CyberSafe Certification Authority
The CyberSafe CA root certificate is generated automatically at the first start of the program and is established in trusted Windows storage. To work with encrypted e-mail, it is enough to exchange certificates with the recipient once; messages will be encrypted and decrypted automatically after that.
CyberSafe Key Server
All CyberSafe users’ certificates are held on the remote protected server. You can always publish your public key on it, and also download other users’ public keys from it. Convenient feature of search by email address will help to find a key of the needed user quickly.
To work conveniently with certificates, the program includes the powerful and fast database not using drivers during operation. The filter system is provided for search that is very convenient dealing with large volume of users’ certificates.
Support and training documents
Useful both to beginners in the field of information security and to experienced users detailed text training materials and video lessons how to work with the program are available on the CyberSafe official site. If you did not find the answer to the question interesting to you, you can always ask it having contacted site technical support.