trustifi.com Open in urlscan Pro
2606:4700:20::ac43:481f  Public Scan

URL: https://trustifi.com/docs/general/authentication/opening-a-trustifi-encrypted-email/
Submission: On September 05 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://trustifi.com/

<form class="pix-small-search pix-ajax-search-container position-relative bg-white shadow-lg rounded-lg pix-small-search" method="get" action="https://trustifi.com/">
  <div class="input-group input-group-lg2 ">
    <input type="text" class="form-control pix-ajax-search form-control-lg shadow-0 font-weight-bold text-body-default" name="s" autocomplete="off" placeholder="Search for something" aria-label="Search"
      data-search-link="https://trustifi.com/wp-admin/admin-ajax.php?action=pix_ajax_searcht&amp;nonce=8e03b4bf12">
    <div class="input-group-append">
      <button class="btn btn-lg2 btn-white m-0 text-body-default" type="submit">
        <svg width="18px" height="18px" viewBox="0 0 18 18" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">
          <title>Shape</title>
          <g id="Blog" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd">
            <g id="blog-with-sidebar" transform="translate(-1217.000000, -831.000000)" fill="#BBBBBB" fill-rule="nonzero">
              <g id="Search" transform="translate(905.000000, 765.000000)">
                <g id="search" transform="translate(312.000000, 66.000000)">
                  <path
                    d="M17.784,16.776 L12.168,11.124 C13.104,9.972 13.68,8.46 13.68,6.84 C13.68,3.06 10.62,0 6.84,0 C3.06,0 0,3.06 0,6.84 C0,10.62 3.06,13.68 6.84,13.68 C8.46,13.68 9.972,13.104 11.124,12.168 L16.74,17.784 C16.92,17.928 17.1,18 17.28,18 C17.46,18 17.64,17.928 17.784,17.784 C18.072,17.496 18.072,17.064 17.784,16.776 Z M1.44,6.84 C1.44,3.852 3.852,1.44 6.84,1.44 C9.828,1.44 12.24,3.852 12.24,6.84 C12.24,9.828 9.828,12.24 6.84,12.24 C3.852,12.24 1.44,9.828 1.44,6.84 Z">
                  </path>
                </g>
              </g>
            </g>
          </g>
        </svg></button>
    </div>
  </div>
</form>

POST

<form id="wedocs-contact-modal-form" action="" method="post">
  <div class="wedocs-form-row">
    <label for="name">Name</label>
    <div class="wedocs-form-field">
      <input type="text" name="name" id="name" placeholder="" value="" required="">
    </div>
  </div>
  <div class="wedocs-form-row">
    <label for="email">Email</label>
    <div class="wedocs-form-field">
      <input type="email" name="email" id="email" placeholder="you@example.com" value="" required="">
    </div>
  </div>
  <div class="wedocs-form-row">
    <label for="subject">subject</label>
    <div class="wedocs-form-field">
      <input type="text" name="subject" id="subject" placeholder="" value="" required="">
    </div>
  </div>
  <div class="wedocs-form-row">
    <label for="message">message</label>
    <div class="wedocs-form-field">
      <textarea type="message" name="message" id="message" required=""></textarea>
    </div>
  </div>
  <div class="wedocs-form-action">
    <input type="submit" name="submit" value="Send">
    <input type="hidden" name="doc_id" value="17720">
    <input type="hidden" name="action" value="wedocs_contact_feedback">
  </div>
</form>

GET https://trustifi.com/

<form class="pix-search-form" method="get" action="https://trustifi.com/">
  <div class="media pix-ajax-search-container">
    <button class="pix-search-submit align-self-center" aria-label="search" type="submit"><i class="pixicon-search"></i></button>
    <div class="media-body">
      <label class="w-100 m-0">
        <span class="screen-reader-text sr-only">Search for:</span>
        <input value="" name="s" id="s" class="pix-search-input pix-ajax-search" type="search" autocomplete="off" placeholder="Search" data-search-link="https://trustifi.com/wp-admin/admin-ajax.php?action=pix_ajax_searcht&amp;nonce=8e03b4bf12">
      </label>
    </div>
  </div>
</form>

Text Content

Gartner® Market Guide for Email Security

Download The Overview


 * Products
   Outbound Shield™
   Powerful and customizable rules engine combined with advanced
   data-classification, AES-256 Encryption, DLP, and compliance management
   Inbound Shield™
   Multi layered, AI-based email protection against the most sophisticated
   phishing, ransomware, BEC/VEC attacks, SPAM and GRAY emails.
   Account Takeover Protection
   AI based technology gives admins visibility into all suspicious activity.
   Immediately detect, block and neutralize compromised accounts.
   Email Managed Detection and Response
   Leverage our specialized team of dedicated email security experts to manage
   threat response and serve as an extension to your IT/Sec departments
   Archiving
   Easily preserve, retrieve, search, and share all email communications in a
   secure manner with a next-generation eDiscovery for a single-point-of-truth
 * Industries
   By Industry
   Legal
   Healthcare Services
   Financial Services
    IT and Technology
   Gaming Casinos and Hospitality
   Education
   Public Sector
   By Size
   Enterprise Businesses
   Small & Mid-Size
 * Resources
   How to Videos
   Blog
   FAQ
   Resource Center
   Technical Documents
   Apps
   API
 * Company
   About Us
   Partners
   News and Press
   Contact Us
 * Tools
   Email Analyzer
   URL Defanger
   SPF Record Checker


Shape
Log In
Get a Quote



GENERAL

 * Frequently Asked Questions
 * Authentication
   * Opening a Trustifi encrypted email
   * PIN code sent by SMS/Phone call
   * A predetermined unique password set by the sender
   * PIN code sent by email
   * Single Sign On (SSO)
   * I’ve been blocked
   * Button doesn’t work?
   * Downloading attachments and replying
   * Request authentication method change
   * Additional information
 * Sensitivity Threshold
 * User onboarding guide
   * Introduction
   * Method 1: Invitations Sent from Admin
   * Method 2: Provide Users List to Trustifi Support
   * Method 3: Automatic Sign-Up via Email Relay
   * Method 4: Automatic Domain Onboarding
 * DLP rules & policies guide
   * Introduction
   * How does it work?
   * Using rules and policies
   * Additional information – conditions for rules
   * Additional information – results for rules
   * Additional information – policies
   * Common and recommended rules
 * Domain verification
   * Introduction
   * Requirements
   * The process
   * GoDaddy integration
 * Customized templates guide
   * Introduction
   * Creating a New Template
   * Editing a Template
   * Editing HTML in “Code View”
   * Using Dynamic Fields in Templates
   * Using Templates in Emails
 * Look & Feel customization
   * What can be customized
   * How to customize your Look & Feel
   * Creating different customizations under your plan
 * Admin and user roles in Trustifi
 * Trustifi deployment architecture
   * General information
   * Outbound integration
   * Inbound integration

 1.  
 2.  Home
 3.  
 4.  Docs
 5.  
 6.  General
 7.  
 8.  Authentication
 9.  
 10. Opening a Trustifi encrypted email


OPENING A TRUSTIFI ENCRYPTED EMAIL

Opening a Trustifi encrypted email

Trustifi uses military-grade encryption to protect sensitive data and
attachments sent over the email.

If one of your contacts uses Trustifi, they may have sent you an encrypted email
that looks something like this:



In this example, the sender has chosen to encrypt the email’s content and
attachments. Clicking on “Authenticate to Decrypt and Open Message” will open
the email in your web browser.

In order to view the email’s content and attachments, you will have to complete
multi-factor authentication using one of the following methods:

PIN code sent by SMS/Phone call A predetermined unique password set by the
sender PIN code sent by email Single Sign-On (SSO)

Still stuck? How can we help?

Updated on April 10, 2023


DOC NAVIGATION

PIN code sent by SMS/Phone call →
Was this article helpful to you? Yes 20 No 40



HOW CAN WE HELP?

Name

Email

subject

message


Products Outbound Shield Inbound Shield Account Takeover Email Managed Detection
and Response Archiving
Outbound Shield™ Email Encryption Data Loss Prevention Compliance Management
with One-Click Compliance™ Tracking & Postmark Proof Secure Storage and Back-up
System MFA Methods for Recipient Authentication
Account Takeover Protection Suspicious Activity Tracking Portal Geolocation /
New Device Detection Automated Alerts Suspicious Activity Detection
Inbound Shield™ Phishing Spoofing Business Email Compromise Malware

Sign Up for our Newsletter

Signup for our newsletter for news, product releases and best email security
practice.

Follow Us

By Industry Legal Healthcare Services Financial Services IT and Technology
Gaming, Casinos, and Hospitality Education Public Sector
By Size Small & Mid-Size Enterprise Businesses
Resources How-to Videos Blog FAQ Resource center Technical Documents Apps API
Company About Us Partners News and Press Contact Us
Connect with Us
PO Box 371753 Las Vegas, NV 89137
1-844-235-0084
Request a Demo
Cookie Policy | Privacy Policy | Anti-Spam Policy | Terms and Conditions
© 2023 Trustifi, LLC. All Rights Reserved.


Close
Search

Hit enter to search or ESC to close

Search for:



×
We Value Your Privacy
Settings
NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar
technologies on this site and use personal data (e.g., your IP address). If you
consent, the cookies, device identifiers, or other information can be stored or
accessed on your device for the purposes described below. You can click "Allow
All" or "Decline All" or click Settings above to customize your consent.
NextRoll and our advertising partners process personal data to: ● Store and/or
access information on a device; ● Create a personalized content profile; ●
Select personalised content; ● Personalized ads, ad measurement and audience
insights; ● Product development. For some of the purposes above, our advertising
partners: ● Use precise geolocation data. Some of our partners rely on their
legitimate business interests to process personal data. View our advertising
partners if you wish to provide or deny consent for specific partners, review
the purposes each partner believes they have a legitimate interest for, and
object to such processing.
If you select Decline All, you will still be able to view content on this site
and you will still receive advertising, but the advertising will not be tailored
for you. You may change your setting whenever you see the Manage consent
preferences on this site.
Decline All
Allow All
Manage consent preferences