The following Frequently Asked Questions and answers provide the background and support information for Netlok’s innovative privacy and security solutions as well as the advantages of its products. The specific instructions on how to use Netlok’s Photolok are available in the Photolok User Guide, which contains step-by-step instructions with screen shots.
Have more questions? Contact us here.
FAQs - Frequently Asked Questions
Netlok® is a cybersecurity software company that provides solutions for Identity and Access Management (IAM). Our mission is to make logging in frictionless, highly secure, and habit-forming by providing a passwordless login method (called Photolok®) that is simple to use. Photolok is an innovative password replacement that uses photos instead of passwords. Photolok has earned three cybersecurity innovation awards in the process. To learn more, see our Home Page and view the following video: https://vimeo.com/manage/videos/703013507.
Photolok protects your privacy in three ways:
First, it minimizes the information it collects from its customers. We do not ask for your preferences, profile information, current location, etc. like most application account setups. To use Photolok, we only ask for the following information when creating your account: first and last name, mobile phone with text capability, and email address. Most of this information is already available publicly and on most business cards. To verify identity and prevent underage users, we may also ask for your date of birth and address when we contact you by phone or email.
Second, Netlok does not sell or give customer information to third parties.
Photolok is more effective than password logins because 81% of online breaches originate with compromised passwords, which makes passwords the weakest point of Internet security. Photolok is more than a password replacement. It also protects against BOTS, keylogging, shoulder surfing, and external penetrations. In addition, Photolok allows the user to label photos for situational security. The Duress photos work like a silent alarm that sends security alerts to the appropriate parties in situations where you have been forced to open your device and/or are in potential danger. You can also use a 1-Time photo to protect against shoulder surfing.
Photolok uses photos instead of passwords to login to an authorized Internet and/or Intranet site. By replacing passwords with Photolok, the online user does not have to keep making their passwords longer or change them more frequently to gain better security. Instead, the user can select photos from Photolok’s library and click a label to save them. There are no complicated password rules that cost time and money. When logging in, the user clicks their pre-chosen photos in the photo panels that appear on the Photolok login screen. With just two photo clicks, the user enters their authorized Internet or Intranet destination. It’s that simple. To see a short video on how the login works, see How It Works.
- Usability: Since it’s easy for users to remember, select, and change their login photos, the users’ online experience is simplified and frictionless. Photolok is designed to point and click and eliminate typing mistakes.
- Cost-effective: Password resetting is eliminated. The user simply labels a selected photo, and the photo is automatically saved in seconds. There are no password rules.
- Situational Security Alerts: The user can label photos (1-Time, Duress) for security alerts and protection in unsecure situations and/or forced entry circumstances.
- Authenticator Ready: Usable with Google, Microsoft, Authy, and other authenticators.
- MFA Agile: Photolok can be used by itself or integrated with other login methods such as biometrics, Single Sign On apps, and other hardware devices.
- Bad Actor Attacks Averted: Common hacking methods like BOTS and keylogging are blocked because the user’s photos are randomized within the photo pages and the encrypted identity codes are concealed inside the photos (patented steganography).
- Ad Revenue & Branding: In a business setting, photos can be used for co-op advertising, company, and fan club branding, etc. to help offset the growing cost of cybersecurity operations.
- Agile Security Coding and Customization: Photolok’s source code supports rapid changes in security levels and facilitates customized integration with customer access methods. Email firstname.lastname@example.org for more information on customized solutions.
- Patent Protected: The patents have been granted in USA, Japan, Canada, Mexico, Australia, and 10 EU countries.
To make it easy for first time users, Netlok provides the user with three photos during the account creation process. The new account owner can change their photos at any time by logging in using the Settings button and clicking the Photo icon on the upper left corner of Settings.
The login page has a button called “Forgot My Photos.” When the user clicks “Forgot My Photos” and follows the instructions on the screen, the user will enter Manage Your Photos and be able to view their current photos to refresh their memory. The account owner can also change their photos when they are on the Manage Photos page.
Most companies will have to decide what works best for their company. Some of the advantages of using Photolok is that there are no password rules, so changing photos is fast and easy. It only takes a few seconds to label a new photo and the photos are easy to remember.
The best practices are…
- Do not show, describe, or share your photos with anyone.
- Do not post your photos on any social media site.
- Use “1-Time Use” photos in public areas or in situations where you think someone may be shoulder surfing or trying to see your photos.
- Use the “Duress” photo when forced to open your device (see 11 below).
A 1-Time Use photo can only be used once during the login process to prevent shoulder surfing. The 1-Time photo is removed from your account after one use.
The Duress photo works like a silent alarm to notify others that the user has been forced to enter their device by an unauthorized party and they need help. Two alerts are executed when a Duress photo is clicked: 1) a text message and 2) an email message. The recipients of these alerts must agree in advance to the action steps that are required when they receive a Duress alert.
Yes, Photolok can be used with smart phones, tablets, and laptops devices as long as they are connected to the Internet and have a signal strength of 2 bars or better. The speed and bandwidth of the Internet source affects the operating speed of Photolok.
Yes, Photolok is adaptable and can be configured for commercial and government uses from entertainment to national defense. Photolok has a robust administration function that accommodates the security needs of small to large businesses. Contact us about Photolok customization by emailing us at email@example.com.