Web

Email configurations

E-mails are normally received via IMAP (Internet Message Access Protocol) or POP3 (Post Office Protocol). With both methods, the messages are stored on the mail provider's server until they are deleted. If the mails are not encrypted, anyone can read them. This applies to both server administrators and hackers.

Correspondence between customers and a company should therefore not be left on an email provider's server any longer than necessary. Having your own mail server can greatly improve data protection.

Sooner or later you will come across the terms SMTP, IMAP or POP3.

In short, all three are protocols that enable e-mail to be sent.

  • POP3

The Post Office Protocol (POP) is a transmission protocol that a client can use to retrieve emails from an email server. POP3 only enables e-mails to be listed, retrieved and deleted on the e-mail server. The emails are downloaded as a copy from the server to a computer, tablet or smartphone. You can then read, reply to or delete them there, but only locally, which means that the server is not informed of any changes and these are not recorded during backups. Sent emails are also not stored on the server, but only in your client.

POP3 dates back to the time when server storage space was scarce, and so emails are traditionally deleted after a certain time on the server.

  • IMAP

IMAP (Internet Message Access Protocol)also used to retrieve emails. It was designed to resolve dependencies on individual client computers in the mail configuration (as is the case with POP3). To this end, IMAP extends the functions and procedures of Post Office Protocol (POP3) so that users can save and leave their mails, folder structures and settings on the servers.

  • SMTP

As a counterpart to POP3 and IMAP, which are intended for retrieving e-mails, the Simple Mail Transfer Protocol (SMTP) is usually implemented for sending.

  • Microsoft Exchange Server

This E-mail transport server software is used for the central storage and administration of e-mails, appointments, contacts, tasks and other elements for several users and thus enables collaboration in a work group or company.

To underline the professional appearance of your company, we offer this optimal solution with which everything is synchronized directly from one server. This has several advantages, such as access to a shared calendar function or controlling the access rights of individual employees to, for example, customer contact data.

We work together with our IT department to ensure that your sensitive data is optimally protected.

Contact us now!

You want to know more?

You can write us an email or call us. We are looking forward to your message!

More articles to read