How does it work?
One click. Complete protection. The software encrypts e-mail messages with attachments and provides recipients with the verification of the sender's identity. If the messages you send need to remain confidential, but the current solution does not meet your expectations, try Cypherdog. Our software is user-friendly while maintaining the highest message security level.
You can use Cypherdog on the most popular browsers and soon e-mail client manager platforms, such as Outlook and Thunderbird. With one click, you can use Cypherdog and encrypt e-mail messages.
Threats in cyberspace
E-mail is one of the most popular electronic communication channels. Like most digital services, it is vulnerable to cyberattacks, which may result in unwanted access to your mailbox and disclosure of confidential information. In the event of unauthorized use of the compromised e-mail box, message recipients cannot confirm the sender's identity.
Cypherdog is a comprehensive solution to both threats. On the one hand, it ensures message encryption (hiding its content from unauthorized users); on the other, it allows the recipient to confirm the sender's identity.
Friendly user interface
Cypherdog software focuses on simplicity and ease of use. During installation, the program will ask for the password to your private key and will allow you to make a copy of it (use a USB drive or print a copy of the key on a piece of paper). After the installation is complete, you can encrypt messages and send them via your e-mail immediately.
What will you achieve using Cypherdog?
Cypherdog works as a desktop application on all modern operating systems, such as Windows, macOS, and Linux. You can install the application in one of the three browsers (Chrome, Firefox, Edge) or as an additional module on the platforms, such as Outlook and Thunderbird.
Two modules of the application
a plug installed in a browser
or e-mail native client
Cypherdog Key Manager
an application installed in the operating system, available from the sidebar
The "Plugin" module is responsible for interaction with the user, ordering the encryption and decryption of messages. In contrast, the "Key Manager" module supervises access to your private key and physically performs the cryptographic operations.
Only processes authorized in the "Key Manager" module can use your private key. It means that the browser and other approved methods will never possess your private key and only be able to use it to encrypt and decrypt messages. Such an architecture of our solution ensures complete separation of a customer's e-mail from your private key.
The system architecture
Cypherdog uses proven cryptographic algorithms, such as the 3072-bit RSA key or the SHA512 hash function. In addition, the system architecture is ready for the challenges of the future. For example, it considers the inclusion of external suppliers in the user identity verification process, its use in blockchain systems or the introduction of hardware wallet solutions.
(after trial period)
& Trial 14 days
|Encryption of content in emails||-||✓||✓|
|Encryption of attachments in emails||-||✓||✓|
|Decryption of content and attachment of emails & attachments||✓||✓||✓|
|Admin panel for user management||-||-||✓|
|Backup of private key to file (file on USB device/QR code)||✓||✓||-|
|Backup of private key on company servers||-||-||✓|
|One license for single user||✓||✓||-|
|One license for multiple users||-||-||✓|
|Advanced support & training||-||✓||✓|
|Webclient plugin||available (O365, Google Suite and others)|
|Browsers||Microsoft Edge, Mozilla Firefox (in progress), Google Chrome|
|Standalone client plugin (in progress)||Microsoft Oultook, Mozilla Thunderbird|
|Operating systems||Windows, Linux, Mac OS|
Choose the best product for your business