In which country are my e-mails stored?


None of your desired e-mails will be stored on one of our servers, unless the target mail server is not reachable. All data from archiving, logging and quarantine are explicitly stored on servers within the EU.

You may also be interested in...
Privacy by design: protecting privacy and benefits for companies

Privacy by design is an approach that integrates data protection into the development process of products and services right from the start. This not only strengthens user trust, but also minimizes the risk of data breaches. However, implementing privacy by design can present financial and technical challenges. Read here to find out more about this concept.

Data Anonymization Techniques for GDPR Compliance

Explore the realm of GDPR compliance through effective data anonymization techniques. Uncover the importance, understanding, and various methods like pseudonymization, data masking, and more to safeguard privacy.

Privacy by Design: Enhancing Data Protection in Your Organization

Discover how to safeguard your business by integrating Privacy by Design into your systems. Learn why it's crucial and how to implement it effectively to protect data and comply with regulations.

Introducing europeanWF: Revolutionary DNS Web Filtering for Comprehensive Network Protection

Market launch of europeanWF, the cloud-based DNS web filter for effective protection of your IT network

Cloud-Based DNS Web Filters: Enhancing Network Security Against Cyber Threats

Protect your network from the dangers of the digital world with cloud-based DNS web filters. Learn how they detect and block malicious websites and why an effective web filter is paramount. Discover how cloud-based DNS web filters work and how they collect and update threat data in real time, filter malicious websites, and analyze DNS traffic to block suspicious requests.

Effective email management for data protection and security

Email management: Best practices to optimize security and efficiency. Learn how to prevent data leaks and hacking attacks and ensure compliance. A strong email policy and employee training are critical.

Ransomware: trends, consequences and prevention

The threat of ransomware is enormous in a connected and digitized world. This article looks at the evolution, attacker motivation, and impact of ransomware attacks. It also examines current ransomware trends and techniques.

How to protect your company from insider threats

Insider threats are another major threat to organizations, in addition to external threats. In this article, you will learn what exactly insider threats are, why they arise and how you can protect your company against them.

Telecommuting and cyber security: The changing world of work and its challenges

Working from home: opportunities and challenges of teleworking. The rise of telecommuting offers many benefits, but it also brings new cybersecurity risks and challenges. Learn how companies and employees can overcome these challenges.