Encrypted email for companies | Frama

Test licence

Test our innovative software solutions with numerous features now, free of charge and without obligation.

Encrypted email made easy - verifiable and data protection compliant!

Encrypted and secure sending of confidential information and sensitive data via email

Email is the most widely used communication method of written business communication.

The advantages of emails are obvious

  • Sending and receiving almost in real-time
  • Cost-effective
  • Available nationwide
  • Location-independent
  • Simple operation, user-friendly
  • Multifunctional (electronic filing and administration)
  • Environmentally friendly
  • Multimedia (sending of various file formats)
  • Etc.

Frama demonstrates how to use the Encrypt with Frama RMail - Video

Take a look at the gallery

We can improve your email security in terms of encryption.

E-Mail-Verschlüsselung | Frama
E-Mail-Verschlüsselung | Frama
E-Mail-Verschlüsselung | Frama

Highest email security thanks to state-of-the-art encryption technologies

You can achieve the best possible protection for your email communication with end-to-end encryption (AES 256bit). With this method, the entire content of the email is encrypted and can only be read in plain text with the corresponding key. Only end-to-end encryption remains encrypted in the recipient's mailbox and is suitable for secure e-mailing of particularly confidential and sensitive data such as personal data or company data such as tax documents. The minimum requirement for "normal business communication" is TLS encryption (Transport Layser Securtiy) with minimum level 1.2. With this encryption method, the transport route (tunnel), but not the content of the message, is protected from unauthorised access, thus guaranteeing the confidentiality of the data on the transmission route between the various interfaces and mail servers. If the recipient is not able to receive e-mails via TLS 1.2, we automatically deliver the message using end-to-end encryption. We call this Dynamic Encryption.

E-Mail-Verschlüsselung | Frama

Registered email is valid as evidence of email transmission

We go one step further: With our digital solutions, you can use the email as evidence for your email communication at any time thanks to an auditable proof of delivery. The proof of delivery contains all necessary data - involved email addresses, time stamp, encryption methodology, delivery data and server log files - of the respective transaction and represents a legally valid proof of compliance. Proof of delivery is completely protected against manipulation and tampering, can be verified and authenticated at any time, and also contains a digitally signed and encrypted version of your original email message.

Email is a practical all-rounder

Efficient and cost-effective - and it is impossible to imagine our everyday business life without it. Unfortunately, email has a major weak point: without additional security measures such as encryption technologies, it can easily be intercepted, in the worst case, manipulated by third parties on its transmission path from sender to recipient. This means for you a serious security risk for business secrets and customer data. However, many users feel that email encryption is too time-consuming, too expensive and too complicated. Without these protective measures, email remains the number one target for cyber attacks. This applies not only to received emails, but also to those you send!

With our digital solutions for more email security, you can easily and simply encrypt all your outgoing email communication and thus guarantee the confidentiality, authenticity and integrity of your business and customer data.

More email security in just 2 mouse clicks

With our digital solutions for secure email encryption, you can send encrypted emails incl. attachments easily and conveniently from your existing email programme such as Microsoft 365 or even Google Gmail. The combination with our unique and patented proof of delivery is the almost best encrypted email service worldwide. Did you know that with the proof of delivery you can even prove the secure transmission forensically afterwards? Perfect as auditable proof of data protection and compliance.


Your encrypted email is received like an ordinary email, but can only be opened and read by the intended recipient. No prior technical knowledge, registration or additional software installation is required on the part of the recipient. Sending encrypted email and receiving takes place immediately and without complicated key or certificate exchange. Even better: Enable your recipients to reply in encrypted form. By clicking on the Secure Reply link, your communication partner can reply to your e-mail in encrypted form in a very simple and uncomplicated way.

Encrypt-all or automatic email encryption through filter rules

With the Encrypt-all option, you can automate the encryption - using TLS or end-to-end encryption, depending on your preference - of all outgoing emails. Your employees do not have to take decision related to the data protection thanks to the encryption method. Another option is to define filter rules for the automatic email encryption of outgoing emails. In this case, the email is scanned for certain keywords in the subject line and in the text and sent either via TLS or E2E encryption according to the defined filter rule. Intelligent filter rules always make the right decision even in hectic situations and can be configured individually.

 

Don't hesitate any longer and take the security of your business email communication into your own hands. We will be happy to show you how to make your digital business communication more secure and advise you personally and individually.

Frequently asked questions

E-mail encryption using RMail works either via TLS (Transport Layer Security) or end-to-end encryption. With TLS, the transport route of the e-mail is encrypted, but not the content of the e-mail, as is the case with E2E encryption.

There are 3 different types of email encryption that are frequently used. Transport encryption (TLS encryption: Transport Layer Security), end-to-end encryption (E2E encryption) and key exchange via S/MIME, PGP or OpenGPG. Key exchange is probably the most complicated procedure for the user, as private and public keys are required for encryption and decryption, which must be created and acquired in advance by means of external temporary certificates.

Click on the button "Send enrolled" in your mail programme, select the option "Encryption" and click on "Send". It's that easy!

According to the GDPR, all emails containing personal data must be encrypted. In addition, sensitive data such as bank details, login data or tax documents should not be sent unencrypted.

With RMail, you can see whether emails have been encrypted by the identifying banner in the email, which also offers the option for an encrypted reply by the recipient. Other services often indicate encryption by a lock symbol in the subject of the email.

RMail offers two different technologies or versions: TLS (forced) and SecurePDF. If TLS is selected as the standard technology, SecurePDF is automatically used if end-to-end TLS encryption is not possible.

Furthermore, with the RPX function, RMail offers you the encryption of documents and e-mails with an individual password. In this way you can ensure that the documents sent can only be read by the persons to whom you have given the password (DataLossPrevention).

No - the content and attachments of your messages are embedded exclusively in encrypted form in the proofs of delivery, which are located in your local email archive. We do not store any data, emails or attachments.

RMail uses encryption technology that complies with the data protection recommendations of "strong encryption". This means that sensitive information can be sent with RMail in a DSGVO-compliant manner.

Yes. RMail allows your recipients to reply in encrypted form as well. With a single click on the so-called SecureReply, you enable your recipient to reply encrypted to your e-mail via web browser. No registration or additional software is required for this.