ProtonBlog(new window)
protonmail professional

Introducing Proton Mail Professional – encrypted email for organizations

Update on 19 July, 2022: We now offer a range of plans for organizations. Find out more about Proton for Business(new window).

Today, we’re happy to announce a brand new Proton Mail plan. With Proton Mail Professional, encrypted email is finally available for organizations.

When Proton Mail first opened to the public last year, we launched with three plans, Free, Plus, and Visionary. Since then, millions of people have moved their email to Proton Mail and benefited from the security and privacy that comes with end-to-end email encryption. Today, we’re happy to announce a fourth Proton Mail plan, Professional.

Encrypted email for organizations

Proton Mail Professional brings with it a much demanded feature that a lot of people from the Proton Community have been asking for since the very beginning. With the Professional plans, not only is it possible to use Proton Mail to host email for your domain, it is also possible to create individual user accounts for people within your organization.

The Professional plan comes with a set of powerful management tools that allow organization administrators to manage the accounts of organization members. With Proton Mail Professional, you can create administrators for your organization which can manage regular user accounts. This includes things like provisioning new accounts, allocating organization storage space between accounts, resetting passwords, and much more.

Best of all, Proton Mail Professional does all this while preserving the end-to-end email encryption that Proton Mail uses to protect your privacy. Professional plans allow you to extend that protection to your entire organization. With Proton Mail Professional, all emails exchanged between members of your organization benefit from automatic and transparent end-to-end encryption, meaning that even though Proton Mail is hosting your emails, we do not have the technical means to read your organization’s email communications, and cannot hand them over to third parties. Because we can’t read your emails, this also means that if Proton Mail servers are somehow compromised, your communications will still be protected because attackers cannot steal from us data that we do not possess in the first place.

Managing an encrypted organization

Proton Mail Professional manages to do all this while still making it possible to manage your organization. In other words, while all organization accounts are end-to-end encrypted, it is still possible for organization admins to access the emails of other organization users. Thus, organizational oversight and management is still possible, even with end-to-end encryption. Furthermore, administrative read permissions are also granted or revoked automatically when admin users are created or demoted.

This is made possible by a highly sophisticated organization level key management system which manages the keychain for the entire organization. However, all this complexity is hidden from the user. In fact, you can manage your organization’s encrypted emails without even knowing what an encryption key is, while still benefiting from the security provided by strong encryption. The flexibility and power of our key management system also means that private users can also be created if certain members of your organization need more privacy (private users are users whose emails are not accessible even to admins).

Getting started with Proton Mail Professional

To get started with encrypted email for your organization, you can upgrade to Proton Mail Professional by going to Settings → Dashboard in the Proton Mail web interface.

Learn more about migrating your business to Proton Mail(new window)

Over the coming months, we look forward to continuing to enhance the features and capabilities of all Proton Mail plans so that we can make encrypted email a reality for everyone, from the individual user to the largest organizations.

You can get a free secure email account from Proton Mail here(new window).

We also now provide a free VPN service(new window).

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan(new window). Thank you for your support!

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

is whatsapp safe for sending private photos
WhatsApp is the world’s leading messaging app, trusted by billions of people around the globe to send and receive messages. However, is WhatsApp safe for sending private photos? Or are there better ways to share photos online privately? Let’s find ou
passwordless future
With the advent of passkeys, plenty of people are predicting the end of passwords. Is the future passwordless, though? Or is there room for both types of authentication to exist side-by-side?  At Proton, we are optimistic about passkeys and have int
At Proton, we have always been highly disciplined, focusing on how to best sustain our mission over time. This job is incredibly difficult. Everything we create always takes longer and is more complex than it would be if we did it without focusing on
is icloud keychain safe
If you’re on any Apple device, you’re familiar with the iCloud Keychain, the Apple password manager. It’s a handy tool that stores passwords for you and helps you manage your logins.  For a program that stores all your most sensitive data in one pla
We recently announced that Proton Pass now supports passkeys for everyone across all devices. Universal compatibility is a unique approach to implementing passkeys, unfortunately. Even though passkeys were developed by the FIDO Alliance and the Worl
How to upload and share private video
Your private videos are for your eyes only. However, not all cloud storage services are good at storing videos securely, let alone privately. In this article we explain what you can do to keep file sharing companies from having access to the videos y
Many email services, citing security reasons, require a phone number for identity verification. This creates an unfortunate paradox in which you must give up a highly sensitive piece of personal data to Big Tech. But there are simple ways to create