Echoworx FAQs

Considering switching to Echoworx? Have questions? We’ve got your answers.

Frequently asked questions

Yes, Echoworx offers migration support for customers migrating from existing email encryption solutions. Check out our Integrations & Deployment page for more details on what to expect.
Yes. Echoworx offers full onboarding services. All customers are assigned a dedicated resource from the Echoworx Client Engagement team. These team members are technical experts of the platform and skilled project managers. . Full administrator and user documentation is provided in HTML and PDF formats along with “train-the-trainer” materials. Learn more about onboarding here.
We support both private cloud and dedicated cloud.
Echoworx abides by the laws of the countries we do business in or with and assist customers in their compliance initiatives for PIPEDA and HIPPA. The Echoworx email encryption solution, our policies and procedures are audited annually for compliance against PCI, SOC2, and WebTrust. Read more about our Cloud Security Assurance
Echoworx provides the ability for customers to host in different geographic regions. Currently our SOC2-, PCI DSS- and ISO-certified data centres are located in: US, UK, Canada, Ireland, or Germany. Echoworx deploys and fully manages the solution with no third-party access to our instances. Full details can be found here
Existing email gateway, either on-premises or cloud based. Service access is restricted to using TLS only for connection. Inbound email must pass through mail security flows (AV/AS).
Yes. Echoworx is committed to improving accessibility as outlined in our AODA statement of commitment. This commitment extends to our people-focused encryption platform where the tailored level AA rated interface, ensures experience is not affected by language preference or customization. Each release of the software is tested for compliance against the WCAG 2.1 AA accessibility standards. We welcome and incorporate detailed customer feedback into our design processes. Many aspects of the platform can be tailored to meet the customer’s requirements, including web content, branding and email notifications.
No. Echoworx does not use proprietary encryption algorithms or standards in our products. As part of PCI and SOC2 this list of algorithms is reviewed regularly. Please refer to our security brief that outlines the encryption and algorithms supported.
Numerous encryption methods ensure seamless communication to a variety of recipients:
  • TLS Encryption with Fallback
  • S/MIME
  • PGP
  • Full Message Encryption
  • Encrypted Attachments (PDF, Office Document, Zip)
  • Web Portal
Learn more about Echoworx’ numerous delivery methods here.
Yes. Echoworx can be used to read and send messages from iPhone, Android, Blackberry and Windows Mobile devices. No mobile app, additional software or special setup is required. Our tailored interface, rated AA level for Web Content Accessibility, ensures experience is not affected.
Echoworx’ numerous authentication methods include:
  • User ID/PWD
  • 2FA
  • SMS
  • No Authentication
  • Out of Band
  • Biometrics (Fido2)
  • oAuth (social connectors)
  • API integration from existing portals
  • Sender Set
Learn more about Echoworx’ flexible authentication controls and assess here.
Yes. Echoworx' cloud-based encryption supports both Exchange online and on-premises. We support all popular email platforms. If you can send email, Echoworx can encrypt it. Learn more about Echoworx' integration and secure email flow here.
Yes. Customisation includes 8 message delivery options that can be changed at anytime. Extensive branding control of logo, colors and other specific imagery. Customisable messages in header and footer including per-language template-sets. Advanced branded pickup portal and online help centre. Support of vanity domains. 27 configurable language options. 9 authentication options. Administrators have full access to system management and profile customisation through the easy to use web admin console. End users have full control of their language and message delivery options. Learn more about custom branding options here.
Yes. Yes. Data retention policies are flexible and configurable for each customer. The Echoworx policy engine can map specific senders, domains, or AD groups to the appropriate retention policy. Other options such as keyword and recipient-based mapping are also available. 90-day retention is available out of the box with longer retention periods available upon request.
Yes. Echoworx can sign plain text, S/MIME, or PGP-encrypted messages, as well as PGP-encrypted attachments. DMARC/DKIM is also fully supported for all outbound messages. Additionally, Echoworx can configure encrypted mail to route back to your organization for sending and DKIM application.

Ask a Question

For your specific questions, fill out the form below to get quick answers direct from our encryption experts.

  • This field is for validation purposes and should be left unchanged.

 

Your email will not be shared with any 3rd party. See our Privacy Policy.

Ready for the next step?

Meet with our encryption specialists

Get a Free Personalized Demo
Rated 4 out of 5

Great people to work with and a fabulous product. Best in market!

"The team supporting our organization were exceptional in their support and responsiveness to our requirements. Developments that could be accommodated between releases were initiated swiftly and to the required quality."

— Cyber Security Project Manager in the Finance Industry

Rated 5 out of 5

Scales with growing business demands

“We were using two different email encryption solutions, and the expense was tremendous. Our infrastructure was complicated, and managing and upgrading the platforms was a task that really should have been done by a set of dedicated resources”

— Senior Systems Administrator in Municipal Government

Rated 5 out of 5

Different encryption methods were huge part of our decision to invest

“Echoworx’s different encryption methods were a huge part of our decision to invest in them. If we didn’t have that list of encryption methods and the user could not choose what they wanted, we probably would have needed to use multiple point solutions to have the same functionality.”

— Senior Vice President of Engineering in the Finance Industry