Deltagon Blog

Take a look at our blog on security of e-communications and e-services. You can also order up-to-date publications straight to your email.

Subscribe

Blog

Encrypting your internal e-mail traffic – what is it about?

E-mail should not be used for the exchange of confidential data such as personal information without encryption. But why..

Blog internal email traffic data security email messaging secure e-mail

Events

Deltagon attending ASIS Europe 2018 event in Rotterdam

Welcome to visit our booth at the exhibition of ASIS Europe 2018 on April at the Postillion Convention Center WTC in..

Events

Blog

Internal approval process – electronically and securely

An employee sends a bill for monthly expenses. A manager must accept the invoice, after which it will be paid. The..

Blog Information security approval process

Blog

Secure data transfer – what to consider

In group communications such as project groups, there is often a need to distribute information and files electronically...

Blog data transfer confidential information data security

Blog

Secure handling of sensitive data

Does your company gather sensitive personal data with electronic forms? Have you ever thought where this information is..

Blog sensitive data sensitive information electronic forms secure workspace data protection data security

Blog

Encrypt emails with your company's own look and feel

E-mail encryption is often perceived difficult. The expression itself can bring up images of encryption keys, passwords,..

Articles email encryption Blog secure e-mail e-mail security

News

State Security Networks Group Finland acquires the entire ownership of Deltagon

Deltagon’s services will continue to be offered as part of the of the State Security Networks Group Finland. The acquisition..

announcement Deltagon News Bulletin

Blog

Share files by using a mobile device

Do you find it important to have your files secured, but easily shareable with both internal and external stakeholders?..

Blog file sharing Information sharing mobile

Blog

Prevent data leaks - give instructions instead of prohibitions

Data breaches can occur due to many reasons. Some may be caused by external threats such as hackers gaining access to the..

Articles Blog email DLP data leak confidential information

News

Have a Happy and Safe Christmas!

We would like to take this opportunity to say a big “Thank You” to all our customers and partners for the year 2017. Our..

News Events Christmas lunch Christmas

CTA -banneri

Lorem ipsum dolor sit amet, consectueter adipiscing elit. Sed posure interdum sem. Quisque ligula eros ullamcorper quis, lacinia quis faicilis sed sapien. Mauris varius diam vitae arcu. Sed arcu lectus auctor vitae,

Contact us

Do you have any questions? Do you want more information or a more detailed presentation? Please leave your contact information and we’ll get back to you.