SafeShare is a secure file storage system that encrypts files at the user’s device before they are uploaded into the system. Access is controlled by authorised users who can allocate file or folder access permissions with a variety of options ranging from view only, to editing in browser, to full download access. Every step is securely logged for a full audit history. Access is logged against user ID and every unique encryption – there is no other audit like it.
When accessed by authorised individuals or staff using their bank credential, the encrypted document is either displayed on-screen as a watermarked pdf or downloaded and decrypted, depending on your access permissions.
This approach to high security data management is called ‘Data-Centric Security’, where the focus is on protecting the data itself, as the key assist, rather than reliance on traditional methods such as blocking intruders at the perimeter.
Because the files are encrypted end-to-end, one unique encryption key for each file, even if the system was to be compromised, your documents are protected from being read by anyone that you have not authorised.
Even your IT systems administrator cannot access the files within SafeShare, unless specifically authorised to do so by the document owner. The encryption keys are strictly managed by SafeShare to enforce access control according to the permissions.
SafeShare can encrypt files of any size or type.
File types up to 15MB are encrypted at the user’s device.
The ‘view only’ access permission is supported for 35 common file types, which SafeShare automatically converts to a watermarked pdf to enable this feature.
SafeShare users can be physically located anywhere, either within or external to your company network.
Authorised users can access the system from a web browser, mobile devices via an IOS or Android app, or Windows client.
User validation can be set to ‘2 Factor Authentication’ (2FA) for additional security, where the logon includes verification from a mobile phone or computer app soft token or connected to company ID credential’s.
Document availability schedules can be set to manage secure document sharing within a date/time window.
Use cases can include restricting access to sensitive files for the duration of a project or controlling availability of confidential documents during a tender process.
Lock files anywhere by managed encryption key service – ‘you only get the keys if you are inside the fence – like your office address.
For the first time in the world, access control, tied to ID, tied to encryption keys for content is now governed by where in the world you are – from locking content to a single tower to blocking access in a foreign country – data security has never looked like this for compliance. Dramatically reduces unauthorised leeks in financial services and lock data to authorised executives. A new paradigm shift from email attachments.