Challenge

Recipient authentication

Reach the right people with confidence

Mailock’s recipient challenges give you peace of mind by ensuring that only the right person can open your secure emails.

Using multi-factor authentication, you protect against common risks, like sending emails to the wrong person, which can lead to data breaches.

SMS code

A familiar method, the SMS challenge sends a unique code to the recipient’s mobile phone.

Once they receive your secure email, they simply enter the code to unlock it.

This method works well for eliminating the most common email risks, using the mobile devices people rely on every day.

Question & answer challenge

If you don't have a mobile number available for your recipient, the Question & Answer challenge is a handy alternative.

You create a custom question that only the recipient can answer. They have five attempts to get it right.

This method is especially useful when you already have a trusted relationship, making sure only someone with the right knowledge can open the email.

Unipass ID integration

For financial services users, Mailock integrates seamlessly with Unipass, offering one-click access to secure emails.

If you’re already using Unipass Identity, this makes authentication effortless, boosting both security and convenience.

API integrations

We can also work with enterprise organisations to integrate Mailock with their CRM (Customer Relationship Management) systems.

This lets you set up tailored recipient challenges using customer data, ensuring tailored secure communications that fit your business needs.

Buiness team looking at laptop and smiling around board table

Plans & pricing

Compare plans

Take a look at our pricing plans to find the right solution for your secure customer communications challenges.

Content Feed

Related media

8 min read
Male professional smiling and looking at laptop on desk
Article
25 01 24

Is Password-Protecting a Document Secure?

Learn why password protection may not be the most secure method for safeguarding sensitive documents, and what options you could use instead.

7 min read
Man using digital ID on a smartphone
Article
03 11 23

8 Countries With the Most Innovative Digital ID Systems

From Estonia's pioneering e-Residency to India's expansive Aadhaar program, discover how nations are harnessing technology to streamline services.

6 min read
Male business people looking at digital identity tech together in office
101 Guide
22 09 23

What Is Digital Identity? Definition & Key Risks

Learn what digital identity is and how to protect it in the digital age. Discover the key identifiers of digital ID and where it is used in everyday life.