Home > Products > Bloombase Message

Bloombase Message - Transparent Email Encryption and Signature

Overview | Business Benefits | Specifications | Resources

Technical Specifications

 

Bloombase Message is a unique messaging security solution to protect sensitive information of corporate emails by state-of-the-art cryptographic technologies.

Download Specifications

You need Adobe Acrobat Reader to read our digital product brochure.

 

Security

  • Simple Mail Transfer Protocol (SMTP) over secure sockets layer (SSL) or transport layer security (TLS)
  • SMTP authentication (SMTP-AUTH)
  • Message sender identity validation
  • Network-based message relay restriction
  • Industry-proven cryptographic processing engine
  • NIST FIPS-197 AES encryption and decryption
  • Japan NTT/Mitsubishi Electric Camellia encryption and decryption
  • Korean Data Encryption Standard (SEED) and ARIA block ciphers
  • Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption
  • NIST FIPS-46-3 3DES encryption and decryption
  • CAST5, RC2 encryption
  • 512/1024/2048-bit long X.509 asymmetric key
  • S/MIME encryption, decryption, signing and verification
  • SHA-1, MD5 and Chinese National SCH(SM3) hash generation

Messaging

  • Acts transparently as email proxy server
    Supports X.400 Simple Mail Transfer Protocol (SMTP)
  • Supports messaging servers including Microsoft Exchange, Sun JES, IBM Lotus Notes, Sendmail, etc
  • Intelligent criteria based message filtering engine
  • High performance message processing routing engine
  • Network based message relay enabling/disabling email dispatch via Bloombase Message

Message Filtering Criteria

  • Attachment existence check
  • Attachment filename pattern check
  • Header existence and numeric comparison
  • Mail attribute and value pattern check
  • Sender address pattern check
  • Recipient address pattern check
  • Host and remote address and network check
  • S/MIME encrypted and/or signed part check
  • X.509 certificate subject check
  • Subject pattern check
  • Spammer blacklist and spam filter
  • Message size check
  • Recipient mailbox quota full check

Message Processing and Router

  • Message header processing
  • Message footer processing
  • Regular expression based message content alteration
  • Header logging
  • Message counter
  • Message bounce
  • Message forward
  • Message redirect
  • Message resend
  • Message stealth delivery
  • Sender, postmaster and recipient notification
  • Local and remote delivery
  • Mail attribute modification
  • S/MIME encryption and decryption
  • S/MIME digital signing and verification
  • Hierarchical and stacking message router
  • Delivery status notice (DSN) bounce

Key Management

  • Multiple certificate authority (CA) support
  • Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion
  • Built-in certificate request and revocation check (CRL/OCSP)
  • X.509 and PKCS#12 DER and PEM Key Import and Export
  • Key Usage Profiling
  • RDBMS and Generic LDAP Support and Integration
  • Industry Standard PKCS#11
  • NIST FIPS-140-1 level 2 cryptographic module support (optional)
  • Automatic Certificate Retrieval via HTTP or LDAP
  • Certificate Validity Check
  • Certificate Revocation Check via HTTP or LDAP
  • Certificate Revocation List (CRL)
  • Certificate Revocation List Distribution Point (CRLDP)
  • Online Certificate Status Protocal (OCSP)
  • CRL scheduled download, caching and automatic retry
  • OCSP scheduled request, caching and automatic retry

Hardware Security Module Support

  • AEP Networks Keyper
  • Oracle Sun Crypto Accelerator
  • Sophos Utimaco SafeGuard CryptoServer
  • Thales nShield
  • HP Atalla
  • IBM 4758 Cryptographic CoProcessor
  • IBM eServer Cryptographic Accelerator
  • IBM Crypto Express2
  • IBM CP Assist for Cryptographic Function
  • Cavium NITROX XL
  • Other PKCS#11 compliant hardware security modules

Standard Support and Certification

  • OASIS Key Management Interoperability Protocol (KMIP) support
  • NIST FIPS 140-2 compliant Bloombase Cryptographic Module

Management

  • Web based menu driven
  • SSL protection
  • No learning curve
  • Central administration and configuration
  • User security

High Availability

  • Stateless active-standby failover
  • Stateful active-standby failover
  • Stateless active-active round-robin load-balancing
  • Stateful active-active round-robin load-balancing

Network Management

  • SNMP (v1, v2c, v3)
  • syslog, log rotation and auto-archive
  • Heartbeat and keep-alive

Platform Support

  • Bloombase OS
  • Solaris
  • HP-UX
  • OpenVMS
  • IBM AIX
  • z/OS
  • AS400
  • Linux
  • Microsoft Windows
  • Mac OS X
  • VMware (vSphere, ESXi, Server), Oracle VM, Sun VirtualBox, Citrix XenServer, Microsoft Virtual Server

Hardware Support

  • i386-base architecture
  • AMD 32 and 64 architecture
  • Intel Itanium-2 architecture
  • IBM Power6 architecture
  • PA-RISC architecture
  • UltraSPARC architecture

The specification and outlook of the model may vary and is for reference only


Secure Your Data Now

Protect your data with Bloombase transparent encryption.

Bloombase Demonstrations

See how Bloombase protects your digital assets.

Bloombase SupPortal

Get technical support from Bloombase Supportal and Knowledgebase.