Do your servers support an encrypted connection (TLS)?


Our filter system supports all connections that can be encrypted with SSL/TLS. The prerequisite is that the mail server with which the connection is established also supports TLS!


You may also be interested in...
Introduction to encrypted communication and why it is important

Encrypted communication is not only highly relevant in a digital world, it is absolutely necessary to protect yourself and your data from third parties. In this article, we explain what it means, show benefits, and provide tips on how to protect sensitive information.

Exploring the Variances Between Email Encryption and Email Authentication

Unlock the secrets of email security! Dive into our comprehensive guide on the crucial roles of email encryption and authentication, their mechanisms, benefits, and best practices.

Security Considerations for Cloud Services

Cloud services offer notable advantages such as scalability, cost-efficiency and accessibility, but also raise significant security concerns that cannot be overlooked. As organizations migrate their operations to the cloud, ensuring the security of sensitive data and resources becomes a priority. While the cloud offers unmatched convenience and flexibility, it also brings new challenges that organizations must address comprehensively.

Building a Secure IT Network: Basic Steps for a Resilient Digital Landscape

In this article, we look at the basic actions needed to build a resilient and strong IT network to help you build a cybersecurity strategy.

The importance of regular security audits for your IT infrastructure

In this article, we tackle the critical issue of regular security audits and discuss why these audits are essential, their benefits, and how they work.

The effects of the GDPR on IT security

This article looks at the impact of the GDPR on IT security and explains its role in strengthening data protection safeguards, reshaping cybersecurity strategies and promoting a culture of data protection.

The growing threat of IoT security risks

From smart thermostats and wearable fitness trackers to industrial sensors and autonomous vehicles, IoT devices have permeated every aspect of our lives. This connectivity offers unprecedented convenience and efficiency, but also opens the door to a multitude of security vulnerabilities.

Shorter SSL Lifespan – What You Need to Know

Discover why SSL/TLS certificates are now expiring faster than ever—transforming from years to just 47 days! Learn how this shift boosts security, mandates automation, and what it means for web users and developers alike.

Exploring Homomorphic Encryption: Computing on Encrypted Data Without Decryption

Discover how homomorphic encryption allows secure computations on encrypted data without decryption, revolutionizing data privacy and security across various industries. Explore its benefits, applications, and challenges in our detailed article.