Products and Solutions
 EMA® Mail
 EMA® Cyber Defense
 EMA® Print
 EMA® Scan
 EMA® File
 EMA® Voice
EMA® for SAP Solutions
 SAP Metadata
 SAP Live Migration
 SAP Scan
 S/4 HANA Relief
ARTEC SMART Integration Tools
Firegate VPN
eDiscovery Solutions
Case Management
VSTOR® Vault
 Product Details
 Object Storage
ARTEC Cloud Solutions
 Cloud Models
 Managed Services
 Microsoft 365
Mailserver migration
Microsoft 365 tips
EMA® is Easy to Use
Data Formats
Protect Your Investment
Comprehensive Archiving
Storage Technology
Data Security Concept
Protection Against Cyber Attacks
Big Data - Knowledge is Power
Software Architecture
Single Sign-On
Folder Synchronization
User Access
Full-Text Search
Backup and Recovery
ANA Server
Trusted EMA®
Hot Standby
Digital Signatures
Attributes and Metadata
Department archives/Linking
Federated Search
Retroactive Archiving
WAN Synchronization
EMA® DeDup Server
EMA® App
Outlook extension
Good to Know
Legally Compliant Archiving
Protecting Personal Information
Why WORM Is No Solution
Problems with certifications
Stubbing - (Not) A Solution
Who Uses EMA®?
Why Bother with Archiving
Benefits of an Appliance
Dealing with private e-mails
Laws and Regulations
Overview of the Most Important Regulations
General Data Protection Regulation (DSGVO)
Right to be "forgotten"
Events and Webinars
Press Releases
Press Review
Partner Program
Partner Portal
ARTEC Promotional Program
ARTEC Expert Network
Services & Support
Consulting Services
Technical Consulting
Software Development
Software Subscription & Warranty
Product Support
Company History
Green responsibility
Where to Find Us
Job Openings
Terms and Conditions
Protected Trademarks and Patents
Information for Investors
Privacy Policy
Corporate Information

Trusted EMA®

Advanced security features, such as the automatic encryption of all information, or the closed-down architecture, which uses a proprietary operating system, have always made our products some of the most secure solutions for digital information management that are available on the market. Our latest innovation, called Trusted EMA®, takes our advanced security measures one step further: EMA is now one of the world's first archiving and information management appliances that are built according to the Trusted Computing standard (TC).

Almost all conventional systems and security mechanisms reveal a decisive weakness when examined closer: they are potentially open to attacks when third parties can gain direct access to the hardware. Trusted EMA prevents such attacks by creaking links to hardware characteristics that are unique to each appliance. This protects the appliance from unauthorized manipulation and constructs an unbreakable "safe" for your organization's archived data.

Trusted EMA is based around a TPM chip (Trusted Platform Module), firmly anchored inside all appliances, which provides a smart extension to our existing security concept. Using the TPM chip and the groundbreaking Trusted EMA feature, the appliance-specific data decryption key now receives even better protection against malicious hardware attacks. EMA hardware and appliance software now truly combine and form an inseparable unit.

Trusted EMA can monitor individual access regulations and permissions that have been defined for users in your organization. This ensures that the contents of the archive receive maximum protection, because Four-Eye-Principle authentication cannot be circumvented in any way.

Adherence to any implemented organization-internal guidelines and compliance regulations can be monitored and guaranteed. In short, we managed to make one of the most secure solutions on the market even more secure.

Main advantages:

Maximum security for your data is provided by an integrated TPM chip

Self-defense mechanism protects against manipulation and unauthorized access

Adherence to individual user permissions and roles is enforced

Guaranteed protection of the appliance-specific decryption key

Provides enhanced security in local and cloud infrastructures