authentication e-post cryptography security recovery alarm access control internet security management analysis encryption agent decryption key management encrypted policy crm crypto database data customer domene relationship cctv webhotell