No client-side application is required, either by the users or the recipients. The message can be an attachment to the email or it can be stored on the appliance and retrieved through a link in the message. If the link approach is used - for example, if the received attachment is likely to be stripped - the decrypted message is presented as an HTML page. Recipients must register with the sender the first time the tool is used. The organization can brand these messages fully to fit a particular purpose. Alternatively, the first message can contain a random password that the recipient must change on first use.
Installation begins with the usual network static management IP configuration. After this, everything is done from the web interface. The administrative console is first-rate in its simplicity and comprehensive choices. One impressive piece of the implementation using the console is a network map showing where addresses need to go, what needs to be configured, and other important aspects, such as domains.
Once the system is deployed and certificates installed, the system can be branded for the organization, and policies can be added. Policies can be very granular, encrypting based on message contents, or the provided policy can be used. Policies also can be based on regular expressions.
The administrator's manual is well-laid out with many screen shots and diagrams, and support covers everything necessary for deployment and ongoing management at an industry standard rate of 20 percent of the product price after the first year, which is included. At a price of under $2,000 for a 50-user product, the value is excellent.