H-MAIL
Overview
H-MAIL
Product Features
H-MAIL
Resources
H-MAIL
Requirements

H-MAIL: EMAIL ENCRIPTION MADE EASY

H-Mail is a zero-footprint portable secure email client that combines strong (military-level) encryption of mailboxes and address books with the ability to manage the users' personal digital identities. All private information associated to the email accounts is kept encrypted even while in use and is made available only internally to the H-Mail application. Malware and viruses are unable to successfully attack and replicate through the application’s context, which is obfuscated and virtualized at the byte code level.

H-Mail provides full POP3, SMTP, S/MIME support, secure authentication, multi-account management, message and address book import tools from Microsoft® Outlook and Outlook Express, encrypted PC archiving for backup/restore, rule-based message filtering and Bayesian spam filtering. Users can digitally signing/verify emails with any PKCS11 compliant device and even generate their own self-signed digital certificates (in standard X509 v.3 format) to send/receive encrypted e-mails and digitally sign messages.

  • Zero-footprint (no prior installation, special drivers or admin privileges required to run on the host PC)
  • Available as a software-only downloadable application or integrated with secure USB tokens, including devices equipped with Smart Card (e.g. Safenet, Crealogix) and biometric sensor (e.g. Imation)
  • Fully integrated with the H-Login module, providing active protections against all major attack vectors exploited by financial malware, including keystroke/mouse logging, screen capture and code injection.
  • Application files and resources are kept inside of encrypted containers, never exposed to attackers and loaded in memory only at run time after full integrity checks.
  • Mailbox and address book are kept permanently encrypted at the data block level AES256.
  • Supports POP3, SMTP, S/MIME for digital signing and verification of messages, secure authenti-cation, multi-account management.
  • Message and address book import tools from Microsoft® Outlook and Outlook Express.
  • User interface localized in English, French, German, Italian. Additional languages available upon request.
  • (Optional) User Interface customized based on corporate branding guidelines.
  • (Optional) Integrated with the centralized cloud-based management, allowing to receive Proactive Security Updates from the H-Server and to block access to the H-Browser resources and data.

Browse our list of product briefings,
white papers and research reports.

Register by filling out the information in the form below.
The download link will be sent to your email.





Learn about the latest malware attacks
and view educational videos on how the
H-Apps can help secure your business.

Sing up for a FREE DEMO of the H-Apps
of your choice.

System Requirements

Processor IBM PC or compatible with Intel base processors
Intel Pentium 4 800-MHz or higher
(Intel Core 2 Duo or higher recommended)
Memory 512 megabytes (MB) of RAM (2GB recommended)
Operating System Microsoft® Windows® XP SP3 or higher
Microsoft® Windows® VISTA all versions
Microsoft® Windows® 7 all versions
Mac OSX 10.6.x and higher
Display 1024 x 768 resolution, 65 536 colors minimum
(32-bit color recommended)
mTan & OOB Methods

mTan & OOB Methods more

Social Engineering & Interface Manipulation

Social Engineering & Interface Manipulation more

Static Code Dumping & Patching

Static Code Dumping & Patching more

Screen Capturing

Screen Capturing more

PDF Form Spoofing

PDF Form Spoofing more

Dynamic Code Dumping And Patching

Attack whereby malware uses DLL-injection more

Window Overlay and Event Emulation

Window Overlay and Event Emulation more

Keystroke and Event Emulation

Common attack scenario which uses the keystroke and mouse event more

Session Hijacking

How a Hacker can hijack an active browsing session more

Keystroke and Mouse Logging

How to retrieve personal and transaction information more