gpg4o Description

Protect the privacy of your electronic correspondence. Securely send confidential email to Microsoft®, Outlook®, 2010/2013/2016 with gpg4o®. This program was developed by Giegerich & Partner and is based on OpenPGP. It is one of the most popular and secure cryptographic methods worldwide. gpg4o® can be used for both private and business purposes. Giegerich & Partner's gpg4o® guarantees that your electronic correspondence is protected by mail encryption. gpg4o®, allows integration of one the most popular and secure email encryption systems into Microsoft Outlook®, 2010, Microsoft Outlook®, 2013, Microfost Outlook 2016, and for Microsoft Outlook®. You can keep your email private with an easy installation and intuitive user experience. You will always have the most current features with the gpg4o®, which ensures that you have more security and a better user experience.

Pricing

Pricing Starts At:
$93 one-time payment
Free Version:
Yes
Free Trial:
Yes

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Giegerich & Partner
Year Founded:
1993
Headquarters:
Germany
Website:
www.giepa.de/

Media

Recommended Products
Convert CentOS to Red Hat Enterprise Linux on Azure Icon
Convert CentOS to Red Hat Enterprise Linux on Azure

Streamline your CentOS migration journey by moving workloads to Red Hat Enterprise Linux on Azure.

CentOS Linux is experiencing End of Life on June 30th, leading to potential gaps in security. With Red Hat Enterprise Linux on Azure, IT Teams can streamline the migration of CentOS Linux workloads knowing they don’t have to compromise on security, scalability, or reliability, and can simplify management. Securely accelerate innovation and unlock a competitive edge with an enterprise-grade Linux on Azure.

Product Details

Platforms
Windows
Type of Training
Documentation
Live Online
Webinars
Customer Support
Phone Support
Online

gpg4o Features and Options

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting