLYy
 +Hzhbjx840J3fGo4uT/cGHy8fhtpsVu3ptTB7IDGVt4psOndcEBLDuWIInXivKttn2LpS0j6cPS8
 IKcbrSaccBNJMDr1MdASsytdiH2H4MNk6OqdusD6f9ncMg3Jv9o8j4R7L4H4jDYjzPioo9cpEBro
 c68co5apI2jEDwVyIX9PBocUruKCaMeRzI4w4aRKshiKbPmn4havOsacxf6itJcOOiALfBb77euB
 +gygKfyKP9X1gQGc5J01/waSmT/0x=
 =mDzppBu2EIWg8zPtDFC2l2DxAFe5r/oPoPbv4yfvCkMpdgW9AikDb9qGtGRk1f8Fh/nnTx3YdOg
 LvxBzorultUiM9o565MMfMOwahjSRFQUB2o1ZqYuMX/HoLEpaQSHoslRJkJhzCTo9jSpCftok4U6
 FY3HusxekpkH9cZueqmiju5/Mml73T2CuwjYtkcQvFXgZRyxDrt4V6KXgxZnd3y5ds1CX7vdT7ND
 VtZokjFrMZSB4qyub/pTvxKZtHHPGr5pwu+ZFMNFFhIQJdxK4zGCJvC83pcFI4Hx4LnOUgEvoCjg
 qzHnwBzIozLSc3N7gzkisnDNkIqENz1z9L/RcUM2k4xnRMQ6Yrt8ViNptPur7860vhLCnVphgqI8
 momdh26l3FhwQS7C4Qc7SL870W+JalY8o62qBKUAXdycD1c2H1OhuPaZLfO2WddsyEXpMfNc5Eii
 WjJZhmtrn83VcM+virqmz4IW7Nx+ep6EM43fsfEC+oqtKxzzCS4GZsPirPPUfNKp/1xH0Tt/uB7s
 27jGW+KrM4BEYFdZZKhfjycgTnkYl0aVViQ--njqfHsnxHuymvHR/mxOiddmalhRuGmbSjzgRRmd
 +jd/AaNSJoC4IqD1jLOV/B359VOZzUU8oAkdnTXwK9wQIyTi+s16dT1vjDcmI2aO9mQxO0wH5W3u
 1b1oO+sr5oJA2FX63n5RzFx5GnVjCfVVF51gK0/UknfoSTj03vI/0QxPTtU6yFfNQUnkgAbx+PtS
 Dg6g6ewnC82HiHnpmCYkYRse0AdJPH+mOAhb1TccW4pEjTxkCRWhZzP4aAaQCskAZSDKaeFCDRog
 r7NEO0GY1+N91Z77C1ROY2MG6LxG5MB4sVW2wp8pb1eGQxupcnibUBaXmRrYOKrauocxyVKDAZRw
 lyi+tad8Cx8ndN2ZqAlqE72pTtTLf9x6yfWWF1qsDeCjOIRgyI6RO3Vhg3e8zdd3W9ICQZYT6pP0
 ul9CXiOFLq+dm302JXBFK5nW2NvR1gGU36Vi6F8MbWlpaWG4DOYMXAgbRzOUvJy5azK6gk+Td5CD
 DXxrt7MLiEiYxG81W8Un0IGqo0Tfv8CYz/i82gc3eTOy46kPvMaOaL/q8z1/hZ51xua3/Z8wvGbH
 ocKhj/jmOKNC2HahB8MsfYUE19NtercBRdOUJQg3J/ctHc36VmpXMmKhLiDPuXUQPn21up8zrbUA
 sLBdjGNXiZsCcmH3UsAGkYCZ0hZ1ylkTIN3m2kLAOZBVPvTmWfFiJtwoFInZMkovZFomjKrdighQ
 4YIqQq2Q1z/qOtph2JoBTPPT2KdNgQCTtqzqPfxJhZthZ6GydCX3pWQpMsTLAnA28dyy6wmqt0cO
 +AId1+htNDmV1tUalu7V0Vnxo8Nt3vLDsORprck9GLLVvbcY/6OQj4y+EXuhhuNe22Cxz632Lv0i
 CymS8SB7asd+3M98l7GqtZU9FZVVcPCFfD32kdWarzAMW4vxsT10ZkJE8XaHCvr0UZl72fEaGRXi
 E+lagrC9OL5wv7KA0yic5phIFD2hhvXqFt6sq/duNCfRs0iOc6UccojPVbz0EPtSOsgwRGL1lfOL
 AfsupuDOWCor8KpBAULjEZ3+c9hXRVusPXSLhUpfnC3c50BkAs6nGkq4Su5f85Jhh9x1zTKFKQqK
 JzOR+hBRdi7J64Co0XHjQr4ZQa0FpTLmqFt+e/Z6xgfkrNcUd45U9pXMa6EakioVVp8ySkyBUKmv
 M3Opds6NKLERUCnTpoIYH3ziXVPwLAamRvNqiiZHmvsRsJoFGgbc//zqHWwe+M1bqW49PYt3ucw8
 nPjuY5lWjMTxAwLiWGuBJBsZF0a0PCrLDdhHcr8KvZp4ErQHXAmuVHTV4kM9DZJmRDMs7mMLZ2iX
 srohEx3HgPpmJN6y1F/WiVALMd82V8Sbi4EIyQ4TJsTMKGnc3ryHqXZNSeWnPlif6p0hqKMkOizn
 6B+Znupme1wErBlmtHcDADiJvHriAfDhN2PHoM6DNO1fXK8SAG+pf5vsCJrMUHqwkiovvgPVBLvh
 Vrs1InZ6iqcZBvmkOUfqniIyloTXuDThu7TX0vr4RUEb01EG9gCMMktepaHZjkK4qitunGjyOzzv
 2Ny0K0q6AyW/9EwKTi+pVqlG51fmsUvLV+KJ2+QSLqbbSmbuxgTdh7xfdOcVgkq+M4NL62qhFW3I
 Ea161XdthVcOgo89qtyh880XGsZnbhez1qHij3lpLk1p7PzVV5maeTtfcKx7u/B9qfxGI68g/A+7
 5gw+XfvxM/wP/m+9LwgJyE2L2PZWmeg0CBuozG41lrIZsFgtkPYGzHVzuYR/STDYuhce+EE+mJiK
 mD6Edc6JUKqyQXy1L1tju8v4p+g1B3p0+NkHBXxfV/Es39xJhELKHa1qyuicV17wWsw2YU7oUVHc
 823VaWNTTV/FyvP2klh7tYzrZ88QichRagSOPkke6DYzHHgqfxKXuA9L8/elQWEOkyomCNMgC0dK
 evLb4vRFh9/1GUbVZbX21usiAfzsBxvtzguNge8CVdvPPQMnyHATmYHpyzl0TBAhSZcKjLKr5KaI
 Sq7ozlzglJzK5GzYULcPdHQe86aPqOTtufNUlPZBTwQv9rS6Gb/V/PdOGUb6bBTpyK/SGBs6jC0M
 0IFkwoRfwkXCC0KhtR8+ZhhmriL9vY3kyf+s83YhhGc24c8q+0+8vUxkALqcTs4nMsbELtmRnhV2
 KDROhBsMainE0rPsVHx2cz+oiKkBF3bEJUvog05arbvHIdIy8+eTG7/+CjRHduPoPozVa/Dt7eMf
 oNwK=
 ---------------------------------END_ZSentry_Mail---------------------------
Expand / CollapseHow does ZSentry fit in?
For organizations, ZSentry brings certified HIPAA, ARRA, HITECH Safe Harbor, and regulatory compliance with no changes, albeit with more capability and improved services for employees and users.

For individual accounts, for example an independent physician or an investment manager, ZSentry brings the same benefits without requiring external IT support.

For users, it is free and hassle-free to read, store, and reply securely. With no pre-arranged passwords, changes, setup, signup, or added cost, ZSentry broadly improves the utility, security, mobility, and usability of end-user devices for desktop and phones in any OS.

ZSentry fits in-between what organizations and users already have, and lets everyone get more value from what they have. For example, you can send secure email and SMS (texting) messages using your desktop, cloud service, or phone, automatically secured with no concern that recipients will have password, technology, or device issues in any platform, while ensuring HIPAA and regulatory protection to send, read, store and reply.

ZSentry connects productivity apps and services across every platform.
  • Supported Services: (may need setup) email, webmail, web forms, SMS (texting), voicemail, calendar, IM, file storage, and more.
  • Added Utility: includes secure vault, delivery confirmation, digital signature, notarization, message life-cycle control, single-sign-on, unified communications, and more.
  • No Changes: For example, you receive secure email at your usual Inbox, with nothing routed through ZSentry, for an email address that you already have. You use your current software, ISP or webmail provider. ZSentry does not receive email and does not host email addresses for users. There is nothing to download or install, no plugins or add-ons.
  • Standard Interfaces: ZSentry uses HTTPS at port 443 and/or SSL/SMTP at port 465 (safer, faster). ZSentry can be used in clients, in the cloud, servers, and chips. ZSentry is already seamlessly integrated with leading IT solutions such as GMail, Google Apps, Outlook, Android, iPhone, iPad, Exchange server, and Postfix. ZSentry is based on things that people already understand.
  • End-to-end Encryption & Compliance: ZSentry Sans Target technology enables instant-on regulatory compliance where your data is protected by end-to-end encryption, onsite, online, and at rest. The user and not ZSentry or a provider holds the keys. Enable HIPAA and HITECH Safe Harbor compliance with or without a Business Associate Agreement.
  • Foolproof: Organizations can use ZSentry for secure communication with no concern that users will have password, technology, or device issues in any platform. In case of need, ZSentry includes a 24/7 auditing and self-management system, with remote file access monitoring and password reset.
  • Usability & Mobility: ZSentry provides safe encrypt and decrypt with 1-click, secure first-contact and reply without registration, two-factor authentication, anti-spoofing, per-message encryption, return receipt, self-destruct, data loss protection, secure archive and other document-control functionality, in desktop, cloud and mobile platforms.
Expand / CollapseWhat does ZSentry Premium do for me?
NMA ZSentry Premium adds regulatory compliance, including HIPAA & HITECH Safe Harbor, mobility, functionality and usability, without changing your current solutions and providers. You can send securely to anyone with an email address, and receive their secure reply on first contact without requiring registration. ZSentry Premium may also be branded and customized. Read more»
Expand / CollapseWhat is Secure Quick Reply?
This is a ZSentry service offered by senders to recipients, providing Free Reply choices. All choices enable free, secure, first-contact messages and reply. Price: No cost.

There is no catch: we offer Free Reply choices to allow the recipients of paid ZSentry Premium messages to read and reply to them without cost, just like postal mail with a SASE (self-addressed, self-stamped envelope), but with higher security.

This service is offered using the ZSentry Basic terms of service, enabling cost-free end-to-end encryption, decryption, and authentication for personal use. To prevent abuse and spam using the free service, ZSentry Basic users can send a limited number of secure email Zmail messages a day. There is no limitation for reading.
Expand / CollapseTell me more about ZSentry
NMA ZSentry is a technology and cross-platform service for secure, usable, and seamless exchange of information for email, webmail, SMS (texting), IM and other services. ZSentry provides standards-based identity and secure services with unique benefits including:
  • already integrated with Mail and Single Sign On for GMail, Google Apps, Outlook, iPhone, Android and other systems;
  • does not change email, or how anyone uses email, and yet it makes email better, allaying concerns of impersonation fraud (identity theft), spam and phishing, eavesdropping, and unintended disclosure;
  • uniquely allows Mail clients & Cloud apps to send and read secure email with zero added user interfaces (nothing to learn);
  • additionally, has an easy-to-use, standards-based SSL user interface for Web browsers;
  • enables Encrypt and Decrypt with 1-click in all modes of operation;
  • empowers users with unique security and usability advantages of Mail clients over Web browsers in terms of SSL implementation;
  • provides seamless Desktop, Web, and Mobile service for on-demand and/or on-site security services including email, webmail, SMS, IM, sales, billing, and archiving;
  • uses unforgeable (cryptographic) two-factor authentication and anti-spoofing protection;
  • presents a familiar username/password authentication interface that uniquely protects passwords against dictionary attack and does not store passwords or usernames anywhere;
  • complies with HIPAA, HITECH, HITECH Safe Harbor, FERPA, FFIEC, GLBA, SOX, U.S. State Security Breach Notification Laws and ISO 17799 regulations;
  • no required HIPAA Business Associate Agreement to sign (although a BAA can be signed if desired);
  • works with any Web browser and Mail client, including Outlook and Apple Mail;
  • integrated with GMail, Google Apps, and other Cloud apps for sending and receiving secure email directly;
  • when sending and receiving secure messages such as email, webmail, SMS, or IM, there is no download, no installation process, no plugins, no digital certificates to buy, publish or send, and no changes at all in client systems;
  • less Total Cost of Ownership;
  • there are no Java programs or ActiveX controls to trust and update in client systems;
  • allows users to send a secure message with a single mouse click on first contact, to anyone, anywhere;
  • does not burden recipients with anything more than a single mouse click;
  • works with Windows, Mac and Linux.
ZSentry works as a distributed middleware between your existing infrastructure and your existing applications and desktop systems, enhancing functionality, usability, and security without changing the end-points.
Expand / CollapseWhy some people think that email is hard to encrypt?
Because that's how it has ever been, for more than a generation. Secure email was one of those things that you couldn't really explain to people. It was something that senders and recipients had to see in action, something that they both had to experience, be trained for and make sure was compatible with their OS and devices.

That has all been solved with the launch of ZSentry, which improves, secures, and aggregates user's services on the desktop, phone, and web browser for any OS. Without any service changes, users can send, store, and read secure, HIPAA compliant data on multiple platforms, all at once. User services include email, webmail, SMS, IM, file storage, and single-sign-on. ZSentry is already integrated with leading solutions including GMail, Google Apps, Outlook, Android, iPhone, and iPad.
Expand / CollapseHow does ZSentry do it?
Simplicity is the key used by ZSentry to get both security and usability.

ZSentry is a distributed middleware platform. It works in-between what you already have, and that's why ZSentry does not change what you have and lets you get more value from what you have. There is nothing to install either, and setup is optional. ZSentry also includes a 24/7 auditing and self-management system.

With ZSentry, you get more value from what you have. You receive secure email at your usual Inbox, with nothing routed through ZSentry, for an email address that you already have. You use your current software, mail clients, cloud clients, ISP or webmail provider, and devices. ZSentry does not receive email and does not host email addresses for users. There is nothing to download or install, no plugins or add-ons. There is no need to change your user interface. There is no POP or IMAP server use.

ZSentry does not change your recipients' or anyone else's email or system either. Everyone keeps what they have, no new investments, no training, no change. Organizations and power-users can also use ZSentry to directly interface with office applications such as Word, and server applications using .NET, PHP, and other languages.
Expand / CollapseHow long may the recipient view the message?
The sender controls how long the recipient may view the message. This is controlled technically by session control, self-destruct, and by legally effective copyright expiration. Even if the recipient takes a picture of the message, use after expiration is a copyright violation. Read moreGo

For email continuity, if the recipient uses ZSentry Client (e.g., with Outlook) the message is decrypted in the mail client and can be stored decrypted for viewing at any time. Again, the sender's copyright restrictions apply but this is likely not relevant within the same organization, for example.
Expand / CollapseHow fast is ZSentry?
Fast! The usual processing time is less than a second. Just as with regular emails, network delays may, however, result in a slower performance at your location.

This item includes online contributions by the community.
Expand / CollapseHow to submit a question?
More FAQs and Help:
- click Quick Start Guide»
- click Support Center»

Main Technical Notes
Overview   Key Features   ZSentry App   ZSentry Client   API   Smart IT   SAML & SSO
  Security   Usability   HIPAA & HITECH   Experience   Why ZSentry?   Red Flags   SUMMARY

Development and © by NMA

Trademarks and Copyrights as described in our Legal Statement. We protect Your Privacy.