Secure Data Transfer

"Now we can go to any healthcare provider in the Netherlands and say 'this is all functioning according to Dutch healthcare regulations'."

Rob Christ, Damecon

Our partners

Trusted by
1000+ IT Solution Providers and Enterprises

Core Plus
Red Bull
Next Phaze
OGL Computer

We have a financial advisor franchise customer with a small office that doesn't justify having a server. We used CentreStack to provide a cloud-based server. Getting their IT department's approval was difficult- they checked everything out, but CentreStack was ultimately approved as compliant because their data was secure.

Jay Parisi

What is Secure Data Transfer?

In business team communications, such as working with colleagues and business partners, there is often a need to transfer files electronically. The files being transferred usually contain confidential business information, so securing the transfer is essential. For example, Microsoft Teams is one way of doing so by uploading files into a corporate OneDrive account, allowing employees to share securely. However, secure data transfer is not as easy when the senders and receivers are not from the same business units or the same corporation.

In secure data transfer, you would prefer to see several parameters protecting the data transfer. The primary parameters include controlling who the receivers are, how long the file-sharing will last, and the receivers' permissions to the files.


Granular Permission Controls

Traditional file server security and permission control are set centrally by system administrators and challenging for each employee to use. When employees find legacy security measures difficult to follow and opt for consumer solutions such as Dropbox without any granular permission controls, compliance can easily be compromised regarding data leakage, data privacy, data ownership, and data security in general.

Granular Permission Controls


File Sharing and Transfer Options

Microsoft Teams is great in sharing files based on the underlying OneDrive technology. However, it is not easy to set options such as how long the file-sharing lasts; nor is it easy to set whether the files can be downloaded locally. To transfer data securely, other advanced controlling parameters such as the approved IP address range for receiving files, whether the files are read-only or downloading is prohibited, are required to provide a completely secure data transfer solution.

File Sharing and Transfer Options

Transfer Data Securely with Granular Permission Controls

The Solution

CentreStack provides a secure data transfer platform that simplifies access and collaboration while maintaining compliance and control to satisfy both needs. There's no point in having a secure solution that is difficult to use, so CentreStack is focused on making the user experience as seamless and straightforward as possible without sacrificing data privacy, security, or control.

CentreStack Solution

CentreStack adds secure remote access and file sharing, disaster prevention and recovery to file servers on-premises with easy cloud migration to private cloud storage. It is a secure data transfer and private file sharing solution you have been looking for!


CentreStack is privately hosted by the corporation itself. It is privacy by design without shared-hosting with other companies.


The compliance center provides features such as GDPR and HIPAA checklist.


There are many control parameters from permissions, group, and access policies to audit trace and file download logging.


Security measures covering data-at-rest, data-in-transit, authentication integration with Active Directory and NTFS permissions.

Secure Data Transfer Solution

Secure Data Transfer Solution

Outlook Integration

Automatic conversion of email attachments to links can avoid file transfer through third-party servers. Files are protected using data-at-rest encryption with secure data transfers over SSL.

Secure Data Room

Provide secure access to files with view-only permissions. Ability to disable downloading and editing.

Co-Editing and Authoring

Easily collaborate on files with internal and external users using native applications or through Office 365 integration.


Add publicly accessible links to email signatures, websites, and more to simplify external sharing.

Granular Permissions

Control access to shared files using granular folder permissions that control which users and groups have read, write, or sharing permissions.

Secure Data Transfers and Compliance

How can you blame emergency workers with comments like, "I don't have time to think about compliance when someone's life is on the line!"? This kind of thinking demonstrates the challenge of maintaining compliance as users are drawn to the most effective ways to get their job done, which often translates to transferring files as email attachments or using unauthorized consumer-grade services like personal Dropbox accounts. The key to solving this problem is to provide a secure data transfer platform with a simple user experience. This is where CentreStack can help.


Easily access or share data from any location or device with familiar mapped drives, mobile applications, and web browsers.


Keep data on existing file servers and share it without replicating it to third-party storage or email servers with a web link.


Maintain compliance with permissions, auditing, and reporting for access and sharing, compliance tools for HIPAA, GDPR, and more.

Enhance Security by Increasing Productivity

Perhaps one of the unique benefits of the CentreStack platform and strategy is its ability to offer an enhanced user experience that improves productivity as an inducement for more secure user behaviors! Usually, products that are easier to use will reduce security. But CentreStack increases data privacy, security, and control while offering an experience that is fast, seamless, and easy for both internal and external collaborators.


Mapped drives delay downloads until files are opened and cached locally for fast future access, significantly reducing bandwidth and storage consumption. Users get local performance when working remotely.


Secure data transfers are initiated during natural workflow from mapped drives, mobile applications, or browsers, so users don't have to learn new secure behaviors.


Provide the same simplified experience for internal and external users, even when they are offline.

Secure Data Transfer Common Features

CentreStack eliminates the common drawbacks of remote file server access and online folder sharing solutions and provides the best of both worlds – the security and control of local file servers combined with the efficiency and productivity gains of online folder sharing to facilitate secure data transfer.

Secure Data Transfer Common Features

Folder Permissions

Define different permissions for folders at different levels of the directory structure or inherit from NTFS permissions directly.

Secure Data Room

Provide secure access to files with view-only permissions. Disable downloads and editing.

User Rights

From internal Active Directory users to external clients and partners, you can define user rights for folder sharing.


Shared folders are put under version control, and notifications are available for users subscribed to the folders.

Secure Data Transfer Common Features

Remote Wipe

For users' devices that no longer need to receive files, the remote wipe feature can remove those files.

Link Expiration

For web-based link sharing, the link expiration helps protect the file and folder access.

Endpoint Protection

Files and folders from corporate file servers cached on remote devices are subject to encryption and remote wipe.

Access Policy

From IP address range to device approval, there are access policies protecting data transfer.

Talk to a Specialist

Speak directly to one of our sales representatives by calling.

Contact Us

Have questions? Want to see a live demo? We'll be in touch.


Check out our help center for answers to common questions.

Ready to boost mobile productivity and enable the workforce to work from home today?