SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Security and Technology
                                                                              Overview




A secure file sharing and collaboration solution,
TitanFile puts security concerns to rest.

Protection at the application level                    On TitanFile login pages, your web browser
                                                       establishes a secure SSL connection between
TitanFile’s sharing protections ensure you             your computer and our platform. When you leave
only share what you want, with the recipients          a secure portion of our platform, you will get a
of your explicit choosing. Unlike other file           notification from your Internet browser that you
sharing services, files uploaded to TitanFile are      are leaving the secure section and returning to
private by default. You control what is shared         an open section.
in communication Channels, and have the
power to remove shared files at any time. Audit        All communication between client and server is
logs also provide a detailed trail of all activities   performed over a 256-bit SSL connection. This
surrounding your documents.                            is the strongest, most secure form of encryption
                                                       that is generally available in Internet browsers on
Additionally, search engines and web spiders           the market in North America today.
are blocked from indexing your files, profiles,
contacts or account.                                   Protection at the system level
                                                       All files uploaded and shared through TitanFile
                                                       are encrypted before being stored on our
                                                       servers. The file encryption uses algorithms
                                                       and schemes that have been approved for
                                                       encrypting and storing classified information up
                                                       to the Top Secret level by all US government
                                                       departments and agencies.

Protection at the network level                        Our file encryption uses a combination of the
                                                       AES encryption algorithm and the SHA-512
External penetration testing is performed              hashing algorithm. The AES algorithm that we
for system security on a regular basis. More           use relies on a 256 bit encryption key, which
information on these tests is available upon           provides for a much stronger protection than
request.                                               the 128 bit key typically used in commercial




www.titanfile.com
  + 1 855 315-6012            |        sales@titanfile.com                       Copyright © 2013 TitanFile
Security and Technology
                                                                           Overview




and consumer applications. The key itself is         The system has network/carrier neutral access
never stored on the same servers as the files.       to multiple Internet backbone circuit providers
Therefore, if someone gains physical access to       and transatlantic fibre-optic services.
the servers and the storage disks, the data will
be useless for them without the encryption key.      As of the date this document was last updated,
                                                     average server uptime over the last 12 months
The Advanced Encryption Standard (AES) was           was 99.95%.
published by National Institute of Standards
and Technology (NIST) in a Federal Information
Processing Standards Publication FIPS PUB 197
in 2001. SHA-512 is a secure hash standard that
was designed by the National Security Agency
(NSA) and published by NIST in FIPS PUB 180-
2 in 2002 and FIPS PUB 180-4 in 2012.

Protection at the facility level
Unless otherwise requested by the customer,
TitanFile servers reside in Canada. They are
behind a firewall that controls access to network
resources. Access to the servers is only possible
with a key-card. Key-cards are distributed on a
“need to have” basis.
                                                     TitanFile democratizes security
The facility has CCTV monitoring, modern             by offering a service that allows
access controls and is built with a concrete and     even novice users of technology
steel frame. It also has 24/7 monitoring and
trained technical staff. The facility features N+1   to transfer files over a secure
redundancy, modern, energy efficient cooling,        connection. Cloud-based, TitanFile
and a Fire Suppression Rapid detection system        offers real-time transfers with
with FM-200 Inert gas. A high capacity in-line
Uninterruptible Power Supply (UPS) prevents          end-to-end encryption. With a
spikes, surges and brownouts. Backup diesel          built-in reporting feature, tracking
generation provides continuous power in the          data is simple - confirm who has
event of a utility failure. Multiple-path power
distribution, including maintenance bypass           accessed the file, and the exact
circuitry, ensures non-stop service.                 moment it entered their hands.



www.titanfile.com
  + 1 855 315-6012           |       sales@titanfile.com                      Copyright © 2013 TitanFile

Contenu connexe

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

En vedette

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

TitanFile Security and Technology Overview

  • 1. Security and Technology Overview A secure file sharing and collaboration solution, TitanFile puts security concerns to rest. Protection at the application level On TitanFile login pages, your web browser establishes a secure SSL connection between TitanFile’s sharing protections ensure you your computer and our platform. When you leave only share what you want, with the recipients a secure portion of our platform, you will get a of your explicit choosing. Unlike other file notification from your Internet browser that you sharing services, files uploaded to TitanFile are are leaving the secure section and returning to private by default. You control what is shared an open section. in communication Channels, and have the power to remove shared files at any time. Audit All communication between client and server is logs also provide a detailed trail of all activities performed over a 256-bit SSL connection. This surrounding your documents. is the strongest, most secure form of encryption that is generally available in Internet browsers on Additionally, search engines and web spiders the market in North America today. are blocked from indexing your files, profiles, contacts or account. Protection at the system level All files uploaded and shared through TitanFile are encrypted before being stored on our servers. The file encryption uses algorithms and schemes that have been approved for encrypting and storing classified information up to the Top Secret level by all US government departments and agencies. Protection at the network level Our file encryption uses a combination of the AES encryption algorithm and the SHA-512 External penetration testing is performed hashing algorithm. The AES algorithm that we for system security on a regular basis. More use relies on a 256 bit encryption key, which information on these tests is available upon provides for a much stronger protection than request. the 128 bit key typically used in commercial www.titanfile.com + 1 855 315-6012 | sales@titanfile.com Copyright © 2013 TitanFile
  • 2. Security and Technology Overview and consumer applications. The key itself is The system has network/carrier neutral access never stored on the same servers as the files. to multiple Internet backbone circuit providers Therefore, if someone gains physical access to and transatlantic fibre-optic services. the servers and the storage disks, the data will be useless for them without the encryption key. As of the date this document was last updated, average server uptime over the last 12 months The Advanced Encryption Standard (AES) was was 99.95%. published by National Institute of Standards and Technology (NIST) in a Federal Information Processing Standards Publication FIPS PUB 197 in 2001. SHA-512 is a secure hash standard that was designed by the National Security Agency (NSA) and published by NIST in FIPS PUB 180- 2 in 2002 and FIPS PUB 180-4 in 2012. Protection at the facility level Unless otherwise requested by the customer, TitanFile servers reside in Canada. They are behind a firewall that controls access to network resources. Access to the servers is only possible with a key-card. Key-cards are distributed on a “need to have” basis. TitanFile democratizes security The facility has CCTV monitoring, modern by offering a service that allows access controls and is built with a concrete and even novice users of technology steel frame. It also has 24/7 monitoring and trained technical staff. The facility features N+1 to transfer files over a secure redundancy, modern, energy efficient cooling, connection. Cloud-based, TitanFile and a Fire Suppression Rapid detection system offers real-time transfers with with FM-200 Inert gas. A high capacity in-line Uninterruptible Power Supply (UPS) prevents end-to-end encryption. With a spikes, surges and brownouts. Backup diesel built-in reporting feature, tracking generation provides continuous power in the data is simple - confirm who has event of a utility failure. Multiple-path power distribution, including maintenance bypass accessed the file, and the exact circuitry, ensures non-stop service. moment it entered their hands. www.titanfile.com + 1 855 315-6012 | sales@titanfile.com Copyright © 2013 TitanFile