Products and Solutions
 EMA® Mail
 EMA® Cyber Defense
 EMA® Print
 EMA® Scan
 EMA® File
 EMA® Voice
EMA® for SAP Solutions
 SAP Metadata
 SAP Live Migration
 SAP Scan
 S/4 HANA Relief
ARTEC SMART Integration Tools
Firegate VPN
eDiscovery Solutions
Case Management
VSTOR® Vault
 Product Details
 Object Storage
ARTEC Cloud Solutions
 Cloud Models
 Managed Services
 Microsoft 365
Mailserver migration
Microsoft 365 tips
EMA® is Easy to Use
Data Formats
Protect Your Investment
Comprehensive Archiving
Storage Technology
Data Security Concept
Protection Against Cyber Attacks
Big Data - Knowledge is Power
Software Architecture
Single Sign-On
Folder Synchronization
User Access
Full-Text Search
Backup and Recovery
ANA Server
Trusted EMA®
Hot Standby
Digital Signatures
Attributes and Metadata
Department archives/Linking
Federated Search
Retroactive Archiving
WAN Synchronization
EMA® DeDup Server
EMA® App
Outlook extension
Good to Know
Legally Compliant Archiving
Protecting Personal Information
Why WORM Is No Solution
Problems with certifications
Stubbing - (Not) A Solution
Who Uses EMA®?
Why Bother with Archiving
Benefits of an Appliance
Dealing with private e-mails
Laws and Regulations
Overview of the Most Important Regulations
General Data Protection Regulation (DSGVO)
Right to be "forgotten"
Events and Webinars
Press Releases
Press Review
Partner Program
Partner Portal
ARTEC Promotional Program
ARTEC Expert Network
Services & Support
Consulting Services
Technical Consulting
Software Development
Software Subscription & Warranty
Product Support
Company History
Green responsibility
Where to Find Us
Job Openings
Terms and Conditions
Protected Trademarks and Patents
Information for Investors
Privacy Policy
Corporate Information

Data Security Concept

High-Grade Security Out of the Box

Keeping sensitive, company-internal information secure is one of the most important requirements of every IT infrastructure.

As a result, our solutions provide support for all modern IT security technologies, and reliably protect all archived information from malicious access by unauthorized third parties.

We drafted out EMA® as a preconfigured appliance because this closed-down architecture provides a very high level of security. The system uses a hardened, proprietary operating system. Unlike entirely software-based solutions, EMA does not require the installation of client-side applications, which could potentially be abused as attack vectors or to maliciously manipulate archived data.

Additionally, EMA does not store e-mail messages and documents in plain text. Contents of the archived are automatically securely encrypted (AES encryption). Access to the archive itself can optionally be limited to an SSL-encrypted connection for additional security.

Due to an innovative security model designed to adapt to each EMA appliance, archived data can only be read and restored by the system that created the same EMA hardware that created the archive. No matter which storage system your data ultimately ends up on, our security model ensures that it is always protected against malicious access by unauthorized parties.

These measures effectively prevent malicious access to archived information. Together, they back your organization in terms of legal and operational compliance.