SafeBolt is designed to protect you from many different internet security hazards.


Here at SafeBolt, we understand that security and privacy are the core concerns for individuals and businesses worldwide; thus we have built and set up robust security features to protect your most valuable assets and preserve their privacy. These are the basis of our customer service, products, and company culture.

We apply innovative new technologies to provide security, however; security on its own cannot guarantee complete security. SafeBolt complements our software and systems with well-defined policies that secure vigilance, accountability, and company-wide compliance

SafeBolt is designed to protect you from many different internet security hazards.

  • Government surveillance is an increasingly important security problem in the United States, and SafeBolt protects against mass data collection done through government programs by using HTTPS.
  • With SafeBolt, you don’t need to worry about unauthorized information analysis. SafeBolt won’t read your emails or use any of your information for any purpose. Once you’ve encrypted a communication, it remains encrypted on our servers until the intended recipient decrypts it, meaning that our company cannot read your message, even if we wanted to. This protects your information from being sold to advertisement companies or for other profitable means.
  • SafeBolt makes it very difficult for hackers to carry out data and identity theft. Because each of your encrypted communications has a passphrase that is needed to decrypt it, hackers who are trying to steal your information will not only have to modify our software but remain there unnoticed until the next time you enter your passphrase. This is far more complicated than simply gaining access to an email server and taking unencrypted information from it, as would be the case with most email providers.
  • Simple eavesdropping is yet another hazard SafeBolt is designed to prevent. While this is more important when using unsecured WiFi networks, it’s always good to know that all the communications between your device and the SafeBolt server are completely encrypted and unreadable to anyone who wants to eavesdrop through your Internet connection.  
  • SafeBolt also ensures that people don’t forge emails based on your account. By adding a digital signature, recipients of your emails can be sure that the mail is from you, and not an imitative spam service.

However, there are limitations to SafeBolt’s protective services.

  • When opening an account with SafeBolt, it is important to acknowledge that in agreeing to our terms and services, you agree not to use the SafeBolt platform for any illegal activity.
  • While your privacy and security are of utmost importance to us, if we are presented with a legal order to your information, SafeBolt must do everything within our power to comply with the United States law. We will not accept orders from any other investigative agencies that are not under U.S. law.
  • As outlined above, all communications do remain encrypted through our servers. We cannot read any emails that are passed through the SafeBolt servers without the passphrase; however, for accounts that appear in a U.S. law order, we may be legally required to store the passphrase.  
  • The security of SafeBolt also depends on the security of the device on which you access your account. While SafeBolt scans for viruses in its communications, it cannot prevent viruses from infecting your device through other means. Be sure to run anti-viral software on your device, and do not access your SafeBolt account on a device you can’t trust.

Security Philosophy

1) Security and Privacy
SafeBolt is an organization that deals with digital security to prevent intrusions and sensitive data leakage. We safeguard business and personal systems from cyber-attacks and breaches taking a special interest in digital safety. We design policies and frameworks that continuously controls and assess data, and create risk management policies. Great policies and customer satisfaction form the basis of a robust and ethical culture. Our clients’ privacy needs are our greatest concern.
SafeBolt adopts encryption solutions to secure sensitive data. There are selective encryptions tools for common systems that can store, transmit and process data. Encryption block third persons from reading and understanding the data. You not only protect encrypted data from intruders but also protect data from theft and in cases of loss.

2) Data Encryption
We TLS/ SSL encryption and open PGP encryption to enhance security and privacy.

3) Simple to Maintain and Install Security features
We understand that simple is more. Our products are customer friendly, understood and manipulated easily. Our systems have a simple organizational structure that enhances navigation. As part of our culture, we set simple, adaptable solutions that offer extensive services.
Most products apply complex security software and systems which are hard to modify or set up, as a result, organizations opt to turn off all the security. At SafeBolt, among the best distinguishing features of our products is that we build strong security relatively simple and easy to set up. We have applied security features that are easy to comprehend and simple to install and maintain. Our product reference and security guide documents help Application Developers, System Administrators and End Users figure out security issues to enable them to apply the suitable mechanisms that meet their requirements.

Application Security 

We use encryption tools to protect emails, customer transactions, passwords, credit card information, financial information, names and addresses, and any other crucial data that needs protection.

1) SSL/TLS Application-Level Protocols
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are encryption tools that secure internet connection between two systems. These systems include a website and browser or server to server. SafeBolt applies SSL/TLS encoding to encode email messages transmitted over the web. We allow email transmissions to and from systems that do not support TLS/SSL after customers configure it.
TLS is an advanced feature of SSL. This version is more secure and updated. SSL/TLS contains advanced features such as HTTPS, Forward Secrecy and Certificate Pinning.

2) OpenPGP Message Encryption
OpenPGP is the most popular end-to-end encryption tool for encrypted email communication. The tool is available through SafeBolt’s webmail service, Android and iOS apps, and when accessing SafeBolt via POP3 or IMAP. Though the main purpose of OpenPGP is to encrypt emails, the tool also used for signing, encrypting, and decrypting emails, texts, directories, files, disk partitions and enhance the security of password managers. Emails and attachments are not only secure during transmission but remain secure in storage servers.

3) Encrypting Emails Between You and Non-SafeBolt Users
Emails users who haven’t configured OpenPGP still enjoy email security. OpenPGP encrypts data in our servers through a question and answer method. Users receive an email notification stating that they have received a secure email. To access the email, they need to click a link sent to them. The user accesses the email and stores data in our OpenPGP protected server. This results in high security.
SafeBolt is among the leading email service providers in using TLS for email routing that allows SafeBolt and non-SafeBolt servers to transit/ exchange information in an encrypted manner.

4) Enhanced Mobile Device Management (MDM)
Android, iOS and Windows Phone users can encrypt their data through OpenPGP and SSL/TLS encryption. These tools encrypt data before it leaves your device securing all emails and attachments. OpenPGP and SSL/TLS support Two-Step Verification, Touch ID, and multiple accounts that are synced to your webmail account protecting your contacts and settings.

5) Email archiving solutions
Users need archives to store large volumes of data in an organized manner. This data is then retrieved on-a-need- basis. SafeBolt secures all data stored in the archives menu. Administrators configure their domains while users eliminate the need to keep extensive data on email servers.


1) Using Passphrase Securely
A passphrase is similar to a password with a slight difference. Passphrases allow longer words, symbols, and spaces while passwords do not. They are more difficult to crack or guess. SafeBolt gives users the option to use passphrases as a means to secure data. While we do not store the passphrase in our systems, we generate a hashed value that confirms if the passphrase is correct.
Passphrase in webmail and iPhones is entirely different. In emails, we send the passphrase for verification through our SSL/TLS secure servers. In iPhones, we confirm the passphrase through the value generated. We never send the passphrase to the servers for authentication. That’s the main difference.

Two-Factor Authentication (2FA)
2FA is also known as Two-step verification, which allows users to protect their data through password/ paraphrase and phone. This means that if someone else has your password, they cannot access your accounts. You enter your paraphrase and then a code is sent to your phone via text or voice call. Some people prefer to use security keys that they insert into their computer’s USB port. Two-step verification is vital as someone requires your phone or security key to access your account.

2) Rate Limit Implementation
Rate limiting refers to the control of data flowing through servers at a given time. We have three different types of rate limiting methods including user rate limiting, geographic rate limiting, and server rate limiting.
SafeBolt limits user email account logins through rate limiting. When users exceed login attempts, we lock that account for a certain period. Our application developers can set rate limits for certain regions to enhance security in certain geographic regions and moderate suspicious activities or risk of attacks.

Application Firewall

An application firewall is a safety measure that limits or blocks other applications from accessing your operating system. Application firewall offers tight security by handling data specific to your OS and controlling the execution of these files.
Users must configure an application firewall. In case of a breach, the firewall detects suspicious behavior, prevents executions of programs such as DLL, and prevents the execution of suspected malicious code. SafeBolt has an application firewall that reports suspicious behavior so that our team can investigate further.

1) Malware Prevention and Spam Filtering
SafeBolt protects emails and messaging through antivirus and spam filtering tools. These tools identify spam, malware, and phishing. Our tools filter inbound emails to identify those that are malicious.
We have installed antivirus software that confirms valid URLs and protects against phishing. Two important features that we deploy in our software are Bayesian Analysis and Grey Listing. They scan contents of an email to identify commonly used suspicious words.

2) iOS device security
We use OpenPGP to protect our users. SafeBolt also has new features that offer more protection. We have several features that lock your emails even when your phone is unlocked, Touch ID, and built-in file protection.

Network Security

At SafeBolt, we treat network security as policies and practices adopted to prevent and monitor unauthorized access, misuse, modification or denial of the computer network and networking infrastructure. SafeBolt applications run on secure networks.
1) Network simplicity
SafeBolt makes internet experience simpler through protective firewalls that protect your operating system. Users have the choice to decide on what applications to remove and retain. We add some layers to your website, accounts, and passwords through a cryptic lock for extra security. In case of a breach, our firewalls can detect unusual behavior and report.

2) Implementation of Network Segmentation
Network segmentation offers improved security as traffic is filtered or sorted, isolated and limited to a specific network segment. This form of security is especially useful in a business setting where all computers have their hosts on a single network. We insulate each part of the network from unauthorized access and prevent packet sniffing.

3) Server hardening Policy
This is a server security measure to protect all applications and system software stored in that server. The server hardening process includes security extensions, SSH Hardening, installing RootKit Hunter and Chrootkit Hunter, and hardening PHP installation. Our servers comply with the CIS Security Configuration Benchmark.

4) Penetration Testing (Pen testing)
We conduct regular testing on our networks to find vulnerabilities that hackers can exploit. We focus on operating systems, web applications, improper configurations, and risky end-user behavior. We configure our systems with Metasploit and Nmap testing tools for the best results.

5) Updates and Vulnerability Management
We conduct regular vulnerability scans to maintain information security. Vulnerability scans identify outdated protocols and missing patches that bring about changes to your OS. We notify users of all virus infected operating systems and block them from installing in users’ networks.

6) File Change Monitoring
SafeBolt can view user files stored in servers in real-time. We can track, monitor and alert users on file change to prevent system compromise. We identify unauthorized file modifications and send you instant emails in case of an email attack.

7) Centralized and Segregated Logging
SafeBolt offers effective cybersecurity logging through centralized archiving, segregation, monitoring and alerting. We send logs to a centralized server for storage. In case of a breach, we retrieve and analyze the data. Archives are then directed to different networks where only specific individuals can access the logs. We retain logs for 18 months.

Physical Security

SafeBolt not only offers cyber security solutions; we also have an active physical security plan. We have strong physical security measures that complement our cybersecurity measures. Our on-site security teams monitor the servers. The location is only accessible to authorized personnel as we do not allow visitors. To access the site, you must have access keys.
We allow visitors who must be accompanied by staff. Office doors are locked throughout, and we have installed video and alarm systems for extra security and supervision.
As a protective measure, SafeBolt never stores customers’ data in their computers. Instead, we encrypt all data stored offsite or in backup disks.

Process Security

1) Social Engineering Prevention
Hackers devise new ways to trick people into making security mistakes through psychological manipulation. A common social engineering malware is to download and install malicious software. SafeBolt understands that social engineering relies heavily on human error rather than vulnerabilities in OS and software.
We have strict guidelines and systems that verify identities and personal information. Our support team adheres to strict protocols when giving out information.
SafeBolt has no access to your passwords or phrases. Users must configure the passphrase recovery option as part of their account setup. If you forget your recovery passphrase, then we cannot grant you access.

2) Access Control
SafeBolt understands that access control minimizes the risk of unauthorized access to hardware and software. We vet all team members using identifications and authenticate their documents before approving any access. All our access control policies protect customers’ data.

3) Third-Party Services
When we use third-party services, we require them to disclose their security practices. We also conduct security audits and penetration tests to assess the strength of their cybersecurity defense. Hence, we move on to a third-party management program. This program determines the type of access they have. Customer emails are never exposed to third-parties unless when reported as spam.

4) Assessment of Security Risk
SafeBolt regularly conducts the risk assessment to identify, correct and prevent future cybersecurity problems. 

Ready To Get Started?