Certidox
Email Authentication • PDFs • Printed + Digital

Email Authentication for High-Risk Communications

Certidox authenticates the email itself — its sender, content, and current status — enabling recipients to verify whether a message is genuine, altered, or revoked before acting on it.

Why Email Authentication Matters

Business Email Compromise (BEC) and spoofed emails succeed because recipients trust what appears legitimate. Display names, domains, writing style, and urgency can all be imitated.

The most dangerous outcome of a spoofed email is not always a fraudulent wire transfer or a malicious link.

In many real-world incidents, the critical damage happens when a confidential document is sent to someone impersonating a trusted counterpart — such as your accountant, lawyer, auditor, or internal colleague.

Once sensitive information is disclosed to the wrong recipient, the loss is immediate and irreversible.

Certidox addresses this risk by enabling recipients to verify the authenticity and current status of the email itself before replying, forwarding, or sharing documents.

This risk exists even when the email contains no attachment and no link — only a seemingly legitimate request.

What Certidox Authenticates

  • Email origin — who actually sent the message
  • Email content — detect any alteration or tampering
  • Email status — active, corrected, or revoked
  • Attachments — covered as part of the authenticated message

How It Works

  1. The sender authenticates the email before sending it
  2. An authenticity seal is generated for the message
  3. The recipient verifies the email using the official Certidox verifier
  4. If the email is later revoked, its status is immediately updated

Typical Use Cases

  • Wire instruction changes sent by email
  • CEO / CFO urgent payment requests
  • Legal notices and contracts
  • Investor relations and regulated disclosures
  • Any email involving confidential or sensitive information

FAQ

Is this just another email security filter?
No. Certidox is not a filter. It provides verifiable proof of authenticity for the email content itself, after delivery.

Does this replace SPF, DKIM, or DMARC?
No. Certidox complements existing email security standards by addressing what they do not: human-readable verification of message authenticity and status.

Can an email be revoked after it is sent?
Yes. An authenticated email can be revoked or corrected, with immediate visibility for recipients.

Request a Demo

If email spoofing or confidential data leaks represent a material risk for your organization, let’s review your real-world workflow in a short demo.