Multiple Ways to Authenticate for Improved Experiences

Reducing frustrating, or cumbersome, processes for accessing encrypted messages and documents is critical – taking a flexible approach to authentication strengthens security, while improving usability.

African american woman using laptop while sitting at desk in bright office

Flexible Authentication Options

Echoworx offers seven different ways to authenticate users, allowing organizations to choose which method works best for their unique needs. Options include support for Social Login using OAuth, Self-Registration, Shared Secret Passphrase, SSO, System Generated Verification Codes, Biometrics and Multi-Factor Authentication (MFA).

With Echoworx, authentication can easily be set based on policy, the sender or the receiver.

  • Improve experiences
  • Eliminate workarounds
  • Reduce IT headaches
  • Reduce risk during times of high churn
  • Provide more user-friendly MFA
  • Improve password hygiene

Security Assurance & Certification Programs

  • FSQS Registered
  • Microsoft Trusted Root Program
  • Apple Certificate Program

Echoworx Authentication in Action

With more authentication options, Echoworx enables security without sacrificing usability or negatively impacting business processes. Not every user is the same, and neither is their comfort with technology or their privilege levels.

The Echoworx Email Encryption Login Page

Aside from the login process, the Social login (using OAuth) user experience is exactly the same as the web user experience.

Watch this demo to see the Social Connectors (OAuth) and Single-Sign On authentication capabilities of the Echoworx platform, leveraging industry-standard rest-API Web Services.
WATCH NOW

Social Login (using OAuth) with Echoworx Email Encryption

Social login (using OAuth standard) is a form of single sign-on using existing login information from a social networking service such as Facebook, LinkedIn or Google to sign into a third-party website in lieu of creating a new login account specifically for that website. For example, a user with a LinkedIn account could use their LinkedIn ID and password to log into websites that are unrelated to LinkedIn. Social login saves users from the hassle of managing multiple accounts, and simplifies the registration process.

User Experience
When an Echoworx user receives an encrypted message with a registration link, they can skip the account creation process, and simply log in with their existing social network credentials. In fact, if the user has an active session with their social network, they will be granted access immediately. Works on mobile and desktop

Sender-Set Password for Secure Rapid One-Offs

With this authentication method, the sender sets a password and simply clicks ‘send.’  The recipient enters the password to gain instantaneous access to their secure message and all accompanying attachments, with full save and reply functions. The sender must provide the password out-of-band (for example, over the phone). A sender-set password notification will contain a hint in its message body.

Authentication Options are Necessary

“Customers will get turned around if only one option is presented to them and they aren’t familiar with it.”

— Director, North American Retail Company

 

Watch this demo to see the per message level authentication capabilities of our platform, leveraging both automatic and sender-set password generation for creating challenge/response experiences.
WATCH NOW

Echoworx Sender-set password notification email

Sender-set password notification email.

Echoworx sender-set password hint screen

Recipients enter the password that was communicated by the sender.

Echoworx register device screen prompt

Invitation to register for passwordless login.

Echoworx Biometric authentication screen prompt

Authenticate on your device and whisk away to read message.

Echoworx trusted devices screen prompt

Easily manage your registered devices.

Passwordless Authentication

Echoworx enables organizations to leverage existing passwordless safeguards on customer devices, like fingerprint scanners and other biometric measures, to authenticate recipients. Users simply register their device as a recognized authenticator through a browser-based Web Authentication API. Once registered, built-in biometrics can be used to authenticate and grant access to secure messages – without any additional login page or password prompts.

User Experience
Any user logging in with a compatible device will see an invitation (called a Toast), to register for passwordless login. When you click the “click here to open” link in an email notification on a registered device, you’ll get a prompt to authenticate on your device, and then we’ll whisk you away to your message. It’s a single secure step, and since you’re using a device that you have plus either a biometric (something you are) or a PIN (something you know), it’s multifactor.

Varying Levels of Authentication Needed

“I believe there is a huge difference between privilege levels assigned to some, and not others, so we need varying levels of authentication.”

– Director of a North American Software Company

 

Watch this demo to see the passwordless authentication capabilities of our platform, leveraging the existing built-in biometric technology on a user’s device like fingerprint readers and facial recognition.
WATCH NOW

Meet With One of Our Encryption Specialists

Our encryption specialists can help you tailor a solution that best meets your needs by clearly explaining the broad array of options available. Call us or book demo for a time convenient for you and your team.

Call 800.735.8916  Request meeting >

Smiling man wearing Echoworx t-shirt

Avoid nightmares from productivity delays and workarounds

Analyst Guide: Encryption Buyers Checklist

Download now
Rated 4 out of 5

Great people to work with and a fabulous product. Best in market!

"The team supporting our organization were exceptional in their support and responsiveness to our requirements. Developments that could be accommodated between releases were initiated swiftly and to the required quality."

— Cyber Security Project Manager in the Finance Industry

Rated 5 out of 5

We have a fantastic relationship with Echoworx

"They make the set-up and use of their product very simple and are always available to assist us with queries or issues."

— Product Management in the Healthcare Industry

Rated 5 out of 5

Great product and excellent support

“Echoworx is a very customer centric organization and my overall experience has been very good. We have used them for the past 10 years and have never run into any major issues.”

— Principal Product Manager, Global Partner in the Manufacturing Industry

Gartner Peer Insights