"Now we can go to any healthcare provider in the Netherlands and say 'this is all functioning according to Dutch healthcare regulations'."
Rob Christ, Damecon
We have a financial advisor franchise customer with a small office that doesn't justify having a server. We used CentreStack to provide a cloud-based server. Getting their IT department's approval was difficult- they checked everything out, but CentreStack was ultimately approved as compliant because their data was secure.
In business team communications, such as working with colleagues and business partners, there is often a need to transfer files electronically. The files being transferred usually contain confidential business information, so securing the transfer is essential. For example, Microsoft Teams is one way of doing so by uploading files into a corporate OneDrive account, allowing employees to share securely. However, secure data transfer is not as easy when the senders and receivers are not from the same business units or the same corporation.
In secure data transfer, you would prefer to see several parameters protecting the data transfer. The primary parameters include controlling who the receivers are, how long the file-sharing will last, and the receivers' permissions to the files.
Traditional file server security and permission control are set centrally by system administrators and challenging for each employee to use. When employees find legacy security measures difficult to follow and opt for consumer solutions such as Dropbox without any granular permission controls, compliance can easily be compromised regarding data leakage, data privacy, data ownership, and data security in general.
Microsoft Teams is great in sharing files based on the underlying OneDrive technology. However, it is not easy to set options such as how long the file-sharing lasts; nor is it easy to set whether the files can be downloaded locally. To transfer data securely, other advanced controlling parameters such as the approved IP address range for receiving files, whether the files are read-only or downloading is prohibited, are required to provide a completely secure data transfer solution.
CentreStack provides a secure data transfer platform that simplifies access and collaboration while maintaining compliance and control to satisfy both needs. There's no point in having a secure solution that is difficult to use, so CentreStack is focused on making the user experience as seamless and straightforward as possible without sacrificing data privacy, security, or control.
CentreStack adds secure remote access and file sharing, disaster prevention and recovery to file servers on-premises with easy cloud migration to private cloud storage. It is a secure data transfer and private file sharing solution you have been looking for!
CentreStack is privately hosted by the corporation itself. It is privacy by design without shared-hosting with other companies.
The compliance center provides features such as GDPR and HIPAA checklist.
There are many control parameters from permissions, group, and access policies to audit trace and file download logging.
Security measures covering data-at-rest, data-in-transit, authentication integration with Active Directory and NTFS permissions.
Automatic conversion of email attachments to links can avoid file transfer through third-party servers. Files are protected using data-at-rest encryption with secure data transfers over SSL.
Provide secure access to files with view-only permissions. Ability to disable downloading and editing.
Easily collaborate on files with internal and external users using native applications or through Office 365 integration.
Add publicly accessible links to email signatures, websites, and more to simplify external sharing.
Control access to shared files using granular folder permissions that control which users and groups have read, write, or sharing permissions.
Easily access or share data from any location or device with familiar mapped drives, mobile applications, and web browsers.
Keep data on existing file servers and share it without replicating it to third-party storage or email servers with a web link.
Maintain compliance with permissions, auditing, and reporting for access and sharing, compliance tools for HIPAA, GDPR, and more.
Mapped drives delay downloads until files are opened and cached locally for fast future access, significantly reducing bandwidth and storage consumption. Users get local performance when working remotely.
Secure data transfers are initiated during natural workflow from mapped drives, mobile applications, or browsers, so users don't have to learn new secure behaviors.
Provide the same simplified experience for internal and external users, even when they are offline.
Define different permissions for folders at different levels of the directory structure or inherit from NTFS permissions directly.
Provide secure access to files with view-only permissions. Disable downloads and editing.
From internal Active Directory users to external clients and partners, you can define user rights for folder sharing.
Shared folders are put under version control, and notifications are available for users subscribed to the folders.
For users' devices that no longer need to receive files, the remote wipe feature can remove those files.
For web-based link sharing, the link expiration helps protect the file and folder access.
Files and folders from corporate file servers cached on remote devices are subject to encryption and remote wipe.
From IP address range to device approval, there are access policies protecting data transfer.