Product Information

TrustTone Stealth

Vendor:

TrustTone Communications

  • SC Magazine Best Buy

Price:

starts at $1,750 (50 users)

Quick Read

Strengths: Excellent performance, easy to use and deploy.

Weaknesses: None that we found.

Verdict: Simple, effective, secure. This is just what this doctor ordered. We make it our Best Buy.

Rating Breakdown

SC Lab Reviews

Reviews from our expert team

Features:
Documentation:
Value for Money:
Performance:
Support:
Ease of Use:
5/5

Summary

TrustTone Stealth provides an email application layer encryption gateway deployed as an inline proxy. It sits between the Exchange Server and the internet, or, for SMTP systems, between the email application and the email server. The appliance is provided either as a physical or virtual appliance, and capacity ranges from 50 to 25,000 users. The product can be extended - usually using load balancing - to cover almost any number of users. The encryption algorithm is AES-256 and RSA-2048.

No client-side application is required, either by the users or the recipients. The message can be an attachment to the email or it can be stored on the appliance and retrieved through a link in the message. If the link approach is used - for example, if the received attachment is likely to be stripped - the decrypted message is presented as an HTML page. Recipients must register with the sender the first time the tool is used. The organization can brand these messages fully to fit a particular purpose. Alternatively, the first message can contain a random password that the recipient must change on first use.

Installation begins with the usual network static management IP configuration. After this, everything is done from the web interface. The administrative console is first-rate in its simplicity and comprehensive choices. One impressive piece of the implementation using the console is a network map showing where addresses need to go, what needs to be configured, and other important aspects, such as domains.

Once the system is deployed and certificates installed, the system can be branded for the organization, and policies can be added. Policies can be very granular, encrypting based on message contents, or the provided policy can be used. Policies also can be based on regular expressions.

The administrator's manual is well-laid out with many screen shots and diagrams, and support covers everything necessary for deployment and ongoing management at an industry standard rate of 20 percent of the product price after the first year, which is included. At a price of under $2,000 for a 50-user product, the value is excellent.