Voltage Security - Encryption that Just Works.

Voltage SecureMail Application Edition
Data-centric security for applications and websites that generate, store, and use email

An email-based approval workflow

Voltage Products
Voltage SecureMail
SecureMail Application Edition Contact us for pricing! Get a Quote!



Voltage SecureMail provides data-centric security for email and unstructured data in files. Volt- age SecureMail Application Edition extends these security capabilities to protect email messages and attachments that are sent and received by business applications, portals, and websites that contain information intended only for recipients.

Businesses are using Voltage SecureMail Application Edition to benefit from broader reaching, more comprehensive data protection and compliance for their application driven business pro- cesses. Until now internal application email could not be systematically secured, end-to-end.

Business email is not always sent from person-to-person, for example, by an employee using an email client to an external recipient reading it from an email client. Email is also used extensively by applications. Applications typically generate, store, and use emails in the context of a business workflow or process. Just like email sent between people, email that is sent and read from ap- plications also contains sensitive information that needs to be protected.

Organizations trying to comply with data protection and privacy regulations (HIPAA, HITECH, PCI, and SOX) should not only encrypt email sent between people, they should also be concerned with email sent to and from applications.

There are many applications that send and receive email with sensitive information intended only for recipients which should not be disclosed to outsiders. Examples include:

  • Internal approval workflows: multi-step workflows involving requests, approvals, and denials (ensures authenticity).
  • Inbound web form submissions: information submitted by customers, patients, or partners via online forms (e.g., claim forms).
  • Scheduled reports: reports emailed to business users that contain confidential metrics and KPIs about business performance.
  • Credential provisioning: account information created and emailed to users by a provisioning system (e.g., temporary authorization codes, PINs, passwords).
  • Password management: password reset messages that contain temporary passwords emailed to users by a website or application.
  • Fax to email: faxes containing sensitive information such as social security numbers or credit card numbers sent to inboxes as email attachments (e.g., PDF files).
  • Enterprise collaboration tools: email communications between members of collaboration websites and communities.


  • Protects application email like invoices, statements, approvals, workflows, CRM, collaboration systems, credentials, and more.
  • Data-centric approach that persistently protects email data wherever it goes, making it available under tight policy control only when needed.
  • Simplest user experience, using any client on the desktop, mobile, and the web. Compatible with all current browsers, both desktop and mobile.
  • Cuts complexity and costs by integrating encryption without changing email architectures, rerouting email flows, or integrating with SDKs.
  • Proven infrastructure that’s secure, scalable, and manageable, with low operational costs.

Key Features:


A Unique Solution

Past approaches of not encrypting internal application email or using a TLS gateway or outbound SMTP gateway to encrypt and decrypt application emails at the network edge are insufficient. These approaches do not address the security gaps where data is vulnerable as it travels internally or from applications to outgoing TLS or SMTP gateways. These approaches also leave data vulnerable while at rest in ap- plications, mail servers, and desktops. Data is at risk before the email is encrypted and after it is decrypted – even within your network.

Applications may also require data protection for emails exchanged outside the organization, for example, with customers or suppliers. It is often impractical to leverage the email backbone infrastructure to get end-to-end email protection. Voltage SecureMail Application Edition can protect the data in the email as it leaves the application, before it transits the email backbone, and keeps it protected until the recipient opens the message.

Larger enterprises have hundreds of business applications that send and receive emails containing private and sensitive data. They are subject to compliance and privacy regulations such as HIPAA, HITECH, PCI, and SOX, and they must be kept safe from potential breaches which could result in fines and reputation damage. Voltage SecureMail Application Edition provides the end-to-end protection and regulation compliance to these emails.

Integrating Voltage SecureMail with Applications

Voltage SecureMail Application Edition gives email-enabled applications two ways to exchange protected information, via a REST-style web service or over SMTP.

Voltage SecureMail Application Edition provides a simple yet powerful REST-style web service. This API allows applications to interact with Voltage SecureMail’s Identity-Based Encryption (IBE) over HTTPS. When this interface is invoked, encryption and decryption services will be performed for the application. Integrating via web services enables a data-centric approach to protecting application emails at rest and in motion - without changes to email architectures or email routing.

In addition, Voltage SecureMail Application Edition includes an optional gateway interface. Applications can send emails over SMTP into the Voltage SecureMail gateway, and the gateway will take care of encryption and decryption. In this case the application will not require modifi- cation. In fact, the application will not be aware that the email is being encrypted, but the email is not encrypted end-to-end as it is with the Web Service.

Voltage SecureMail Application Edition is designed to minimize the complexity and cost associated with integrating encryption and security into applications. Both interfaces are designed with simplicity in mind. The web services API can be called from any modern application pro- gramming language today, since nearly all support calls to web services. For those applications that cannot be modified or the application is already sending emails over SMTP, the secure mail gateway provides a security layer around emails into and out of an application.

An email-based approval workflow

Voltage SecureMail Architecture

Voltage SecureMail Application Edition leverages the established Voltage SecureMail infrastructure. It employs Voltage’s proven encryption technologies and innovations that enable global scale deployments that are simple to manage and administer. Senders and receivers benefit from a simple user interface that makes secure messaging as easy and familiar as standard email communication.

Voltage SecureMail is designed to provide end-to-end security for email, while helping to achieve and maintain regulatory compliance. It integrates with existing infrastructure without disrupting existing email services or business processes, and it can be rapidly deployed and scaled up for even the largest organizations. Server components can be deployed on a single hardened appliance, or distributed to meet scale and availability requirements. Voltage SecureMail can be employed without any client software, or with software on the user’s desktop and mobile devices.

Voltage SecureMail Identity-based Encryption (IBE) offers an elegant architecture that is lowest cost to manage. Stateless key management and on-demand key generation offers 60-80% lower on-going operational costs compared to competing solutions that force enterprises to manage keys or messages. Because keys can be generated on-demand, IBE also eliminates the risk of losing access to data, and simpli- fies disaster recovery and e-discovery.

Voltage SecureMail has broad and flexible administration features. It provides robust centralized management, logging, and reporting. It integrates with existing systems for authentication, journaling, and archiving. Operational management is simplified through stateless key management, which eliminates stored encryption keys.


PDF File
Download the Voltage SecureMail Application Edition Data Sheet (PDF).


Voltage Products
Voltage SecureMail
SecureMail Application Edition Contact us for pricing! Get a Quote!