SafeShare benefits

How SafeShare security features benefit businesses, governments and defense.

Global compliance

Cocoon Data has employees who have worked in the defense industry. SafeShare has been built from the ground up to meet the highest compliance, security, and encryption standards based on their defense industry experience. SafeShare enables organizations to meet global compliance requirements such as, – NIST 800-171, FIPS 140-2, HIPAA, GDPR, ITAR and EAR, CCPA and the Australian Privacy ActSafeShare is certified to ISO/IEC 27001 standards and has undertaken regular external audits to ensure it meets and maintains strict adherence to compliance requirements and security standards.

End-to-end encryption

SafeShare has a powerful approach to end-to-end encryption. Utilizing the latest standards in HTTPS encrypted technology we secure all data transmitted sent and received by the client.
Additionally, our cryptographic engine encrypts each file on the client with its own unique AES-256 bit encryption key before shipping it over the wire.
The result is a powerful layering of cryptography, utilizing a FIPS 140-2 validated cryptographic module, that is currently unmatched in the market.


Create a virtual perimeter (geofence) to identify the location where the decryption keys will be served. Simply type in an address (street/city/state/country) and drag the polygon to expand or contract the coordinates limiting access to confidential data based on that location. For example, a geofence applied at a file or folder level to Texas would only authorize users within the Texas state area to access the geofenced data.

Time-based access controls

SafeShare has time based access control parameters to help data owners reduce risk by using set-and-forget access to sensitive or regulated data. Timed access can be used for project-based work such as external audits conducted by third parties and takes the human error of forgetting to revoke access to the data.


When a confidential file is shared with ‘View Only’ permissions the recipients see a view of the file in the SafeShare browser  but the file cannot be copied, printed or downloaded. As a deterrence to screen scraping, each view has a dynamically generated watermark that includes the email address of the user who accessed the document, unique tracking ID and the date/time stamp.

Multi-tenacy deployment

Organizations can deploy SafeShare as a private cloud to leverage  multi-tenancy capabilities. The architecture creates a tenancy view by subsidiaries, business units or departments within one parent company. This enables the segmentation of data and security management at the organizational, departmental, or team level.

Unique encryption key

Most file sharing tools use volume encryption to protect data. This means that 1 key is used to secure all the data on the server. Safeshare encrypts every single file with its own unique AES-256 bit encryption key. This allows for truly granular controls at the file level and provides superior security for your data.

Download the SafeShare features brochure