1. Home
  2. Frequently Asked Questions (Zix)

Frequently Asked Questions (Zix)

How Long are Messages Stored at the Zix Message Center?

By default, these messages are stored for 14 days. With the addition of the ZixPort custom portal, customers may extend or shorten this window.

If I move to Hosted ZixGateway from on premise ZixGateway, do my users have to re-register with the new ZixPort?

We can move your Zix portal over without requiring your users to re-register. . Please make sure the on boarding department knows that the new order is in fact just moving the service to hosted.

What is a Zix Corporate Key?

A Zix Corporate Key is an add on service that allows an administrative user to open and read an encrypted message from any user in the domain and is only used with ZixMail.

For ZixGateway with Office 365, which plan supports integration with zixgateway?

You will need an enterprise plan to configure Office 365 to work with ZixGateway

I need email encryption that meets HIPAA, SOX, GLB, or other regulatory requirements. Does Zix have a solution for me?

Yes, all of the Zix Encryption products can be used to meet federal and state requirements. We have experts on staff who can help you find the right solution for your unique environment. For more information contact SkySphere today to speak with a specialist.

I'm using Hotmail, Gmail, or another public domain web-based email system. I don't have Outlook. Will ZixMail still work?

Yes, Zix provides a stand-alone desktop version of the ZixMail software that will work with most web-based email systems. You can download a 30 day free trial or order on line here http://www.zixsecurity.com/encryption-services/zixmail/

If I am only using ZixMail, do I need to change my MX records?

No, the MX records will not need changed.

Can I create a policy that forces unencryption of email?

Yes, our support staff can create a keyword which appears at the end of the subject line of a message. This will prevent encryption.

What's the difference between policy-based encryption and voluntary encryption? Which one is better?

Policy based encryption uses compliance filters to scan messages and attachments for sensitive information like PHI, Credit Cards, Social Security numbers, etc. This is an automatic, customizable process that ensures compliance with Federal and State law. For most customers, this will be the preferred method for meeting compliance requirements. Voluntary encryption is a desktop-based alternative where the sender manually selects the messages for encryption on a per-message basis. For smaller customers who rarely and predictably send sensitive information, this is a simple method for encrypting email.

How long does it take to get the service up and running?

Zix collects domain information twce a week for new account, so no more than 3 days depending on what day of the week you sign up for the service. You will also need to create 2 domain entries where your dns is hosted.

What is ZixSelect?

ZixSelect is an Outlook plug-in that allows you to protect personal information. This adds an “Encrypt & Send” button to your Microsoft Outlook compose window. The ZixSelect plug-in allows you to force messages to be encrypted or plaintext (unencrypted). A ZixGateway is required for this to work.

How does Zix scan emails?

ZixCorp Email Encryption Services use a set of comprehensive lexicons to scan for sensitive information, such as personal health information (PHI) or personal financial information in electronic messages. Searches are conducted by scanning all message subjects, bodies and attachments for sensitive information defined within the lexicons.

A lexicon is a file consisting of a comprehensive set of terms, phrases, expressions and pattern masks that identify sensitive types of information. Sensitive information is defined as any information that, when inappropriately disclosed, can lead to significant contractual or legal liabilities; serious damage to your organization’s image and reputation; or legal, financial, or business losses.

ZixCorp uses many sources to generate the lexicon content that is used to search for sensitive information, including federal regulations, authoritative reference sources on the subject and “standard of care” practices.

Was this article helpful?