Deltagon Blog

Take a look at our blog on security of e-communications and e-services. You can also order up-to-date publications straight to your email.

Subscribe

Blog

GDPR elevates the information society into a new era

We are approaching the last moments before the EU's General Data Protection Regulation (GDPR) will be applied on 25th of..

GDPR General Data Protection Regulation Articles data protection data protection regulation personal data Blog

Blog

Encrypt emails with your company's own look and feel

E-mail encryption is often perceived difficult. The expression itself can bring up images of encryption keys, passwords,..

Articles e-mail security email encryption secure e-mail Blog

Blog

Prevent data leaks - give instructions instead of prohibitions

Data breaches can occur due to many reasons. Some may be caused by external threats such as hackers gaining access to the..

Articles confidential information email DLP Blog data leak

Blog

Security of electronic signatures

Electronic signature is a modern method of signing documents, but how trusted can it be?

Articles Blog electronic signature digital signature audit trail strong identification

Blog

What file formats does electronic signature support?

As far as electronic signatures are concerned, PDFs are the most commonly signed documents. However, there are often..

Articles Blog electronic signature

Blog

What is meant by email DLP?

We at Deltagon often talk about how e-mail DLP can help prevent data leaks and follow the fulfillment of information..

Articles email encryption Information security email DLP Blog information security policy data leak

Blog

How to improve business with information security

Companies want to stay ahead of their competitors but to be at the fore front means constant business development, such..

email Articles Information security email DLP confidential data Blog electronic signature digital signature

Blog

Independent and user friendly channel for whistleblowing

Reporting internal misconduct, or even suspicions of such, may be high threshold for an employee. If the report can’t be..

Articles Blog whistle blowing identity whistleblower

Blog

Can confidential information be sent to a mobile phone?

Lab results must be delivered quickly to a client or new user needs to get a password to a system. How can messages that..

email Articles confidential information email encryption Blog

Blog

What benefits does the Deltagon email encryption solution offer in the O365 environment?

Nowadays many companies, both in the private and public sector, that use cloud services, are in a need of a tool for..

Articles confidential information email encryption Blog O365 cloud services

CTA -banneri

Lorem ipsum dolor sit amet, consectueter adipiscing elit. Sed posure interdum sem. Quisque ligula eros ullamcorper quis, lacinia quis faicilis sed sapien. Mauris varius diam vitae arcu. Sed arcu lectus auctor vitae,

Contact us

Do you have any questions? Do you want more information or a more detailed presentation? Please leave your contact information and we’ll get back to you.