Trial Today Get in touch
Egress Switch Gateway customers benefit from integrated email encryption security designed to align with business processes and boost efficiency

Egress Switch Gateway customers benefit from integrated email encryption security designed to align with business processes and boost efficiency

May 30, 2013
Share this story:

London – May 2013 – Egress Switch Gateway, the market-leading cloud and on-premise email encryption service from Egress Software Technologies, seamlessly integrates with existing business processes to help organisations satisfy regulatory compliance, enhance efficiency and remain in control of the information they share with third parties.

The business will not be denied

Recent market research carried out by Egress Software Technologies has confirmed the growing business need to share information electronically with clients and third parties outside accredited networks ( This transition to digital communication has increased the necessity for securing both internal and external email; however Egress’ statistics demonstrate that simply having a security policy is not enough. With 100% of those surveyed admitting that a lack of security would not prevent them from sharing information, employees will continue to seek the most convenient method to meeting deadlines and targets – even if that risks substantial fines from the Information Commissioner’s Office.

Comprehensive security made easy

Switch Gateway provides an easy-to-use yet sophisticated solution to securing email without restricting business processes. Altering the point of encryption from desktop to integrate with existing platforms and infrastructure at the gateway, Switch Gateway fits smoothly alongside anti-virus, anti-spam, archiving and content filtering products, including cloud-based email filtering, to provide a comprehensive email security solution.

Removing the need for additional client software, Gateway offers an unobtrusive approach to remaining Data Protection Act (DPA) compliant. Policy-based encryption works to uphold an organisation’s information security policy, with Switch Gateway fully configurable to scan email content for key words or terms that indicate encryption is necessary. Consequently, while users can tag outbound email for encryption, an employee oversight no longer has to result in a data breach. Additionally, Gateway also offers configurable security authentication layers dependent on the classification of the data being sent, with the ability to query existing external data sources – preventing users from accidentally sending sensitive material to the wrong recipient.

Switch Gateway has also been intuitively designed to complement work practices. Domain-based routing, for example specifically routing email from government domains, improves worker efficiency by removing the need for end-users to understand the complex nature of communication to secure/unsecure networks. Moreover, not only does Switch Gateway seamlessly handle this in the background, but it also integrates with existing auditing and case/document management systems.

“Switch Gateway works to effectively remove barriers to data security, while offering a comprehensive solution to remaining DPA compliant,” explains Egress Software Technologies COO Neil Larkins. “At Egress, we’re aware that if encryption solutions aren’t simple to implement, then it’s likely they will be bypassed to improve efficiency.

“That’s why we’ve designed Switch Gateway to offer a fully configurable service,” Larkins continues. “For example, not only does Switch Gateway inspect email based on an individual organisation’s data security policy, it can also be used for messages being sent from a variety of platforms, including mobile devices. This is particularly relevant with the advent of Bring Your Own Device and increasing amounts of work being conducted on mobile devices.”

For more information on Egress Switch Gateway, click here.

About Egress Software Technologies

Egress Software Technologies is a leading provider of email and file encryption services, offering innovative on-demand data security to enable businesses to share confidential information with third parties.

Leveraging a unique combination of on-premise and hosted cloud infrastructure, patented key management delivers real-time ‘follow the data’ control to ensure that only authorised recipients access confidential information. This next generation level of control and real-time auditing not only protects our clients from accidental loss, but also prevents third parties mishandling personal or sensitive data.

Used by public and private sector organisations around the world, integrated desktop and mobile applications ensure easy-to-use software, designed to aid compliance and streamline user workflow.

footer_cesg_2018_258x100 footer_skyhigh_89x100 NATO Common Criteria footer_bsi_iso_178x100