mailprotection.redbull.com Open in urlscan Pro
2a02:26f0:6c00::210:ba23  Public Scan

Submitted URL: http://mailprotection.redbull.com/
Effective URL: https://mailprotection.redbull.com/
Submission: On May 31 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

https://www.redbull.com/int-en/search

<form id="nav_search_form" action="https://www.redbull.com/int-en/search" target="_blank">
  <label class="is-hidden" for="search-query">Search</label>
  <input type="text" id="search-query" placeholder="Search" name="">
  <input type="submit" id="nav_search_form_button" name="" value="Search" class="ico search">
</form>

Text Content

 * You are here:
   Communications › E-mail Security ›
   
   
   Q&A SECURE E-MAIL COMMUNICATION

 * Products
   * Red Bull Energy Drink
   * Red Bull Sugarfree
   * Red Bull Zero Calories
   * Red Bull Editions
 * Can Lifecycle
 * Company
 * Cartoons
   * Flying Planet
   * My Wings
 * Contact
 * Search


Q&A SECURE E-MAIL COMMUNICATION


THE RED BULL E-MAIL PROTECTION SERVICE HELPS TO SECURE OUR B2B COMMUNICATION.
FIND BELOW HOW TO SET UP SECURE COMMUNICATION WITH US.

 * Reason for using secure e-mail communication
 * Which standards and protocols do we offer and why
 * How you can securely communicate with us
 * Common guidelines / best practices / Tools for E-mail signing and encryption


WHY IT IS IMPORTANT TO SIGN E-MAILS

E-mail does a great job for doing business communication all over the globe. But
nowadays the internet is a place where more and more bad people try to fake the
identities of other business parties to reach their own selfish goals.
Financial fraud, phishing, fake e-mails and spoofing are just some of the
attacks that are seen daily in the news.
Red Bull aims to be protected against this kind of impersonation attempts and
starts signing outbound mails to proof our identity in E-mail communication to
business partners and encourages them to do the same.
Only if both parties communicate securely - trust can be established and
compliance can be kept.



WHAT EXACTLY IS E-MAIL SIGNING AND HOW DOES IT LOOK LIKE?

If an E-mail is signed, a part of the digital identity of the sender is attached
to the E-mail. This identity was verified and approved by a so called "Public
Certification Authority".
Public Certification Authorities check identity documents and company processes
before they issue digital identities to establish trust.
Red Bull uses QuoVadis and Sectigo (formely Comodo CA) therefore. Beside the
attached digital identity the signed E-mail will be sealed so that it can not be
tampered in transit by somebody else.
So in short E-mail signing:


 * Certifies the identity of the E-mail sender
 * Certifies that an E-mail was not modified / tampered in transit








WHY IT IS IMPORTANT TO ENCRYPT E-MAILS?

In addition to E-mail signing - encrypting an E-mail means to protect the E-mail
from being red in transit from unauthorized persons. Without encryption
potentially every system that routes an e-mail over the internet can read and
extract the message content.
Furthermore everyone that is able to tap or monitor the internet data flows can
do the same. With encryption applied E-mail content keeps secret until it
reaches the recipient.
Every message that needs to be kept confidential should be additionally
encrypted. Examples are confidential financial data, relevant business data,
contracts, secret recipies, compliance obligations and many more.





ENCRYPTION - HOW DOES IT WORK?

Unlike E-mail signing - and that is what it makes it more complicated - E-mail
encryption needs an encryption key exchange first.
The encryption key is part of the digital identity (=certificate) of the
intended recipient - to whom you want to send the encrypted message. The
intended recipient can directly transfer his certificate to you beforehand
(downloadlink, attachment) or he can just send you a signed E-mail where his
identity is already included.




After this initial key exchange you can send the intended recipient a secure
E-mail message encrypted with his encryption key. After delivery he then can
decrypt the message and its content with his personal unlock key.





On the other hand if you want that somebody sends you an encrypted E-mail you
have to transfer your digital identity to him beforehand or send him a signed
E-mail so he has your encryption key. After receiving of the ecnrypted message
you can then decrypt it with your personal unlock key.



SEE HOW RED BULL WORKS WITH SIGNED & ENCRYPTED E-MAILS

Your browser does not support the video tag.


IF YOU HAVE ANY MORE QUESTIONS

Contact us here


EXPLORE THE WORLD BEHIND THE CAN


 * 100% RECYCLABLE CANS
   
   Visit Can Lifecycle


 * 171 COUNTRIES
   
   Visit Company


 * 31 YRS OF COMPANY HISTORY
   
   Visit our Milestones

 * Jobs
 * Contact
 * General Q&A

FOLLOW RED BULL

 * 
 * 

 * © Red Bull GmbH
 * Imprint
 * Terms & Conditions
 * Data Protection & Privacy Policy
 * Brand Protection


International