"Everybody globally has access to the same files, which are all up-to-date and accurate, from a system that's also secure and easy to implement."
"Now we can go to any healthcare provider in the Netherlands and say this is all functioning according to Dutch healthcare regulations."
Director & Co-owner
"CentreStack is the best file server replacement solution on the market. They aren't just leading the market, but they basically created a new market."
Enterprises can use CentreStack to comply with their internal security requirements or regulatory standards like FINRA, HIPAA, Sarbanes Oxley, and more.
An essential component of compliance is recording the Who, What, When, and How attributes of every user action within the system. Admins can easily search and filter logs to identify incidents.
CentreStack uses industry best practices, tools, and robust encryption techniques to store and transmit data securely. Furthermore, its three-tiered architecture can be deployed entirely on-premise.
CentreStack provides an additional layer of login security using security codes sent via existing channels.
CentreStack's enterprise customers have performed extensive security audits, which have led to successful, secure deployments and advanced features like token-based authentication on mobile devices with expiring, revokable tokens, and certificate pinning.
Before transmission through a secure SSL connection, data is encrypted using AES-256 bit encryption. Encryption keys are private for each enterprise, even in a multi-tenant deployment.
CentreStack allows admins to revoke the access rights of specific devices, clients, and users.
CentreStack allows admins to remotely wipe corporate information from a lost or stolen mobile device, maintain confidentiality.
Information leakage occurs when sensitive business data gets into the wrong hands. CentreStack's on-premise deployment addresses third-party service threats, but the platform goes further to prevent information leakage by protecting business data across all devices.
CentreStack adds secure remote access and file sharing, disaster prevention, and recovery to file servers on-premises with easy cloud migration to private cloud storage. It is the real cloud file server solution you have been looking for!
CentreStack bridges file servers and cloud storage for secure remote access without the need for a VPN.
Accessing files and folders directly from within a web browser is as interactive as from a desktop drive.
CentreStack leverages cloud storage for secure mobile file sharing from a web browser or a mobile application.
CentreStack sets up a hybrid deployment between local file servers and cloud storage that can be seamlessly converted to cloud-only.
The remote access solution extends the current internal Windows file server's reach to remote locations via HTTPS and web protocols. It is privacy by default.
The internal Windows file server is the data repository for the newly added remote file access service. For employees, the files at work are the same files available remotely on mobile devices.
The same corporation owns the internal Windows file server and existing IT infrastructure, including the new CentreStack server, and the files and folders on the file server are privately owned.
Since files never leave the current on-premise file servers, it is much easier to pass compliance auditing. The new remote access server is the only component that needs additional work.
The same NTFS permissions that were in place to protect the internal Windows file server files will be the same permission control in place to protect the remote file access service.
Integrates with Active Directory for authorization and authentication.
Integrates with NTFS permissions control for file and folder access.
Integrates with SAML Single-Signon for authentication.
Supports Google Authenticator, Microsoft Authenticator, and Amazon MFA.
Company-wide policies are controlling different aspects of the solution.
The specific access policy is controlling files and folder access.
Supports Data-in-Transit and Data-at-Rest encryptions.
Encrypt local cache at the endpoint device for further protection.
Version control protects files and folders.
Besides NTFS permission control integration, more granular permission control can be defined.
The compliance center helps GDPR and HIPAA data compliance.
Self-host the file-sharing is the solution for further data compliance.