SSL encryption is used for all communication with our servers, be it through the web interface, the sync tool or via the WebDAV protocol for mobile devices.
In addition, the server locations, company name and company location are all verified by a trusted third party.
Information security management
Enforce periodic password updates by configuring a number of days after which any user is forced to change their password.
Activate two-step authentication per user or per organization and require additional e-mail, mobile or authenticator verification to log in.
Use remote wipe to remove personal files or shares from any device on distance, in case the device is lost or stolen or when the employee changes functions or jobs.
Share securely with registered guests only and easily remove access to files or set download and expiration limits.
All information is stored only in datacenters with state-of-the-art physical access security, such as: Biometrics access restriction, Blast deflection walls, Anti-ramming defense barriers, Perimeter sensoring BMS system, CCTV & Motion detection.
ISO 9001 and 27001 certified data storage assure respectively proper quality management as well as compliant information security management