// FAQ

GDPR Management

What is a relationship?

Processing is everything that can happen to personal data. When personal data is viewed, edited, deleted, stored or otherwise treated, they are therefore processed..

Who is the controller

A person, company or government agency that determines how and why personal data is processed. This can be seen as the client (controller) and contractor (processor).

What are processors?

Processors are people, companies or government agencies that process personal data on behalf of the controller. This may only be done for the purpose set by the controller.

What are sub-processors?

Sub-processors are processors hired by the processors, whereby the controller is responsible for the (sub) processors.

When are you required to perform a PIA?

You are required by law to perform a PIA if: You systematically evaluate personal aspects of a natural person (this also includes profiling), you process special personal data on a large scale, you (for example via camera surveillance) follow people on a large scale and systematically. Even if you are not legally required to perform a PIA, it can be useful to do so. This gives you a good impression of the risks associated with a particular processing

What additional rights do data subjects have under the GDPR?

The rights of data subjects mean that from May 2018: can request access to the personal data that companies process about them (provided this does not place an unreasonable burden on the company) (right of access), companies may request correction if the data subject makes an error sees / notices in the personal data supplied (right to correction), companies may request a printout of the data that companies have about them (right to data portability). companies may ask if they want to delete the personal data they have about the data subject (right to be forgotten). The latter right means that not only the company that has received the personal data of the data subject must delete it, but also all companies to which the personal data has been supplied (sub-processors, outsourcing email campaigns, etc.).

What is processing?

Processing is everything that can happen to personal data. When personal data is viewed, edited, deleted, stored or otherwise treated, they are therefore processed.

How much personal data can I process?

The GDPR states that 2 concepts must be central to the processing of personal data: "Privacy by design" and "Privacy by default". The Dutch Data Protection Authority (DDPA) describes "Privacy by design" as follows: "Privacy by design means that during the development of products and services (such as information systems) you as an organization first pay attention to privacy-enhancing measures, also known as privacy enhancing technologies. Secondly, you take data minimization into account: you process as little personal data as possible, i.e. only the data that are necessary for the purpose of the processing. In this way you can technically enforce a careful and responsible handling of personal data. . " Privacy by Default means that the default settings of programs or services are already set to maximum privacy settings by default. The basic principle here is that the data subject still enjoys maximum privacy without adjusting (hidden) settings.

What is a dataleak?

A data breach is a breach of security that leads to unauthorized access, modification or retrieval of the stored personal data.

What is an incident

An incident is basically the same as a data breach, but the difference here is that it remains to be determined whether unauthorized access has been granted that could lead to the retrieval, modification or destruction of stored personal data.In the case of cross-border data processing, it is about where the head office of the controller is, if it is located in the Netherlands, for example, you are actually mainly dealing with the Dutch Data Protection Authority, which is then the leading supervisory authority. However, supervisors are also involved in the countries of the person (s) concerned, but they will then coordinate with the lead supervisor what should be done with regard to measures / fines.

What about cross-border data processing?

In the case of cross-border data processing, it is about where the head office of the controller is, if it is located in the Netherlands, for example, you are actually mainly dealing with the Dutch Data Protection Authority, which is then the leading supervisory authority. However, supervisors are also involved in the countries of the person (s) concerned, but they will then coordinate with the lead supervisor what should be done with regard to measures / fines.

I cannot access the AVG.Management Tool, what should I do?

If you cannot access the tool, you can do a number of things: The AVG.Management Tool runs on a security certificate from what was previously Comodo. You may receive a security warning telling you that the publisher is unknown. When this occurs you can check if your computer is up to date. We have noticed that customers with a Mac OS lower than 10.11 often get this message. You will have to perform a software upgrade to stop receiving this message in the future. For other problems you can send an email to helpdesk@avg.management.

Do I really have to delete everything when a right to be forgotten is exercised?

When exercising a right to be forgotten, there are a number of things to consider. There are exceptions to the right to be forgotten. The right to be forgotten does not apply to the following legal bases: Contractual agreement, legal obligation, vital interests and task of general interest. Two things you should take into account in any case are: The VAT Act, which falls under the fiscal retention obligation. This means that you must keep all invoices from you and your customers (VAT Act Art.35c) for 7 years (fiscal retention obligation). In addition, under the fiscal retention obligation, you must keep the following things for 7 years: the ledger the debtor and creditor administration the stock administration the purchase and sales administration the payroll This means that even if an employee exercises a right to be forgotten, you may not remove the payslips until the 7 years have passed. For exceptions to this retention obligation, please refer to the source: De Belastingdienst In any case, these are the things that all organizations must preserve. It may be that, based on the type of personal data, other retention obligations also apply.

// FAQ


What does the Antivirus Service work on?

The Antivirus Service Agent can be installed on the following operating systems:

  • Windows® 7 SP1 (Build 6.1.7601)Windows® 10 of higher
  • Windows Server® 2008 R2 SP1 (Build 6.1.7601)
  • Windows Server® 2012 R2 or higher


  • Microsoft Outlook® 2019
  • Windows Terminal Server
  • Sharepoint Server


2 GHz CPU, 2 GB RAM en 500 MB HDD

The file to be downloaded is 46 MB and 86 MB after installation

How much maintenance does the Antivirus Service cost?

The Antivirus Service is provided with an automatic update functionality. Set it and forget it!

What Does the Antivirus Agent Do?

The Antivirus Agent takes care of:

  • Guard
    • Activate / deactivate virus, adware and spam protection modules

  • Update
    • Overview of the update status

  • Quarantine
    • Files classified as harmful and how to deal with them

  • Scan
    • Start scan, change scan profiles or create new ones
Do I have to uninstall my old antivirus program before switching to the Antivirus Service?

It is generally strongly recommended that you uninstall your old antivirus program before installing a new one. This is because two antivirus solutions on the same system can really work against each other and slow down the system enormously.

What can you manage with the Antivirus Service Portal?

In the dashboard of the Antivirus Service you can manage:

  • License Management
  • Quarantine management
  • Management of client settings
  • System status (threats, current)
  • Independent of domains and locations
  • Warnings
What does the Antivirus Service for mobile or tablet actually include?

The Antivirus Service for Android devices has been awarded as a high-performance antivirus solution for Android. It proactively protects your phone or tablet from malware in apps and from the internet. This technology, developed in-house by Ikarus Security, is ideal for securing your mobile devices.
Find and remove all kinds of malware without noticeable impact on your battery life or memory usage. With a paid version you have more functions such as privacy control and SMS Blacklisting.

What does the Antivirus Service for mobile or tablets work on?

Operating systems

  • Android version 4.1 or higher


  • Android smartphone or tablet
Does the Antivirus Service also work abroad?

As long as the device is connected to the Internet, the Antivirus Service will continue to work.

How does the antivirus service for mobile or tablet perform?

AV-Test -Android Certification:

  • 99.2% real-time detection of the latest Android malware,
    99.6% detection of current Android malware from the last 4 weeks
  • an influence on the battery life
  • does not slow down the use of the device in normal use
    Generates little network load

PCSL – Android Certification

  • Detection rate of 99.9% and no false messages
  • Won 5 star award in the PCSL Android Malware Detection Test

OPSWAT Gold Certified – Anti-Malware
  • Apps are tested against lists of known malicious apps
  • Application installers and binaries are scanned by various anti-malware engines from the Metadefender Cloud and should not be flagged more than four times
  • Apps should be completely uninstallable without leaving any running functions in the system
How does the antivirus service perform?

Virus Bulletin – VB100- Windows Certification:
  • proven at least 99.5% of malware detected
  • generates no more than 0.01% false alarms when scanning a large collection of “clean” samples
  • meets all these requirements with default settings in the VB test environment on two test platforms

OPSWAT Gold Certified – Anti-Malware
  • Apps are tested against lists of known malicious apps
  • Application installers and binaries are scanned by various anti-malware engines from the Metadefender Cloud and should not be flagged more than four times
  • Apps should be completely uninstallable without leaving any running functions in the system
// FAQ

Password Management

What is the ID Control Password Management service?

The ID Control Password Management service is a way to generate and store unique and complex passwords. You can use the built-in password complexity checker to see how strong your passwords are. The Password Management service also provides a way to see whether your passwords have ever been found in a breach so you can rest assured that no one other than yourself has access to your passwords.

What is the use of a group?

The grouping functionality is designed to make it easier for your employees to access certain systems that are important to them. Consider, for example, an HR employee who can only access groups that the HR needs access to using groups.

What if I want to access my passwords from a mobile device?

Using our Android and iOS apps you can access your passwords even from your mobile devices. For this you have to download the app and login to your Password Management account to access all your passwords. You can view, edit, copy and paste the passwords in your account to use in your other mobile apps.

I'm getting a message telling me that I need to generate a "Security Report". What is that?

The Security Report feature is a quick way to keep your passwords safe. You can see how strong your passwords are and you can also check if they have been leaked in a data breach. Here you can also see if you have used passwords twice or if a password is too old and should be changed.

What is Single Sign-On (SSO)?

Single Sign-On refers to a method where you can log in at a central place and not have to input your passwords at connected services. When using Single Sign-On (SSO) there is a small file that is placed on your computer (called a “cookie”) which can identify you when you surf to other websites and can automatically log you in.

Isn't a single username and password for different sites and services less secure?

In theory the use of a single username and password is indeed less secure. That is why we add an additional layer of security by requiring you to login using both a username and password and a one-time password that can be generated on a mobile phone by using SMS or a one-time password generating app, or you can purchase a small device that generates these one-time passwords that you can hang on your keychain.

What is the ID Control Strong/Mutli-Factor Authentication service?

The ID Control Multi-Factor authentication provides an additional layer of protection to your logon by requiring you to use something you know (your username and password) and something you have (like a mobile authenticator that generates One-Time Passwords).

Which types of login methods are supported?

With the ID Control Multi-Factor Authentication you can use the following options:

– SMS (MessageID)
– OTP generating app such as (but not limited to) Google/Microsoft Authenticator, FreeOTP or Authy
– Hardware OTP generator, this is a small device with a display that generates One-Time Passwords.
– OTP by email (MailID)

What happens when I lose my hardware OTP generator?

When you lose your hardware OTP generator you can login to the ID Control Strong Authentication user panel and set your token to “Lost”. You will be given a temporary password you can use instead of your OTP until you are given a new hardware token. The temporary password is valid for 10 days.

Why use the Password Management service instead of Mozilla Firefox or Google Chrome

While Google Chrome and Mozilla Firefox offer the option to remember your passwords they lack the ability to generate secure passwords for you. Also when you want to access these passwords you are bound to that particular browser to use the passwords. The Password Cloud offers you the option to take the passwords with you regardless of your browser or device. Just log in to the Password Cloud using your masterpassword and one-time password and access all of your accounts!

Which browsers are supported?

The web interface can be reached using every browser, but when you want to autofill your passwords using our browser extension, using Firefox or Chrome is recommended.

How are my passwords protected?

Your passwords are protected using multiple layers of encryption, both while traveling over the internet and when stored on the server.

We use NaCl for the server and the front end (the web page from where you can login). We chose not to go with the well-known RSA and AES because even though they are well-known they are also very easy to implement wrong.

When you are using our browser plugin all your passwords are encrypted before leaving your browser and will never travel the internet in the open! When pulling a password from the server that is also encrypted until it reaches your browser. All your passwords are also encrypted while stored on the server so even the server admins can’t access them!

Can I share a password with a friend who doesn't have an account?

You can share passwords using the “Link share” functionality. This will create a link for you to send to your friend where they can see the password. You can also optionally choose to either set a password on that password link and set an expiry date or use count (for example: the link will only be able to be seen once).

What protocols are supported?

Our Single Sign-On solution makes use of open standards such as the SAML standard and the OpenID standard to ensure maximum compatibility and flexibility.

Where is my username and password stored?

This can be dependent on how the Single Sign-On is implemented. The Single Sign-On platform can import users from your office userbase (for example using Active Directory), your webserver (for example using SQL), or can be put in manually. When using your own office userbase your username and password are stored there and can be changed there.

How can I use the Multi-Factor Authentication platform?

When you purchase a service (either Password Management, Single Sign-On management or the Combi-Package) you need to create a user in the Mutli-Factor Authentication platform. When you have created that user you can assign it tokens. What types of tokens are supported are explained in “Which types of login methods are supported?”. Once the users have tokens assigned to them they can use the Strong Authentication to login to their services.

How can I register my mobile phone to recieve OTP's?

If you are using SMS based One-Time Passwords you need to enter your phone number in the Multi-Factor Authentication platform and assign yourself an SMS token. When using an OTP generating app, create a “Software token” and then scan the QR code with your Authenticator app.

What happens when I lose my mobile phone?

If you’ve lost your mobile phone you can login to the Multi-Factor Authentication platform to set your mobile token as “Lost”. This will create a temporary password you can use instead of your One-Time Password. The temporary password is valid for 10 days.

// FAQ

Secure Remote Access

How does the Remote Access Cloud work?

The Remote Access Cloud is a solution with which you can surf to a website using a webbrowser of choice (for example Google Chrome, Mozilla Firefox, Opera, Edge etc) and get connected to your computer at the office.

What do I need to use the Remote Access Cloud?

The only thing that is required to use the Remote Access Cloud is a web browser! This way you can make use of the software whether it’s on your computer at home, your laptop on the road or your mobile phone!

What is the use of a group?

The grouping functionality is designed to make it easier for your employees to access certain systems that are important to them. Consider, for example, an HR employee who can only access groups that the HR needs access to using groups.

Do I need a VPN to use the Remote Access Cloud?

No, the Remote Access Cloud can be used without a VPN, just log into a website using a browser of choice (Google Chrome, Mozilla Firefox, Edge etc) and start working!

Can I record a remote session?

Yes you can! You can configure the Remote Access Cloud to record your sessions and then disable it after your session is done.

How can I make sure that I can always connect to my computer?

To ensure that the computer is always available, it is useful to ensure that it does not go to sleep after a certain period of inactivity. Follow the next steps:

Press Start and type “powercfg.cpl” without quotes and press Enter.

In the next screen click Change when the computer sleeps.

In the next screen select Never at “Put the computer to sleep”.

Now click Save Changes and you’re done!

// FAQ

Video Conferencing

Which browser or app should I use?

We recommend using Chromium based browsers for Video Conferencing. 

Chromium based browsers are for example:

Bleow you can find the Android and iOS Apps for mobiles and tablets:.


Other people don't seem to hear me.

First confirm that your microphone is connected to your computer, after that click the 3 dots in the lower right corner of the screen to open up the More actions menu.

With this menu open, click on Settings. In the following dialog box you can check whether your microphone detects any input, if not, try switching to a different microphone.

How do I share my screen?

1. Select the little monitor icon in the lower left corner.

2. In the pop-up window, select the “Application Window” tab.

3. Select the Application you want to share (usually Powerpoint or PDF-Viewer)

4. Press Share (you have to click on a tile (3) to activate the ‘Share’ button)

You can of course share your entire screen (the tab most left in step 2) but then you’ll have to hide your Videomeeting window. Otherwise you get an infinite video-loop.

And you can share just a tab from the browser your Video-meeting runs in. For this pick the tab to the right.
Video conferencing

The videos from the other participants seem to go black all the time


his is normal behaviour. Only 3 to 4 participants video is shown at the same time to save bandwith and computer power as the more videos are in a conference the more resources are needed. And each video adds exponentially to the load.

So whenever someone speaks, that video is shown. And if that participant goes silent for a while his video will not be transmitted to the others anymore. 

I am a Mac user, what do I have to consider?

We recommend Google Chrome Browser or Firefox, Safari is not supported.

You also need to enable camera, microphone and screen capture in your settings. Go to “System Preferences” -> “Security” -> “Privacy”. Allow Google Chrome to access “Camera”, “Microphone” and “Screen Capture”.

How do I set a password for my call/meeting?

To set a password please click the information icon at the bottom right of your screen. This opens a popup screen similar to the one down below. To add a password please click add password. After doing this you can type a password. To confirm the password press enter on your keyboard.

To cancel the password press cancel password.

Can I blur my background?

This feature of Video Conferencing is to blur your background. It might have influence of your computers performance.
Manage Video Quality

Can I communicate without voice chatting? / Can I Send chat messages during a call?

Of course, you can. Just move your cursor over to the bottom left of the browser screen and click open/close chat. This opens a chat window on the left side of your call. This can be used to send chat messages

Chat can also be opened by pressing C on your keyboard

Can I mute/unmute myself?

Yes simply click the microphone icon at the bottom center of the browser to mute/unmute yourself.

Muting/unmuting your microphone can also be achieved by pressing M on your keyboard 

How do I leave a call?

To leave a call simply click the red phone icon at the bottom center of your browser.

Are there any other views available?

There is a tile view that shows all participants in a tile formation. To use this simply press the four tiled icon at the bottom right of your browser. This view is great to see everyone if they are using a webcam, or to see multiple shared screens at once. You can also use W on your keyboard to enter and exit tile view.

Can I change my displayed name?

To change your displayed name, click on the three dotted icon at the bottom right of your browser to open the menu shown below.

Then either click on the current name or Settings and navigate to the profile tab. On this tab you can change you displayed name, to confirm press Ok.

Can I change the quality of the video?

To change the video quality settings, click the three dotted icon at the bottom right of your browser and then click on Manage video quality. This opens a screen where you can select your preferred quality from Low bandwidth, Low definition, Standard definition, or High definition. After making you selection click Done to confirm it.

How can I protect a meeting?

To make sure that only invited participants can enter the meeting room, you can set a password. Keep in mind: The meeting rooms are volatile, i.e. the password is only valid once you open the meeting and expires once you close it.

I cannot hear other people.

When you cannot hear other people in the conference, please make sure your audio works by playing some music or a video on Youtube. If that works please make sure that the tab of the meeting isn’t muted, you can check this by looking at the tab name in the upper side of your screen.

This session has been muted and can be unmuted by clicking on the speaker icon.

I have performance problems, what can I do?

You can define the level of quality of the video stream that is sent to you from the server. Best is to try out different levels to see which one works best.

Open ‘more actions’ menu

Press the three dots in the bottom right corner.

Manage video quality

Chose “Manage video quality” from the menu.

Manage Video Quality

Pick the quality level

Reduce the quality level. You can choose from the following options:

  • High definition – this is the best quality but uses the most resources.
  • Standard definition – the video is still qood but not as good as in High definition
  • Low definition – the full screen video is quite blurry
  • Low bandwidth – Audio only, no video is transmitted
How can I become host of a meeting?

The first person entering a meeting becomes host at the moment. So be early makes you host.

This behaviour will change if/when we have (strong) authentication for the host being put back in.

Why do I get an error message and what should I do?

We didn’t answer your question? Get in touch with us via +31 888 SECURE (732873)

How do I choose a meeting name?

A meeting room is created as soon as you assign a name and activate the link generated on it. But there can only be one! Choose the name of your room so individually that it cannot be easily confused or quickly guessed. Ps. The meeting room is only valid once you open the meeting and expires once you close it.

F.e https://free.videoconferencing.services/kickoff-15-june

Is there any way to show the speaker I want to speak without interrupting them?

Of course, just simply click the hand icon on the bottom left of your browser to raise your hand. This shows the speaker that you would like to speak. To stop this simply click the hand again to lower it.

I want to start/stop sharing my webcam, how can I do this?

Simply click the camera icon at the bottom center of your screen to start/stop sharing your webcam

You can also start/stop your camera by pressing V on your keyboard

Is there a way to share my presentation/document/entire screen with the other participants?

To share your entire screen or any open screen simply click the Screen icon at the bottom left of your browser.

Afterwards it will ask for permission and which screen you would like to share

After selecting a screen press allow to share the selected screen with all participants

How do I remove the password from my meeting/call?

To remove a password from your meeting first click the information icon at the bottom right of your browser. This opens a similar screen as shown in the image below. Then simply press remove password to remove the password and allow free access to your call/meeting.

How can I enable full screen view?

To switch to full screen view, click on the thee dotted icon at the bottom right of your browser and then on view full screen. You can also use S on your keyboard to enter or exit full screen view.

How can I stream a meeting to YouTube?


// FAQ

Unified threat management

What is Unified Threat Management?

The term Unified Threat Management refers to a single (virtual) appliance typically used as a firewall that integrates the most common security solutions, including:

  • Firewall
  • (WiFi) Captive Portal
  • Webfilter
  • Intrusion Detection and Prevention
  • Data Leakage Prevention
  • Network Address Translation (NAT)

Most UTMs also include a VPN to connect to the network from your home computer or while on the go.

What is a web filter?

ID Control's web filter gives you the option to block dangerous websites, content and applications. For example, you can choose not to let your employees use social media so that they cannot be distracted.

You can filter by the following criteria:

  • Time
    You can set a filter in which you can set, for example, that the use of social media is not allowed during office hours
  • Location
    You can block traffic to and from a particular place when this traffic has a higher classification of risk
  • Role of employees
    You can create groups of employees that each have different restrictions and permissions
  • Active Directory integration
    When the connector is installed on Windows, users can be easily adopted
What is Intrusion Detection and Prevention?

Intrusion Alarm Systems (IDS) are systems designed to receive signals that indicate an intrusion into the network or the computer they are monitoring. ThreatControl's intrusion detection system targets incoming network traffic which it analyzes and compares against what is known as “good traffic” and when that does not match, generates a detection alarm.

When this alarm is generated, the connection is automatically disconnected, preventing further intrusion (prevention).

Can I block specific websites or groups of websites?

With our web filtering, you can choose to block specific websites or categories of websites based on certain characteristics such as the class of the website (news site, video site, photo site), geographic location, risk factor of websites (websites that offer illegal software downloads by torrents). use), and much more!

Can I see which websites which websites my users visit?

With the web filter module, statistics can be displayed about internet use, specific websites that the users go to are not shown, but you get an overview at the macro level of the websites that have been visited (for example, social media).

Can I enable strong authentication on the VPN access?

It is possible to implement strong authentication on the VPN access. You have to keep in mind that when you log in to the VPN you add the one-time password to your password. When you set up strong authentication, you can set whether the one-time password should be before or after your normal user password.

What are the hardware requirements to run Unified Threat Management?

The ThreatControl UTM mini UTM requires that you have at least:

  • 500 MHz CPU
  • 512 MB RAM
  • 4 GB SD card to install reduced system

Minimum specifications for full installation:

  • 1 GHz dual-core CPU
  • 1 GB RAM
  • 40 GB SSD / HDD
  • The full system installer requires a minimum of 1 GB RAM

Recommended specifications for full installation:

  • 1,5 GHz multi-core CPU
  • 4 GB RAM
  • 120 GB SSD
What is a VPN?

A Virtual Private Network (VPN) is a technology that allows you to establish a secure network connection to a remote network, thereby making you part of that particular network. Consider, for example, your company network: If you have files on a server that you can only access when you are on location, you can use a VPN to set up a connection to that location so that you can still access your files remotely.

What is a firewall?

A firewall is a device that secures and monitors incoming and outgoing connections and usually serves as a bridge between the internal network and the Internet.

Can I import my users from Active Directory?

You can use Active Directory for authentication and authorization of (certain parts of the) management console. To do this, you need to add an LDAP server and add a user who can read the user information on the Active Directory side (bind user). You can then use this user to request user information from Active Directory.

Can I enable strong authentication on the management console?

It is possible to secure the administrator environment with strong authentication. You can use your favorite Authenticator app for this or an RFC 6238 compliant Time-based One Time Password token.

// FAQ

Email solutions

What types of emails should be encrypted?

Not all emails sent need to be encrypted. Emails to be encrypted are emails containing confidential information. 

How long will the encrypted messages I send be available to the recipients?

Encrypted emails are available for 30 days from the date of sending.

Can I use SwitchMail with any mail environment?

Yes, SwitchMail supports all email environments including Exchange and Office365,

Does SwitchMail also support other encryption and digital signing techniques?

Yes, SwitchMail offers the most options for email encryption, decryption and digital signing. You can think of S / Mime, PGP, PDF Encryption and TLS.

How can I place a search in the archive?

SwitchMail Archiving provides the ability to place searches for messages, sender, recipients and even within attachments based on your archiving policy with reports. You can also bookmark these reports.

Can I also search through mail folders, contacts and calendars?

Yes, mail folders, contacts and calendars can be browsed.

Can I export evidence to PDF?

Yes, every search result in SwitchMail Archiving can be exported in PDF format to serve as proof.

Can I archive Office365 or Gsuite?

Yes, you can archive this email locally in the EU. You can then adjust the data retention policy at Google or Microsoft.

What is strong authentication?

The ID Control Multi-Factor Authentication provides an extra layer of protection for the login recipients and users of Secure Email encryption or archiving by requiring them to use something they know (their password) and something they have (such as a mobile authenticator that provides one-time generated passwords).

Strong authentication can also be used for the sender, but a separate module must be purchased for this.

How can I register my mobile phone to receive OTPs?

 If you are using a one-time passwords App you can scan a “Software Token” using the QR code with your Authenticator app.

How do I send an encrypted email?

To send an encrypted email, simply enter the keyword [secure] (without brackets) anywhere in the subject line of the message. Note that you don't have to put spaces between the subject of the message and the tag [secure].

Can the recipient reply to an encrypted e-mail?

If you see the “Reply” link, it is because the sender of the message allows the recipients to reply to the message. If the recipient is allowed to reply to a message, the reply will be sent securely via SwitchMail.

Can the DLP module detect all information leaks?

The DLP module protects against accidental data breaches, but does not protect you from an experienced attacker. Any DLP vendor who claims to be able to detect all information leaks is not telling the full story.

Can I encrypt Office365 emails?

Yes, you can send your mails using Office 365 encrypted with SwitchMail.

Tip: Also take a look at SwitchMail Archiving for Office365

Can I also archive and search shared email boxes?

Yes, you can grant multiple users or groups access to a shared mailbox.

Can I also use SwitchMail Archiving for backup and restore purposes?

Yes, the archive can be backed up, exported or restored in the mailbox. Even if you change mail environment you will not suffer from legacy.

Where does this Archive run?

Your email archive is located in the Netherlands or Europe in an ISO 27001 certified data center which is managed by ID Control as processor.

Which email services are supported?

Almost all email servers and services are supported that organizations use.

What types of login methods are supported?

You can use the following options:
– SMS (MessageID)
- OTP generating app such as (but not limited to) Google / Microsoft Authenticator, FreeOTP or Authy