How does the custom domain system work?
Each client receives their own dedicated subdomain for complete isolation and branding. For example:
- Production: https://yourcompany.enablement.us
- QA/UAT: https://yourcompany.enablement.cc
- Development: https://test.enablement.cc
This architecture ensures complete data isolation between clients while providing seamless integration with your existing IT infrastructure. Each domain operates independently with its own security controls and access policies.
What is your visitor risk scoring system?
Our advanced security system creates unique visitor IDs and evaluates access requests using multiple risk factors including:
- Geolocation and IP reputation analysis
- Device fingerprinting and behavior patterns
- Historical access patterns and anomaly detection
- Real-time threat intelligence integration
High-risk visitors are automatically blocked or challenged with additional authentication requirements, ensuring only authorized users can access your sensitive data.
How does your encryption system protect my data?
Our encryption provides comprehensive protection using:
- Data at Rest: AES-256 encryption with Hardware Security Module (HSM) key management
- Data in Transit: TLS 1.3 with perfect forward secrecy
- End-to-End: Client-side encryption ensures keys never reside on devices
- Future-Proof: Quantum-resistant algorithms already implemented
This means your data is protected against insider threats, subpoenas, and even quantum computing attacks.
Does Enablement® require software installation or plugins on user devices?
No. Unlike leading competitors, Enablement® requires no software downloads, plugins, or cookies on user devices. Our solution is completely device-agnostic because keys never reside on devices.
Users can access their encrypted data from any device through a standard web browser. We provide one mobile app for iOS and Android that automatically detects the user’s organization based on their email address (username) during sign-in.
If a user’s email is registered with multiple organizations, the app provides options to choose the appropriate organization before granting access – ensuring seamless multi-organization support.
How does your passwordless security work?
Enablement® implements true passwordless security where passwords never leave the device – not even encrypted passwords are sent to our servers. This provides several critical advantages:
- Legal Subpoena Protection: If a password is lost, no one can recreate it, making the data permanently encrypted and legally subpoena-proof
- Zero Server Storage: Passwords are never stored on our servers in any form
- Device Independence: Users can only reset passwords after logging into the system
- Dynamic Key Generation: Private keys are dynamically generated and don’t require exchange between devices
This approach makes compromised passwords impossible to exploit and ensures your data remains protected even under legal compulsion.
How is Enablement® different from competitors like PreVeil, GCC High, and Virtru?
Enablement® provides superior security architecture compared to major competitors:
- vs. PreVeil: Our private keys are dynamically generated without requiring users to exchange keys with other devices
- vs. GCC High & Virtru: We don’t use centralized key management systems, eliminating insider threats and legal subpoena vulnerabilities
- vs. All Competitors: No software installation required, true device-agnostic access, and passwordless authentication that never transmits credentials
Our architecture ensures that even system administrators cannot access your encrypted data, providing unmatched protection against both external attacks and internal threats.