Secure Data Transfer

"Now we can go to any healthcare provider in the Netherlands and say 'this is all functioning according to Dutch healthcare regulations'."

Rob Christ, Damecon

What is Secure Data Transfer?

In business team communications such as working with colleagues and business partners, there is often a need to transfer files electronically. The files being transferred often contain business confidential information, so securing the transfer is essential. For example, Microsoft Teams is one way of doing so by uploading files into a corporate OneDrive account, allowing employees to share securely. However, secure data transfer is not as easy when the senders and receivers are not from the same business units, nor from the same corporation either.

In secure data transfer, you would prefer to see several parameters protecting the data transfer. The primary parameters include controlling who the receivers are; how long the file sharing will last and what permissions the receivers have to the files


Granular Permission Controls

Traditional file server security and permission control is set centrally by system administrators and hard for each individual employee to use. When employees find legacy security measures difficult to follow and opt for consumer solutions such as Dropbox without any granular permission controls, compliance can easily be compromised in regards to data leakage, data privacy, data ownership and data security in general. 


File Sharing and Transfer Options

Microsoft Teams is great in sharing files based on the underlying OneDrive technology. However, it is not easy to set options such as how long the file sharing last; nor is it easy to set whether the files can be downloaded local. In order to transfer data securely, other advanced controlling parameters such as the approved IP address range for receiving files; whether the files are read-only or downloading is prohibited are required to provide a complete secure data transfer solution.

Transfer Data Securely with Granular Permission Controls

The Solution

CentreStack provides a secure data transfer platform that simplifies access and collaboration while maintaining compliance and control to satisfy both needs. There's no point in having a secure solution that is difficult to use, so CentreStack is focused on making the user experience as seamless and straightforward as possible without sacrificing data privacy, security or control.

check out the incredible

CentreStack Solution

CentreStack adds secure remote access and file sharing, disaster prevention and recovery, to file servers on-premises with easy cloud migration to private cloud storage. It is a secure data transfer and private file sharing solution you have been looking for! 


CentreStack is privately hosted by the corporation itself. It is privacy by design without shared-hosting with other companies.


Compliance center provides features such as GDPR and HIPAA check-list.


There are many control parameters from permissions, group and access policies to audit trace and file download logging.


Security measures covering data-at-rest, data-in-transit, authentication integration with Active Directory and NTFS permissions.

Secure Data Transfer Solution

Outlook Integration

Automatic conversion of email attachments to links can avoid file transfer through third-party servers. Files are protected using data-at-rest encryption with secure data transfers over SSL.

Secure Data Rooms

Provide secure access to files with view-only permissions. Ability to disable downloading and editing.

Co-Editing and Authoring

Easily collaborate on files with internal and external users using native applications or through Office 365 integration.


Add publicly accessible links to email signatures, websites, and more to simplify external sharing.

Granular Permissions

Control access to shared files using granular folder permissions that control which users and groups have read, write, or sharing permissions.

"We have a financial advisor franchise customer with a small office that doesn't justify having a server. We used CentreStack to provide a cloud-based server. Getting their IT department's approval was difficult- they checked everything out- but CentreStack was ultimately approved as compliant because their data was secure."

Jay Parisi

Principal, Aegis Technology Partners

Secure Data Transfers and Compliance

How can you blame emergency workers with comments like, "I don't have time to think about compliance when someone's life is on the line!"? This kind of thinking demonstrates the challenge to maintain compliance as users are drawn to the most effective ways to get their job done, which often translates to transferring files as email attachments or by using unauthorized consumer-grade services like personal Dropbox accounts. The key to solving this problem is to provide a secure data transfer platform with a simple user experience. This is where CentreStack can help.


Easily access or share data from any location or device with familiar mapped drives, mobile applications and web browsers.


Keep data on existing file servers and share it without replication to third party storage or email servers with a web link.


Maintain compliance with permissions, auditing and reporting for access and sharing, compliance tools for HIPAA, GDPR and more.

Enhance Security by Increasing Productivity

Perhaps one of the most unique benefits of the CentreStack platform and strategy is its ability to offer an enhanced user experience that improves productivity as an inducement for more secure user behaviors! Usually, products that are easier to use reduce security, but CentreStack increases data privacy, security and control while offering an experience that is fast, seamless and easy for both internal and external collaborators.


Mapped drives delay downloads until files are opened and cached locally for fast future access, significantly reducing bandwidth and storage consumption. Users get local performance when working remotely.


Secure data transfers are initiated during natural workflow from mapped drives, mobile applications or browsers so users don't have to learn new secure behaviors.


Provide the same simplified experience for internal and external users, even when they are offline.

Secure Data Transfer Common Features

CentreStack eliminates the common drawbacks of remote file server access and online folder sharing solutions and provides the best of both worlds – the security and control of local file servers combined with the efficiency and productivity gains of online folder sharing to facilitate secure data transfer.

Folder Permissions

Define different permissions for folders at different levels of the directory structure or inherit from NTFS permissions directly.

Secure Data Room

Provide secure access to files with view-only permissions. Disable downloads and editing.

User Rights

From internal Active Directory users to external clients and partners, you can define user rights for folder sharing.


Shared folders are put under version control and notifications are available for users subscribed to the folders.

Remote Wipe

For users devices that no longer have a need to receive files, remote wipe feature can remove those files.

Link Expiration

For web based link sharing, the link expiration helps protect the file and folder access.

Endpoint Protection

Files and folders from corporate file servers cached on remote device are subject to encryption and remote wipe.

Access Policy

From IP address range to device approval, there are access policies protecting data transfer.


Talk to a Specialist

Speak directly to one of our sales representatives by calling.

Contact Us

Have questions? Want to see a live demo? We'll be in touch.


Check out our help center for answers to common questions.

Ready to boost mobile productivity and enable workforce to work from home today?