Flexible Access Controls2025-08-06T11:35:21-05:00

Adaptive Access, Uncompromised Security

Empower your enterprise with adaptive authentication and flexible access controls. Achieve seamless security and usability through customizable methods like: one click, two-factor, and single sign-on—balancing protection with effortless user experience.

Flexible Access Controls

Secure Email That Just Works

With Cloudstar, sending secure email is simple—the experience feels just like regular email, with messages delivered directly into your recipients’ inboxes.

But when your business needs more—more flexibility, more control, or to meet compliance across finance, healthcare, legal, and other regulated industries—Cloudstar offers a range of customizable security options.

Whether you stick with our seamless default or tailor authentication and access for unique workflows, every solution is designed to protect your information while making life easier for your team and your clients.

Secure Portal Options

Boost security and streamline user experience with features such as social login, two-factor authentication, and passwordless access. Tailor authentication options to align with your policies and meet your organization’s unique requirements.

Attorney accessing secure email.

Secure Email That Just Works — Control For Every Use Case

With Cloudstar, sending secure email is simple—the experience feels just like regular email, with messages delivered directly into your recipients’ inboxes.

But when your business needs more—more flexibility, more control, or to meet compliance across finance, healthcare, legal, and other regulated industries—Cloudstar offers a range of customizable security options.

Whether you stick with our seamless default or tailor authentication and access for unique workflows, every solution is designed to protect your information while making life easier for your team and your clients.

Secure Portal Options

Boost security and streamline user experience with features such as social login, two-factor authentication, and passwordless access. Tailor authentication options to align with your policies and meet your organization’s unique requirements.

No Authentication Required2025-07-20T09:25:07-05:00

Some secure Cloudstar messages don’t require recipients to register or create an account—they can just open the email and start communicating. This option is ideal for making it easy for new clients or partners to reach you, lowering barriers while still protecting information behind the scenes. Businesses benefit from valuable features like full auditing, tracking, and recall capabilities, ensuring security and compliance are never sacrificed for convenience.

Single Sign-On (SSO)2025-07-20T09:23:19-05:00

Single Sign-On lets users access secure Cloudstar emails automatically when they’re already logged in to your organization’s main web portal, so there’s no need to remember a separate password or go through another login screen. This creates a seamless experience—your team stays within your existing environment, gaining access to encrypted content with just one set of credentials. It’s not just easier for users; businesses benefit from streamlined onboarding, reduced support requests, and consistent enforcement of security policies, all while maintaining robust compliance and auditability.

Social Connectors2025-07-20T09:33:41-05:00

Sometimes it’s easier to use accounts you already have—like Microsoft 365, Google, Salesforce, or LinkedIn—to log in instead of creating a new username and password. Cloudstar lets you securely access encrypted emails using these trusted accounts, so there’s no need to juggle multiple logins. This makes things smoother for your team and clients, supports your organization’s existing security policies, and reduces the workload for IT support. By leveraging widely trusted identification methods, businesses get strong protection along with a familiar, hassle-free experience.

Passwordless Access2025-07-20T09:20:11-05:00

With passwordless access, recipients don’t have to remember or manage yet another password—instead, they can securely open messages from Cloudstar using their device’s built-in security like fingerprint, face recognition, or a trusted passkey. This makes the process fast and easy for users, while reducing the risk of weak or reused passwords. It’s especially helpful for busy professionals on the go or anyone who prefers technology that just works without the hassle of logins. For businesses, this approach not only improves user satisfaction but also strengthens security and supports modern compliance requirements.

Sender Set Passphrase2025-07-20T09:17:50-05:00

Think of this like sharing a secret word with a friend so they can unlock a message you sent them. With Cloudstar’s sender set passphrase, the person sending the email creates a password and shares it with the recipient separately—this way, the recipient doesn’t need to register or sign up for anything. It’s a quick and simple way to securely share sensitive information while keeping control over who can see it. This approach is especially useful for one-time or occasional secure communications and still supports compliance by protecting the message with a strong password.

SMS Authentication2025-07-20T09:48:34-05:00

Recipients can access their secure emails from Cloudstar by simply receiving a single-use code delivered to their phone via SMS—no need to register or set up a new account. This makes it easy and fast for users who may not want to manage extra passwords, while still meeting industry standards for multi-factor authentication. For organizations, SMS authentication offers added convenience and ensures secure access, helping satisfy compliance requirements such as PCI and SOC2.

System-Generated Verification Codes2025-07-20T09:30:46-05:00

Each secure Cloudstar message can be protected with a unique, system-generated verification code—like a one-time password created just for that specific email. The sender provides this code to the recipient through a separate, secure method such as a phone call or in-person conversation, ensuring that only the right person can access sensitive information. This approach adds a strong layer of security, making it especially useful for confidential or highly sensitive communications that require extra protection and strict access control. It also supports compliance needs and detailed tracking for regulatory purposes.

OpenID Integration2025-07-20T09:30:09-05:00

OpenID integration means your team and clients can use their existing OpenID-supported accounts to securely access encrypted emails—no extra accounts or passwords to remember. This makes the experience smoother and more convenient, using familiar login credentials from trusted providers. For organizations, it means less password fatigue for users, fewer support requests, and reliable policy enforcement across systems. Security is strengthened because users can rely on providers with robust authentication and compliance standards.

Two-Factor Authentication (2FA)2025-07-20T09:31:34-05:00

Adding an extra layer of protection, two-factor authentication requires recipients to enter not just their password but also a one-time code sent to their phone or generated by an app. This helps ensure that only the intended recipient can open the encrypted email, making it much harder for unauthorized users to gain access. Cloudstar’s 2FA meets important security standards like PCI-DSS, giving businesses peace of mind that sensitive data stays protected while still being convenient for users.

Self Registration2025-07-20T09:35:37-05:00

Think of this like setting up a new account with your favorite online service—recipients get to create their own username and password, making it easy for them to access their secure emails from Cloudstar whenever they need. This method empowers users with self-service access, while giving IT teams full visibility and the flexibility to enable extra security features, like sending a one-time passcode to the recipient when they register. It’s a convenient way for your organization to offer secure email without needing to hand out credentials or do a lot of manual setup, and it’s great for maintaining compliance and audit trails.

Specialized Use Cases

Sometimes, only the attachment needs to be secure — and this method is built for exactly that. The email body stays open for easy reading, while the attachment is locked down as a password-protected PDF. It’s a trusted choice for CPAs, financial institutions, and others who need to send statements, reports, and sensitive documents without overcomplicating the process.

Why Choose Attachment Only Encryption?

When the message itself is just informational and the real data is in the attachment, this option keeps things simple. It’s easy to use, secure, and meets compliance requirements without added complexity. Businesses of all kinds rely on it to deliver statements, tax forms, and reports efficiently — and it’s proven to work.

Banks and Financial Institutions

Banks, credit unions, and financial firms use this method every day to deliver statements, notices, and account details. Customers get their information through a familiar, password-protected configuration without any extra steps. It’s a straightforward way to stay compliant while serving thousands of customers at scale.

Tailored For Your Business

We’ll help you customize the setup to fit your workflows, meet customer expectations, and support your security policies — all while keeping the experience seamless and on brand.

Ready to Get Started?

Take control of your email security today with flexible, customized encryption solutions built for your business.

  • Customized implementations for your workflows. We work with your team to design an attachment-only encryption process that fits seamlessly into your existing operations.

  • Widely used by banks and CPAs. Trusted across the financial and accounting industries for delivering statements, reports, and sensitive client information securely.

  • Compliant and customer-friendly delivery. Meets regulatory requirements while providing recipients with an easy, familiar way to access protected documents.
Go to Top