• Čeština
  • English

Talkey products

TALKEY

TALKEY PREMIUM

TALKEY ENTERPRISE

SERVER

Encryption of e-mail content, including its attachments *

Decryption of e-mail content, including its attachments *

Searching in encrypted emails

Setting the time period for decrypting e-mail *

Setting the number of times the email can be opened *

Automatic e-mail destruction after X seconds *

Disable replies and forward encrypted email*

Disable e-mail decryption on mobile devices

Destruction of the sent e-mail on the recipient's side *

Deniable encryption (message hidden in a fake message)

Files (encrypting/decrypting files and folders)

Definitive deletion of files and folders

Possibility of higher security using a token

Central user management

Setting user permissions

Central backup and key management

Hierarchy settings according to organizational structure

Release management support

Active Directory connection

* can be used on mobile devices

FREE OF CHARGE

INSTALL

5 EUR / monthly

Buy

PRICE OFFER

CONTACT US
TALKEY

Encryption of e-mail content, including its attachments *

Decryption of e-mail content, including its attachments *

* can be used on mobile devices

FREE OF CHARGE

INSTALL
TALKEY PREMIUM

Encryption of e-mail content, including its attachments *

Decryption of e-mail content, including its attachments *

Searching in encrypted emails

Setting the time period for decrypting e-mail *

Setting the number of times the email can be opened *

Automatic e-mail destruction after X seconds *

Disable replies and forward encrypted email*

Disable e-mail decryption on mobile devices

Destruction of the sent e-mail on the recipient’s side *

Denyable encryption (message hidden in a fake message)

Files (encrypting/decrypting files and folders)

Definitive deletion of files and foldersk

Possibility of higher security using a token

* can be used on mobile devices

5 EUR / monthly

Buy
TALKEY ENTERPRISE SERVER

Encryption of e-mail content, including its attachments *

Decryption of e-mail content, including its attachments *

Searching in encrypted emails

Setting the time period for decrypting e-mail *

Setting the number of times the email can be opened *

Automatic e-mail destruction after X seconds *

Disable replies and forward encrypted email*

Disable e-mail decryption on mobile devices

Destruction of the sent e-mail on the recipient’s side *

Denyable encryption (message hidden in a fake message)

Files (encrypting/decrypting files and folders)

Definitive deletion of files and foldersk

Possibility of higher security using a token

Central user management

Setting user permissions

Central backup and key management

Hierarchy settings according to organizational structure

Release management support

Active Directory connection

* can be used on mobile devices

PRICE OFFER

CONTACT US