Comodo Digital Signatures Protect Contents

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

<strong>Jersey City, N.J. &mdash; May 28</strong><br />When e-mailed documents are needed later as legal proof, the person producing them needs to be able to swear that they have not been altered. Comodo Secure Email Pro offers a way to protect the contents of an e-mail from alteration in transit.<br /><br />E-mail&#39;s ease and utility, which allows internal users, partners and customers to communicate effectively, also puts confidential information in reach of those who want to profit from it. To a moderately skilled person, inside the organization or out, unsecured e-mail is easy to read, impersonate and alter, and is not much different from a postcard written in pencil.<br /><br />Digital signatures on e-mail documents represent a one-way hash (encryption) of the message content that uses the sender&#39;s public and private key pair. This process creates a “signature” that only the sender&#39;s public key can decrypt. The recipient, using the sender&#39;s public key, can then validate the sender as well as the integrity of message contents. The sender&#39;s digital signature will be un-trusted by the recipient&#39;s e-mail program if either the message content or sender&#39;s digital certificate are invalid. <br /><br />The <a href=” target=”_blank”>Secure Email Pro</a> signing procedure automates the digital signature process and attaches the “signature” to the out-going document to be e-mailed. CSE Pro also checks and validates incoming signed documents using the reverse process. <br /><br />Because the computer tenaciously pairs the digital signature to one saved version of the document, it is nearly impossible to repudiate a digitally signed document.<br /><br />Comodo Secure Email Pro is an install-and-forget software application that can automatically digitally sign all outgoing messages without the need to pre-exchange passwords or public certificates. For further protection, e-mail documents can also be encrypted, making them unintelligible to anyone but the intended recipient.<br />

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>