Learn why ShareSync from BEAR Technologies is a more secure solution.
ShareSync provides a high degree of security and protection. ShareSync’s protection features let administrators:
- Assure compliance with security best practices
- Get full visibility over end-user activity with Audit Log and Admin File Management
- Utilize remote wipe capabilities in case of lost or stolen devices
- Keep content safe with at-rest and in-transit encryption
- Assure reliability with a 99.999% financially backed uptime guarantee
- Leverage enterprise-class datacenters with redundant storage clusters and connections to multiple Internet providers
- Protect content integrity with features that guard against accidental deletion or version conflict
- Keep content in the right hands with permissions and access that are strictly controlled and easily amended
ShareSync data is encrypted both when it’s at rest as well as when it’s in transit. At-rest data is encrypted with 256-bit AES encryption, while in-transit data is encrypted using 256-bit SSL/HTTPS encryption. Additionally, ShareSync generates a unique encryption key for every account, creating an even greater degree of protection through data isolation.
Each time a user activates a new ShareSync device or accesses ShareSync from the web, they must login using their username and password.
ShareSync password policies are imported from Active Directory and utilize “strong” parameters, helping to eliminate the possibility that external parties will guess passwords. This Active Directory integration requires users to use the same password for ShareSync that they use for all their cloud services. Because there are no additional passwords to remember, it reduces the possibility that they will write their password down where others might see it.
For mobile devices, an additional layer of security can be added by configuring a passcode that must be entered each time the app is launched.
Using the Control Panel, administrators get complete visibility across all the ShareSync devices enabled on their account. Each time a new device is configured by an end user, the administrator is notified, and all users’ devices are catalogued in the Control Panel.
ShareSync is one of just a few collaboration solutions that allows administrators to wipe data remotely. In case of a lost or stolen laptop, tablet, or mobile phone, or when facing a personnel issue, corporate data can generally be quickly removed, helping to minimize potential data leakage.
The Audit Log is a Control Panel feature that allows administrators to view all the ShareSync activities on their account. Whenever files or folders are added, updated, shared, or deleted, the event is logged and available for tracking and auditing purposes, providing a greater level of administrative control over ShareSync. There are multiple ways to use the Audit Log:
- Browse by event type
- Search by user, file name, or folder name
- Filter by event type or date range
Admin File Management
Admin file management is an add-on that lets account owners maintain administrative control overall end user files and folders. Once account owners enable this feature through the control panel, they can manage all ShareSync content across the environment.
Admin File Management increases the ability for administrators to monitor and manage end user content. Using Admin File Management, account owners can
- Adjust sharing permissions
- Add, delete and restore files
- Search across the ShareSync folder and file structure.
This feature needs to be explicitly enabled for each admin. All admin actions are tracked in the audit log.
User control over sharing permissions
When a user shares a ShareSync folder, he or she can set permissions for each collaborator independently. The configurable sharing permissions are “Co-Owner,” “Modify” or “View” permissions.
- “Co-Owner” permissions give others full control to modify, delete, or share content
- “Modify” permissions allow others to view, modify and delete content but not share it
- “View-only” permissions simply enable others to download the files
Permissions can be set differently for each collaborator. And sub-folders can be shared with different collaborators. Permission levels can be changed or revoked at any time.
Sharing web links
Web links allow users to share individual files with users both inside and outside of the company, without giving users permission to view or edit other documents in the same folder. For additional security, web links can be protected with passwords.
Administrators can configure external sharing policies to allow users to easily share with virtually anyone. External ShareSync users can edit files, sync files, and access all content in the folders that have been shared with them. This is a useful feature if for collaborating on files and folders with another company on an ongoing basis.
External ShareSync users are able to access the complete set of ShareSync features and functionality. Administrators can track external user activity in the audit log and control data with remote wipe.
ShareSync was designed to ensure a high security of data, to help reduce the chances of data being accidentally deleted, and to help provide easy ways to restore and recover data should it be lost.
From a service architecture perspective, every ShareSync file is replicated to redundant storage clusters to help minimize the risk of data loss. Additionally, each user’s data is fully isolated from every other user’s data.
In the unlikely event of a service outage, users can still access all their locally-synced data.
ShareSync co-editing features help to prevent file overwrites and conflicts. File versioning allows users to easily restore previous versions of all files stored in ShareSync.
If a file is deleted, it is moved to a recycle bin, where it can be restored. Administrators can restore deleted files and prevent permanent deletions.
ShareSync is backed by a 99.999% uptime guarantee. No other file collaboration service offers a comparable uptime guarantee.
ShareSync is delivered through a data infrastructure comprised of:
- Multi-tenant platforms secured with redundant firewalls, multiple Intrusion Prevention Systems
- Facilities with dedicated, full-time certified security personnel and rigorous physical security measures
ShareSync takes strict security measures to reach regulatory compliance across industry and vertical-specific standards.
Data Privacy, Integrity and Security Standards
- SOC 1 – SOC 1 are specific assurances for businesses that use ShareSync as their internal controls over financial reporting. These regulatory guarantees are necessary for Sarbanes-Oxley (SOX) compliance.
- SOC 2 Type II - ShareSync has a SOC 2 Type II audit report from an independent auditor who has validated that, in their opinion, our controls and processes were effective in assuring security during the evaluation period. ShareSync is audited company-wide, not just at the datacenter level. Additionally, while some service providers may only choose to be audited against one or two of the five trust service principles (security, availability, processing integrity, confidentiality and privacy), ShareSync has been audited against all five.
- US-EU & US-Swiss Safe Harbour - ShareSync is registered and certified with the US Department of Commerce for privacy under the Safe Harbor program. This stringent set of requirements ensures any certified provider has established an in-house program, identified a privacy officer, met all the provisions for proper disclosure of its privacy practices, and offers mechanisms for feedback, opting out, and dispute resolution.
- PCI Data Security Standards (PCI DSS) - The payment processing system utilized by ShareSync has passed the strict testing procedures necessary to be compliant with the PCI Data Security Standards (PCI DSS). This helps ensure that your payment information will not be accessed by unauthorized parties or shared with unscrupulous vendors.
- HIPAA - The Health Insurance Portability and Accountability Act mandates a set of regulations protecting the privacy and security of patients’ confidential health information, including when and with whom that information can be shared.