The following Photolok Frequently Asked Questions and answers provide the background and support information for Netlok’s innovative privacy and security solutions, as well as the advantages of its products. The specific instructions on how to use Netlok’s Photolok are available in the Photolok User Guide, which contains step-by-step instructions with screen shots.
Have more questions? Contact us here.
FAQs - Frequently Asked Questions
Netlok® is a cybersecurity software company that provides solutions for Identity and Access Management (IAM). Our mission is to make logging in frictionless, highly secure and habit-forming, by providing a passwordless login method (called Photolok®) that is simple to use. Photolok is an innovative password replacement that uses photos instead of passwords. Photolok has earned three cybersecurity innovation awards in the process. To learn more, see our Home Page and view the following video: https://vimeo.com/manage/videos/703013507.
Photolok protects your privacy in three ways:
First, it minimizes the information it collects from its customers. We do not ask for your preferences, current location, etc. like most application account setups. To use Photolok, we only ask for the following information when creating your account: first and last name, mobile phone with text capability, and email address. Most of this information is already available publicly and on most business cards. Netlok does not sell or give customer information to third parties. To verify identity and prevent underage users, we may also ask for your date of birth and address when we contact you by phone or email.
Second, Photolok is a passwordless, multi-factor authentication (MFA) login process. Experts from Microsoft, Google and elsewhere suggest that users who enable multi-factor authentication (MFA) for their accounts end up blocking 99.9% of automated bot attacks.
And third, your photos are private, which means that your login security is exceptionally secure unless you share your photos, which violates Netlok’s Terms of Use.
Photolok is more effective than password login because 81% of online breaches originate with compromised passwords, which makes passwords the weakest point of Internet security. Photolok is more than a password replacement. It also protects against BOTS, keylogging, shoulder surfing, sim card swapping, thermal camera and other external attacks.
Photolok also allows the user to label photos for situational security protection. The Duress photos work like a silent alarm that sends security alerts to the appropriate parties in situations where you have been forced to open your device and/or are in potential danger. You can also use a 1-Time photo to protect against shoulder surfing when working remotely or in public places.
Photolok uses photos instead of passwords to login to an authorized Internet and/or Intranet site. By replacing passwords with Photolok, the online user does not have to keep making their passwords longer or change them more frequently to gain better security. Instead, the user can select photos from Photolok’s library and click a label to save them. There are no complicated password rules that cost time and money. When logging in, the user clicks their account photos in the photo panels that appear on the Photolok login screen. With just two photo clicks, the user enters their authorized Internet or Intranet destination. It’s that simple. To see a short video on how the Photolok login works, go to www.netlok.com and click the arrow on how it works.
- Usability: Since it’s easy for users to remember, select, and change their login photos, the users’ online experience is simplified and frictionless. Photolok is designed to use point and click navigation and eliminate typing mistakes.
- Cost-effective: Password resetting is eliminated. The user simply labels a selected photo, and the photo is automatically saved in seconds. There are no password rules.
- Situational Security Alerts: The user can label photos (1-Time, Duress) for security alerts and protection in unsecure situations and/or forced entry circumstances.
- Authenticator Ready: Usable with Google, Microsoft, Authy, and other authenticators.
- Photolok Available Through Auth0: Netlok is a Social Connections Partner of Auth0 and offers Photolok in Auth0’s Marketplace. To learn more, go to … https://marketplace.auth0.com/integrations/photolok-mfa-login
- Photolok Available to Zendesk Users: Netlok has integrated Photolok to Zendesk, which allows users to switch from Zendesk’s password login to Photolok’s MFA login. The integration is available directly from Netlok by emailing photoloksales@netlok.com.
- Bad Actor Attacks Averted: Common hacking methods like BOTS and keylogging are blocked because the user’s photos are randomized within the photo pages and the encrypted identity codes are concealed inside the photos (patented steganography).
- Ad Revenue & Branding: In a business setting, photos can be used for co-op advertising, company branding, corporate communications, etc., to help offset the growing cost of cybersecurity operations.
- Agile Security Coding and Customization: Photolok’s program supports rapid changes in security levels and facilitates customized integration with customer access methods. Email photoloksales@netlok.com for more information on customized solutions.
- Patent Protected: The patents have been granted in USA, Japan, Canada, Mexico, Australia, and 10 EU countries.
To make it easy for first time users, Netlok provides the user with three photos during the account creation process. The new account owner can change their photos at any time by logging in using the Settings button and clicking the Photo icon on the upper left corner of the Settings page.
The login page has a button called “Forgot My Photos.” When the user clicks “Forgot My Photos” and follows the instructions on the screen, the user will enter Manage Your Photos page and be able to view their current photos to refresh their memory. The account owner can also change their photos when they are in the Manage Your Photos page.
Most companies will have to decide what works best for their company. Some of the advantages of using Photolok is that there are no password rules, and changing photos is fast and easy. It only takes a few seconds to label a new photo, and photos are easy to remember.
The best practices are…
- Do not show, describe, or share your photos with anyone.
- Do not post your photos on any social media site.
- Use “1-Time Use” photos in public areas or in situations when working remotely and where you think someone may be shoulder surfing or using a camera to see your photos.
- Use the “Duress” photo when forced to open your device by a bad actor (see 11 below).
- Change your photos anytime you think that someone was shoulder-surfing when you were opening your account.
A 1-Time Use photo can only be used once during the login process to prevent shoulder surfing. The 1-Time photo is removed from your account after one use.
The Duress photo works like a silent alarm to notify others that the user has been forced to enter their device by an unauthorized party and they need help. Two alerts are executed when a Duress photo is clicked: 1) a text message and 2) an email message. The recipients of these alerts must agree in advance to the action steps that are required when they receive a Duress alert.
Yes, Photolok can be used with smart phones, tablets, and laptops devices as long as they are connected to the Internet and have a signal strength of 2 bars or better. The speed and bandwidth of the Internet source affects the operating speed of Photolok.
Yes, Photolok is adaptable and can be configured for commercial and government uses from entertainment to national defense. Photolok has a robust administration function that accommodates the security needs of small to large businesses. Contact us about Photolok customization by emailing us at photoloksales@netlok.com.