About
Our base offer is standards-oriented email hosting with full support for SMTP, IMAP4, POP3 as well webmail. No proprietary protocols or clients, ever. For all your needs, you get first-hand assistance from real postmasters maintaining the system. We do not outsource our support. We price email based on actual usage, not address space. It's your domain and all addresses on it are at your disposal at no extra cost. Everyone in the tech business plays the advertising card at some point. We've played ours already. No ads here ever, not even our own. Going off-line for a while? Setup a simple auto-responder so people do not expect an immediate answer. As we use standard email protocols, any standard email client with non-obsolete secure communication protocols will work. A copy of once-received messages in your Inbox can be automatically forwarded to your secondary addresses. Up to 25 of them.
|
About
Proton Mail is the simplest way to protect your communications with built-in end-to-end encryption. Prevent data breaches, stay compliant with regulations like GDPR and HIPAA, and earn client trust. Protected by Swiss privacy laws and trusted by over 50,000 businesses, Proton Mail keeps your business data confidential and under your control. With Proton Mail and Calendar, your team can securely manage their inbox and schedule, while your organization maintains a professional presence with support for custom email domains and personalized branding. And with the Easy Switch tool, migrating from Google or Microsoft is seamless, no IT expertise required.
|
About
Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Email hosting platform for companies wanting to consolidate all their email addresses and domains
|
Audience
Anyone who needs a secure email address with built-in end-to-end encryption
|
Audience
Businesses, governments, and consumers that need an endpoint encryption solution
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
$9 per month
Free Version
Free Trial
|
Pricing
$6.99/user/month
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationMigadu
Switzerland
www.migadu.com
|
Company InformationProton AG
Founded: 2014
Switzerland
proton.me/business/mail
|
Company InformationTrend Micro
Founded: 1988
United States
www.trendmicro.com
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
||||||
|
|
||||||
Categories |
Categories |
Categories |
||||
Calendar Features
Calendar Sync
Collaboration Tools
Multi-Device Support
Reminders
Room Booking
Scheduling
Task Manaagement
Email Management Features
Data Recovery
Email Archiving
Email Deletion
Email Discovery
Email Monitoring
Email Recall
Queue Manager
Response Management
Routing
Shared Inboxes
Signature Management
Spam Blocker
Whitelisting / Blacklisting
Encryption Features
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
|
Encryption Features
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
|
|||||
Integrations
Apple Mail
Authy
BIMA
Comarch EDI
Comarch Mobile Sales Force
Comarch Wealth Management
Gmail
Mail Backup X
Microsoft Outlook
Postbox
|
Integrations
Apple Mail
Authy
BIMA
Comarch EDI
Comarch Mobile Sales Force
Comarch Wealth Management
Gmail
Mail Backup X
Microsoft Outlook
Postbox
|
Integrations
Apple Mail
Authy
BIMA
Comarch EDI
Comarch Mobile Sales Force
Comarch Wealth Management
Gmail
Mail Backup X
Microsoft Outlook
Postbox
|
||||
|
|
|