Encryption is a way to enhance the security of a message or file by scrambling the contents so that it can be read only by someone who has the right encryption key to unscramble it. Encryption does not of itself prevent interception, but denies the message content to the interceptor..

Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it.

Types of Encryption 

Email Encryption

Is the encryption of email messages to protect the content or potentially sensitive information from being read by anyone other than the intended recipients? Email encryption often also includes authentication.
Email encryption relies on public-key cryptography, in which users can each publish a public key that others can use to encrypt messages to them, while keeping secret a private key they can use to decrypt such messages or to digitally encrypt and sign messages they send. The following are the types of e-mail encryption
  1. Gateway Email Encryption provides an automated email encryption at the gateway based on highly configurable policies with no need for additional client software to be installed on the client.
  2. Desktop Email Encryption provides an end-to-end email encryption solution that automatically encrypts, decrypts, digitally signs emails, and verifies messages according to individual or centrally managed policies directly between clients without the need to log into a third-party website. Email is encrypted immediately at the client, ensuring communications are secure before hitting internal networks or stored in the cloud.

Endpoint Encryption

Is the provision of advanced data and file encryption for desktops, laptops, and removable storage devices. Endpoint Encryption protects the data on a system by taking control of the hard disk from the operating system. The Endpoint Encryption driver encrypts all data written to the disk; it also decrypts the data read off the disk. The client software is installed on the client system.

Mobile Encryption

Mobile devices such as PDAs and smartphones allow users to exchange, transfer and store information from outside of the office. The extreme portability of these devices renders them susceptible to theft or loss. Mobile device encryption solutions ensures that information sent and received  from mobile devices are encrypted messages.

File Share Encryption

This provides Policy-enforced file encryption for collaborating teams. It is a form ofdisk encryptionwhere individual files or directories areencryptedby thefile systemitself. This is in contrast tofull disk encryptionwhere the entire partition or disk, in which the file system resides, is encrypted