Challenge
Recipient authentication
Reach the right people with confidence
Mailock’s recipient challenges give you peace of mind by ensuring that only the right person can open your secure emails.
Using multi-factor authentication, you protect against common risks, like sending emails to the wrong person, which can lead to data breaches.
SMS code
A familiar method, the SMS challenge sends a unique code to the recipient’s mobile phone.
Once they receive your secure email, they simply enter the code to unlock it.
This method works well for eliminating the most common email risks, using the mobile devices people rely on every day.
Question & answer challenge
If you don't have a mobile number available for your recipient, the Question & Answer challenge is a handy alternative.
You create a custom question that only the recipient can answer. They have five attempts to get it right.
This method is especially useful when you already have a trusted relationship, making sure only someone with the right knowledge can open the email.
Unipass ID integration
For financial services users, Mailock integrates seamlessly with Unipass, offering one-click access to secure emails.
If you’re already using Unipass Identity, this makes authentication effortless, boosting both security and convenience.
API integrations
We can also work with enterprise organisations to integrate Mailock with their CRM (Customer Relationship Management) systems.
This lets you set up tailored recipient challenges using customer data, ensuring tailored secure communications that fit your business needs.
Plans & pricing
Compare plans
Take a look at our pricing plans to find the right solution for your secure customer communications challenges.
Content Feed
Related media
8 Countries With the Most Innovative Digital ID Systems
From Estonia's pioneering e-Residency to India's expansive Aadhaar program, discover how nations are harnessing technology to streamline services.
What is Digital Identity? Definition & Key Risks
Learn what digital identity is and how to protect it in the digital age. Discover the key identifiers of digital ID and where it is used in everyday life.