Roka Password
Roka Password service is to encrypt critical corporate emails. A feature of this service is the possibility of authenticating users to guarantee to receive an email in a confidential and encrypted manner by the recipient. This service also can identify keywords in the content of the subject or the content of the email. If the email contains keywords, it will be encrypted automatically. (Keywords are pre-defined by users of each organization)
Another item of this service (if you select an email) is the possibility of manual encryption for users. It is also possible to encrypt internally without any dependence on service outside the organization, and all encryption security processes can be done inside the organization. Given that most cryptographic services in the world are in the form of a cloud and our country is under sanctions, this feature will be practical
Users will be assured that emails sent to external domains are also encrypted. For example, if you send a message on Gmail servers, Gmail cannot view the contents of the email using Roka Password service.
Roka Password Email Encryption Service
About Us
Features of Roka Password Encryption Email Service
Essential Features of Roka Email Encryption:
1. Secure PDF protocol
3. Initiated Encryption Protocol
5. DKIM protocol
2. Webmail protocol
4. PGP protocol
Secure PDF Protocol
The messages were sent by the sender along with their attachments and converted into an encrypted PDF file. The password is hashed so that it cannot be cracked or decrypted. Users define a password for themselves with authentication in Roka system, and then all downloaded files (which have now converted to PDF files) can only be decrypted and read with this password.
WebMail Protocol
Here, Roka device sends the encrypted messages and a notification with the subject of the encrypted email to the recipient. After receiving this message, the recipient enters the Roka system, and after validation, the encrypted message is decrypted by the system and displayed to him/her.
Initiated Encryption Protocol
There are several ways to encrypt emails. For example, the user can define a word or some words on the service, and if the title or content of the email contains one of these words, the email will be encrypted automatically. It is also possible to define specific recipients, and senders on the service email will encrypt if you want to send or receive emails from these people. If the word or person (as sender and receiver) is not defined, the user can encrypt manually.
Hiding email sender address:
In Roka Password service, besides encrypting emails, users can also hide their username as an email sender. The organization can also send all emails from different parts of the organization under a single name.
PGP protocol
Pretty Good Privacy protocol:
In this protocol, a text that contains fully comprehensible content is converted to encrypted text (unreadable data). The content is encrypted with a random key, known as a session key. This key is made randomly using symmetric cryptography. At this stage, this key reaches the receiver using asymmetric algorithm technology. The receiver can then access the information using the same key and encrypted text.
Have more
Questions?
We are online and ready to answer.
Ask your question, we will answer as soon as possible.