Select Page

Email Encryption Retarus Email Encryption

Rely on top-quality service for encryption of your email communication. Retarus Email Encryption enables you to comply with applicable data protection regulations, safeguard valuable know-how and protect confidential information.

Encrypted & Confidential

Unencrypted emails pose a major security risk. They can be covertly read at any time during their transmission—just like a postcard. Retarus Email Encryption protects the confidentiality of your communications. That’s because this encryption system protects both personal data and your valuable company know-how. It also ensures compliance with the applicable data protection guidelines.


Encryption via S/MIME, PGP and OpenPGP ensures that all requirements of the established standards are fully covered.

You don’t need to install any hardware or software to use Retarus Email Encryption.


Thanks to a Web portal, you can even exchange encrypted emails with communication partners who do not using their own encryption solution. Our solution offers the seamless exchange of confidential information.

Your Benefits



You can rest assured that your confidential information will remain confidential. Retarus Email Encryption encrypts your messages, including all attachments, and processes them in Retarus data centers.


Plan the costs for your users in advance. The transparent monthly calculation is based on the number of keys or licenses currently in use.


Let Retarus Email Encryption take care of central key management and minimize administrative tasks.


Grow with Retarus Email Encryption. You can change the number of defined users at any time.


Send and receive encrypted emails on the go. Retarus Email Encryption is device-independent, which means you can also use it on your mobile devices.


Comply with internal and external regulations at all times. Retarus Email Encryption is fully automated and encrypts messages in accordance with your specifications, sending them securely to recipients. In conjunction with Enterprise Email Archive you’ll also benefit from tamper-proof, audit-compliant archiving.

IT Security Made in Europe

Made in Europe

How Good Is Good Enough for You?

Find out now! See what Retarus Email Encryption can do for you to meet your email encryption requirements. Below is a checklist of the main points.
Encryption via S/MIME, PGP and OpenPGP
100% compliance with established standards
Full support for the X.509 v3 standard, including self-signed certificates
Complex confidentiality thanks to complete encryption of all messages and attachments
Senders can be uniquely identified based on the automatic signature of outgoing messages
100% encrypted communication thanks to the Web portal. This also includes recipients without their own encryption solution.
Secure, confidential communication “in the final stretch” with a VPN connection to Retarus data centers
Increased IT department capacity for other tasks; implementation is easy and requires no installation of hardware or software
Central management of all internal and external keys
Suitable for use with all SMTP-based email systems (including Microsoft Exchange, HCL Notes Domino)
Users send emails from their usual email client
No training costs
Webmailer Login
Webmailer Login
Webmailer Inbox
Webmailer Inbox
Webmailer New Email
Webmailer New E-Mail

Retarus Email Encryption Features at a Glance


Emails are identified in Retarus data centers, fully encrypted using customer-specific rules, signed as needed and sent securely to the recipient. This means that the email and all of its file attachments are encrypted.

  • Compatible with any SMTP-based email system (e.g. Microsoft 365, Google Workspace, Microsoft Exchange, HCL Notes Domino)
  • Complete key management by Retarus: create, distribute, and manage all keys
  • Easy adoption of existing PKIs (public key infrastructures)
  • Gateway-based S/MIME and PGP encryption
  • Full support of the X.509 v3 standard including own certificates
  • Full support of the OpenPGP standard
  • Automatic or user-initiated signature of outgoing emails
  • Ability to include internal company encryption policies
  • Centralized and flexible set of rules for emails that need to be signed
  • Filters for viruses and spam despite encryption
  • TLS connection to the Retarus Enterprise Cloud
  • Optional VPN connection for secure and confidential communication over the "last mile"
  • Web email portal or password-protected PDF for encrypted communication with recipients without their own encryption solution
  • Company-wide standardized solution that can be expanded as needed
  • No software and hardware installation required
  • User Synchronization for Encryption (USE) feature automates management of encryption users, groups, associated certificates/keys, as well as organization-specific policies.
Email Encryption

Email Encryption

Easily Meet Compliance Requirements.

With Retarus Email Archive you can archive your email correspondence tamper-proof and in real-time. Highly-secure Retarus data centers ensure that communication remains unalterable and protected thanks to the four-eyes-principal preventing unauthorized access. And emails can be retrieved in seconds, even with high archive volumes. This enables you to reliably ensure compliance with the most stringent regulations and international data protection guidelines, such as the EU General Data Protection Regulation (GDPR).

Retarus Email Encryption ensures your business communication always remains confidential. Whether encryption-based using customary standards or password-based via secure webmailer. The sophisticated encryption system protects not only your valuable company expertise, but your personal data as well. Ease of use and automated encryption management included.

Retarus Data Loss Prevention ensures that confidential information, such as customer, production, or design data does not end up somewhere outside of your company’s network. Externally addressed emails are checked systematically using pre-defined criteria and withheld in case of doubt. Furthermore, specific rules regarding permitted recipients can be defined at the mailbox level.

Contact an Expert Now