Security

Enterprise-grade security you can trust

Your documents are protected by the same security standards used by banks, governments, and healthcare organizations worldwide.

How We Protect Your Data

Multiple layers of security ensure your documents remain private and secure

256-bit AES Encryption

All files are encrypted using AES-256, the gold standard for data encryption. This is the same encryption used by militaries and financial institutions.

Zero-Knowledge Architecture

Your encryption keys are derived from your password and never leave your device. We cannot access your files—only you can.

End-to-End Encryption

Files are encrypted before they leave your browser and remain encrypted until you decrypt them. Data is never exposed in transit.

Two-Factor Authentication

Add an extra layer of protection with 2FA. We support authenticator apps, SMS codes, and hardware security keys.

Secure Infrastructure

Our servers are hosted in SOC 2 certified data centers with 24/7 physical security, redundant power, and network monitoring.

Comprehensive Audit Logs

Every action is logged with timestamps and user details. Full audit trails for compliance and security monitoring.

Granular Access Control

Control exactly who can access what with our comprehensive role-based access control (RBAC) system.

  • Role-Based Permissions

    Define custom roles with specific permissions for your organization

  • Folder-Level Security

    Set different access levels for different folders and departments

  • Time-Limited Access

    Grant temporary access that automatically expires

  • External Sharing Controls

    Password-protect shared links with download limits and expiration

RBAC

Role-based access

SSO/SAML

Enterprise login

API Keys

Secure integration

IP Allowlist

Network security

Compliance & Certifications

Designed to meet the most stringent regulatory requirements

GDPR Compliant

Full compliance with the EU General Data Protection Regulation. Data sovereignty options, right to erasure, and data portability.

SOC 2 Ready

Our infrastructure and processes are designed to meet SOC 2 Type II requirements for security, availability, and confidentiality.

ISO 27001 Aligned

Our security practices align with ISO 27001 information security management standards.

Data Residency

Choose where your data is stored. Options include UK, EU, US, and other regions to meet your compliance requirements.

Security questions?

Our security team is happy to answer your questions or provide additional documentation.