Sharetru Custom Images_Site Settings - Hero
    Site Settings

    Establish a Secure Foundation

    Deploy a variety of robust, industry-leading security features to use as you see fit. Establish a foundation for how your organization interacts on our platform and increase your clients' confidence.
    Consult our team to help you determine what to use.

    Configure Settings for Security and Compliance

    Take a look under the hood. We’re proud to say that all of our feature development is done in-house for the express purpose of keeping your data safe, so you can share with confidence.

    • Dedicated IP Address

      Own your space

      Take advantage of this prime feature to receive a unique site IP address. For disaster recovery, choose our Advanced Security and Compliance Add-on to get a second IP address. A dedicated IP addresses avoids having to open unnecessary holes in your corporate firewall.
    • Geo-Fencing by Country

      Construct geographic barriers

      Set boundaries by limiting logical access to specific countries (such as the U.S. only) and blocking other countries to prevent attacks and unauthorized connections and data exports.

    • Multistage Encryption

      Reinforce your defenses

      Encrypt your data at rest and in transit using the latest standard of FIPS 140-2 approved encryption modules. Enhance encryption in transit with secure transmission protocols enforcing TLS 1.2+ and AES-256 encryption. 

    • Custom Branded Interface

      Align branding

      Adapt your user interface to keep it consistent with your company’s branding and provide a friendlier, more cohesive user experience for your customers. You can also get an SSL certificate with most of our plans (at no extra charge) so you can point your custom domain (e.g. secure.yourdomain.com) to your Sharetru site.

    • FTP, SFTP, FTPS, FTPeS, & HTTPS

      Access protocols

      Be assured that our platform supports the most preferred protocols, which means that we’ve got you covered. You decide who has access to which protocols, and from which IP addresses they can login and transfer files via those protocols.

    • Dashboard and Reporting

      Monitor activity

      Keep tabs on your platform usage with an integrated dashboard, generating custom reports covering any time period that you select. Readily access your reporting and dashboard when you log in.

    • User Jailing

      Control user access

      Our flexible permissions system only allows users to see those folders where they have been assigned permissions, and those folders can be non-hierarchical. However, if you prefer a hierarchical structure with a / (root) for each user's home folder, we have a setting to jail users in this manner.

    • Sandbox Site

      Experiment with tools

      Test out your API calls, play with new configurations, and experiment with features at your leisure in a separate and isolated sandbox site available for purchase with select plans.

    Own your space

    Take advantage of this prime feature to receive a unique site IP address. For disaster recovery, choose our Advanced Security and Compliance Add-on to get a second IP address. A dedicated IP addresses avoids having to open unnecessary holes in your corporate firewall.

    Construct geographic barriers

    Set boundaries by limiting logical access to specific countries (such as the U.S. only) and blocking other countries to prevent attacks and unauthorized connections and data exports.

    Reinforce your defenses

    Encrypt your data at rest and in transit using the latest standard of FIPS 140-2 approved encryption modules. Enhance encryption in transit with secure transmission protocols enforcing TLS 1.2+ and AES-256 encryption. 

    Align branding

    Adapt your user interface to keep it consistent with your company’s branding and provide a friendlier, more cohesive user experience for your customers. You can also get an SSL certificate with most of our plans (at no extra charge) so you can point your custom domain (e.g. secure.yourdomain.com) to your Sharetru site.

    Access protocols

    Be assured that our platform supports the most preferred protocols, which means that we’ve got you covered. You decide who has access to which protocols, and from which IP addresses they can login and transfer files via those protocols.

    Monitor activity

    Keep tabs on your platform usage with an integrated dashboard, generating custom reports covering any time period that you select. Readily access your reporting and dashboard when you log in.

    Control user access

    Our flexible permissions system only allows users to see those folders where they have been assigned permissions, and those folders can be non-hierarchical. However, if you prefer a hierarchical structure with a / (root) for each user's home folder, we have a setting to jail users in this manner.

    Experiment with tools

    Test out your API calls, play with new configurations, and experiment with features at your leisure in a separate and isolated sandbox site available for purchase with select plans.

    What Are Recommended Standards of Encryption?

    For encryption at rest, all of our cloud storage systems are secured using AES-256. 

    For in-transit protection of files, we only use encryption algorithms that are Federal Information Processing Standard (FIPS) 140-2 approved, and we follow TLS 1.2 for all connections — also equipped with AES-256 cipher strength.

    We choose to follow these standards because they represent the latest and best thinking of cybersecurity experts, and we continuously update our platform to offer industry-leading security.

    Learn More About Data Encryption Best Practices

    sharetru-symbol-white

    Ready for a Demo?

    You don’t have to take our word for it. We’ve been leading the charge in secure online file sharing since the early days, and we’d love to show you how we do it. Schedule your demo today.

    Book Your Demo