Deltagon Blog

Take a look at our blog on security of e-communications and e-services. You can also order up-to-date publications straight to your email.

Subscribe to the blog


Encrypting your internal e-mail traffic – what is it about?

E-mail should not be used for the exchange of confidential data such as personal information without encryption. But why..

email messaging secure e-mail Blog data security internal email traffic


Deltagon attending ASIS Europe 2018 event in Rotterdam

Welcome to visit our booth at the exhibition of ASIS Europe 2018 on April at the Postillion Convention Center WTC in..



Internal approval process – electronically and securely

An employee sends a bill for monthly expenses. A manager must accept the invoice, after which it will be paid. The..

Information security Blog approval process


Secure data transfer – what to consider

In group communications such as project groups, there is often a need to distribute information and files electronically...

confidential information Blog data security data transfer


Secure handling of sensitive data

Does your company gather sensitive personal data with electronic forms? Have you ever thought where this information is..

data protection electronic forms secure workspace Blog data security sensitive data sensitive information


Encrypt emails with your company's own look and feel

E-mail encryption is often perceived difficult. The expression itself can bring up images of encryption keys, passwords,..

Articles e-mail security email encryption secure e-mail Blog


State Security Networks Group Finland acquires the entire ownership of Deltagon

Deltagon’s services will continue to be offered as part of the of the State Security Networks Group Finland. The acquisition..

Deltagon announcement News Bulletin


Share files by using a mobile device

Do you find it important to have your files secured, but easily shareable with both internal and external stakeholders?..

file sharing Information sharing Blog mobile


Prevent data leaks - give instructions instead of prohibitions

Data breaches can occur due to many reasons. Some may be caused by external threats such as hackers gaining access to the..

Articles confidential information email DLP Blog data leak


Have a Happy and Safe Christmas!

We would like to take this opportunity to say a big “Thank You” to all our customers and partners for the year 2017. Our..

Christmas Christmas lunch Events News

CTA -banneri

Lorem ipsum dolor sit amet, consectueter adipiscing elit. Sed posure interdum sem. Quisque ligula eros ullamcorper quis, lacinia quis faicilis sed sapien. Mauris varius diam vitae arcu. Sed arcu lectus auctor vitae,

Contact us

Do you have any questions? Do you want more information or a more detailed presentation? Please leave your contact information and we’ll get back to you.