Platform Pricing

    SaaS File Sharing Plans

    Unlock a new level of efficiency and peace of mind with our secure file transfer software, empowering you to confidently share and automate transfers of confidential files with clients and colleagues, knowing that every transfer is encrypted, monitored, and backed by our robust security features. Try it for 14 days, risk-free.

    Annually SAVE 10% | Monthly
    Growth
    from $108/month
    Userstooltip

    Only active users (not suspended) count against your quota.

    • Check Includes 10 Users
    • Upgradeable to 40 users in 10-user increments
    Storagetooltip

    Here is a rough estimate of the number of files that can be stored in 10GB for several common file types:

    · Word files: Around 200,000 

    · PDF files: Around 10,000

    · CAD drawings: Around 1,000

    · JPEG photos: Around 5,000

    · MP3 music files: Around 2,000

    It's important to note that these are rough estimates based on average file size, and actual file sizes can vary depending on factors such as resolution, compression, and quality.

    • Check Includes 10 GB
    • Upgradeable to 20 GB
    • Check Unlimited Bandwidth
    • No Customer Success Manager
    • No Dedicated Instance
    • No Scalable Compute Resources
    • Costs Extra Advanced Security and Compliance
    Performance
    from $270/month
    Userstooltip

    Only active users (not suspended) count against your quota.

    • Check Includes 50 Users
    • Upgradeable to 250 users in 50-user increments
    Storagetooltip

    Here is a rough estimate of the number of files that can be stored in 25GB for several common file types:

    · Word files: Around 500,000

    · PDF files: Around 25,000

    · CAD drawings: Around 2,500

    · JPEG photos: Around 12,500

    · MP3 music files: Around 5,000

    It's important to note that these are rough estimates based on average file size, and actual file sizes can vary depending on factors such as resolution, compression, and quality

    • Check Includes 25 GB
    • Upgradeable to 250 GB in 25 GB increments
    • Check Unlimited Bandwidth
    • Check Customer Success Manager
    • No Dedicated Instance
    • No Scalable Compute Resources
    • Costs Extra Advanced Security and Compliance
    Enterprise
    click here to email us Contact Sales
    Users
    • Check Unlimited
    • Scale your operations and accommodate a growing user base without additional costs per user
    Storagetooltip

    Here is a rough estimate of the number of files that can be stored in 250GB for several common file types:

    · Word files: Around 5,000,000

    · PDF files: Around 250,000

    · CAD drawings: Around 20,500

    · JPEG photos: Around 125,000

    · MP3 music files: Around 50,000

    It's important to note that these are rough estimates based on average file size, and actual file sizes can vary depending on factors such as resolution, compression, and quality

    • Check Includes 250 GB
    • Upgradeable to any capacity in 250 GB increments
    • Check Unlimited Bandwidth
    • Check Customer Success Manager
    • Check Dedicated Instance
    • Costs Extra Scalable Compute Resources
    • Costs Extra Advanced Security and Compliance

    Platform Features

    Analytics & Reporting
    Permanent Logs tooltip
    Analytics & Reporting tooltip
    Transfer Compatibility & File Sharing
    FTP, FTPS & SFTP Access tooltip
    Web Application Access tooltip
    Guest Link Sharing tooltip
    Brand to Your Business
    White label w/Your Logo tooltip
    Customize Colors
    Customize Site Title
    Login Announcements tooltip
    Custom Domain Name tooltip
    Custom User Agreements tooltip
    User Management & Authentication
    Site & Group Admin Roles 
    Flexible User Permissions tooltip
    Advanced Password Controls  tooltip
    SSH Key Authentication  tooltip
    Single Sign-On (SSO) tooltip
    User IP Restrictions tooltip
    Two-factor Authentication tooltip
    Automation
    Suspension by Date tooltip
    Suspension for Inactivity tooltip
    BCC Mailbox Journaling tooltip
    Folder-level File Retention tooltip
    Activity Notifications  tooltip
    Failed Login Policies tooltip
    Concurrent Connections
    Per Remote IP Address tooltip
    Total tooltip
    Per User tooltip

    Growth

    Permanent Logs - Yes Mark
    Analytics & Reporting - Yes Mark
    FTP, FTPS & SFTP Access - Yes Mark
    Web Application Access - Yes Mark
    Guest Link Sharing - Yes Mark
    White label w/Your Logo - Yes Mark
    Customize Colors - Yes Mark
    Customize Site Title - Yes Mark
    Login Announcements - Specialty Icon
    Custom Domain Name - No Mark
    Custom User Agreements - No Mark
    Site & Group Admin Roles  - Yes Mark
    Flexible User Permissions - Yes Mark
    Advanced Password Controls  - Yes Mark
    SSH Key Authentication  - Yes Mark
    Single Sign-On (SSO) - No Mark
    User IP Restrictions - Specialty Icon
    Two-factor Authentication - Specialty Icon
    Suspension by Date - Yes Mark
    Suspension for Inactivity - No Mark
    BCC Mailbox Journaling - No Mark
    Folder-level File Retention - No Mark
    Activity Notifications  - No Mark
    Failed Login Policies - Specialty Icon
    10
    25
    10

    Performance

    Permanent Logs - Yes Mark
    Analytics & Reporting - Yes Mark
    FTP, FTPS & SFTP Access - Yes Mark
    Web Application Access - Yes Mark
    Guest Link Sharing - Yes Mark
    White label w/Your Logo - Yes Mark
    Customize Colors - Yes Mark
    Customize Site Title - Yes Mark
    Login Announcements - Yes Mark
    Custom Domain Name - Yes Mark
    Custom User Agreements - Yes Mark
    Single Sign-On (SSO) - Yes Mark
    Site & Group Admin Roles  - Yes Mark
    Flexible User Permissions - Yes Mark
    Advanced Password Controls  - Yes Mark
    SSH Key Authentication  - Yes Mark
    User IP Restrictions - Yes Mark
    Two-factor Authentication - Yes Mark
    Suspension by Date - Yes Mark
    Suspension for Inactivity - Yes Mark
    BCC Mailbox Journaling - Yes Mark
    Folder-level File Retention - Yes Mark
    Activity Notifications  - Yes Mark
    Failed Login Policies - Yes Mark
    25
    75
    25

    Enterprise

    Permanent Logs - Yes Mark
    Analytics & Reporting - Yes Mark
    FTP, FTPS & SFTP Access - Yes Mark
    Web Application Access - Yes Mark
    Guest Link Sharing - Yes Mark
    White label w/Your Logo - Yes Mark
    Customize Colors - Yes Mark
    Customize Site Title - Yes Mark
    Login Announcements - Yes Mark
    Custom Domain Name - Yes Mark
    Custom User Agreements - Yes Mark
    Single Sign-On (SSO) - Yes Mark
    Site & Group Admin Roles  - Yes Mark
    Flexible User Permissions - Yes Mark
    Advanced Password Controls  - Yes Mark
    SSH Key Authentication  - Yes Mark
    User IP Restrictions - Yes Mark
    Two-factor Authentication - Yes Mark
    Suspension by Date - Yes Mark
    Suspension for Inactivity - Yes Mark
    BCC Mailbox Journaling - Yes Mark
    Folder-level File Retention - Yes Mark
    Activity Notifications  - Yes Mark
    Failed Login Policies - Yes Mark
    No Limit
    Software Limit Removed
    25

    Standard Security

    Infrastructure & Platform Security
    Dedicated Firewalls tooltip
    VMware High Availability tooltip
    Dedicated IP Address tooltip
    Intruder IP Blacklisting tooltip
    Geo Fencing by Country tooltip
    A+ Qualys SSL Rating tooltip
    Encryption & Data Retention
    Encryption At-Rest tooltip
    Encryption in Transit tooltip
    FIPS 140-2 Approved tooltip
    Daily Offsite Backup tooltip
    Cloud Partner Certifications
    SOC2 Type II Certified tooltip
    ISO 27001 Certified tooltip

    Growth

    Dedicated Firewalls - Yes Mark
    VMware High Availability - Yes Mark
    Dedicated IP Address - Yes Mark
    Intruder IP Blacklisting - Yes Mark
    Geo Fencing by Country - Yes Mark
    A+ Qualys SSL Rating - Yes Mark
    Encryption At-Rest - Yes Mark
    Encryption in Transit - Yes Mark
    FIPS 140-2 Approved - Yes Mark
    Daily Offsite Backup - Yes Mark
    SOC2 Type II Certified - Yes Mark
    ISO 27001 Certified - Yes Mark

    Performance

    Dedicated Firewalls - Yes Mark
    VMware High Availability - Yes Mark
    Dedicated IP Address - Yes Mark
    Intruder IP Blacklisting - Yes Mark
    Geo Fencing by Country - Yes Mark
    A+ Qualys SSL Rating - Yes Mark
    Encryption At-Rest - Yes Mark
    Encryption in Transit - Yes Mark
    FIPS 140-2 Approved - Yes Mark
    Daily Offsite Backup - Yes Mark
    SOC2 Type II Certified - Yes Mark
    ISO 27001 Certified - Yes Mark

    Enterprise

    Dedicated Firewalls - Yes Mark
    VMware High Availability - Yes Mark
    Dedicated IP Address - Yes Mark
    Intruder IP Blacklisting - Yes Mark
    Geo Fencing by Country - Yes Mark
    A+ Qualys SSL Rating - Yes Mark
    Encryption At-Rest - Yes Mark
    Encryption in Transit - Yes Mark
    FIPS 140-2 Approved - Yes Mark
    Daily Offsite Backup - Yes Mark
    SOC2 Type II Certified - Yes Mark
    ISO 27001 Certified - Yes Mark

    Advanced Security and Compliance Add-On

    ** All features with advanced security and compliance are included as a bundle for one price **

    Compliance Enablement
    NIST SP 800-171
    DFARS 252.204-7012
    DFARS 252.204-7019
    DFARS 252.204-7020
    DFARS 252.204-7021
    CMMC 2.0 Levels 1 & 2 tooltip
    ITAR / EAR
    FERPA tooltip
    GLBA | SOX | PCI-DSS
    HIPAA | HITECH
    GDPR tooltip
    Infrastructure & Platform Security
    Dedicated IP Address tooltip
    Network IPS tooltip
    Host IDS tooltip
    Malware Protection tooltip
    Business Continuity
    Daily Onsite Backup tooltip
    Disaster Recovery tooltip
    Certifications: IaaS & PaaS
    FedRAMP Moderate
    NIST SP800-53 R4
    StateRAMP
    CSA STAR tooltip
    Certifications: SaaS
    SOC2 Type II Certified tooltip

    Growth

    NIST SP 800-171 - Specialty Icon
    DFARS 252.204-7012 - Specialty Icon
    DFARS 252.204-7019 - Specialty Icon
    DFARS 252.204-7020 - Specialty Icon
    DFARS 252.204-7021 - Specialty Icon
    CMMC 2.0 Levels 1 & 2 - Specialty Icon
    ITAR / EAR - Specialty Icon
    FERPA - Specialty Icon
    GLBA | SOX | PCI-DSS - Specialty Icon
    HIPAA | HITECH - Specialty Icon
    GDPR - Specialty Icon
    Dedicated IP Address - Yes Mark
    Network IPS - Specialty Icon
    Host IDS - Specialty Icon
    Malware Protection - Specialty Icon
    Daily Onsite Backup - Specialty Icon
    Disaster Recovery - Specialty Icon
    FedRAMP Moderate - Specialty Icon
    NIST SP800-53 R4 - Specialty Icon
    StateRAMP - Specialty Icon
    CSA STAR - Specialty Icon
    SOC2 Type II Certified - Specialty Icon

    Performance

    NIST SP 800-171 - Specialty Icon
    DFARS 252.204-7012 - Specialty Icon
    DFARS 252.204-7019 - Specialty Icon
    DFARS 252.204-7020 - Specialty Icon
    DFARS 252.204-7021 - Specialty Icon
    CMMC 2.0 Levels 1 & 2 - Specialty Icon
    ITAR / EAR - Specialty Icon
    FERPA - Specialty Icon
    GLBA | SOX | PCI-DSS - Specialty Icon
    HIPAA | HITECH - Specialty Icon
    GDPR - Specialty Icon
    Dedicated IP Address - Yes Mark
    Network IPS - Specialty Icon
    Host IDS - Specialty Icon
    Malware Protection - Specialty Icon
    Daily Onsite Backup - Specialty Icon
    Disaster Recovery - Specialty Icon
    FedRAMP Moderate - Specialty Icon
    NIST SP800-53 R4 - Specialty Icon
    StateRAMP - Specialty Icon
    CSA STAR - Specialty Icon
    SOC2 Type II Certified - Specialty Icon

    Enterprise

    NIST SP 800-171 - Specialty Icon
    DFARS 252.204-7012 - Specialty Icon
    DFARS 252.204-7019 - Specialty Icon
    DFARS 252.204-7020 - Specialty Icon
    DFARS 252.204-7021 - Specialty Icon
    CMMC 2.0 Levels 1 & 2 - Specialty Icon
    ITAR / EAR - Specialty Icon
    FERPA - Specialty Icon
    GLBA | SOX | PCI-DSS - Specialty Icon
    HIPAA | HITECH - Specialty Icon
    GDPR - Specialty Icon
    Dedicated IP Address - Yes Mark
    Network IPS - Specialty Icon
    Host IDS - Specialty Icon
    Malware Protection - Specialty Icon
    Daily Onsite Backup - Specialty Icon
    Disaster Recovery - Specialty Icon
    FedRAMP Moderate - Specialty Icon
    NIST SP800-53 R4 - Specialty Icon
    StateRAMP - Specialty Icon
    CSA STAR - Specialty Icon
    SOC2 Type II Certified - Specialty Icon

    Terms & Agreements

    Standard Online Terms of Service (TOS) tooltip
    Consideration of Changes to TOS tooltip
    Signed TOS & HIPAA BAA tooltip
    Signed TOS & Privacy DPA tooltip

    Growth

    Standard Online Terms of Service (TOS) - Yes Mark
    Consideration of Changes to TOS - No Mark
    Signed TOS & HIPAA BAA - Specialty Icon
    Signed TOS & Privacy DPA - Specialty Icon

    Performance

    Standard Online Terms of Service (TOS) - Yes Mark
    Consideration of Changes to TOS - No Mark
    Signed TOS & HIPAA BAA - Specialty Icon
    Signed TOS & Privacy DPA - Specialty Icon

    Enterprise

    Standard Online Terms of Service (TOS) - Yes Mark
    Consideration of Changes to TOS - Yes Mark
    Signed TOS & HIPAA BAA - Specialty Icon
    Signed TOS & Privacy DPA - Specialty Icon
    Growth

    Platform Features TEMP

    Analytics & Reporting
    Permanent Logs
    An irrefutable source of truth. Non-deletable file and admin logs (free from your storage quota) provide invaluable protection against data tampering or unauthorized modifications, and enable comprehensive forensic analysis and incident response
    Permanent Logs - Yes Mark
    Analytics & Reporting
    Analytics dashboard with historical trends plus exportable reports
    Analytics & Reporting - Yes Mark
    Automation
    Suspension by Date
    Auto-suspend users based on a future date of an administrator's choosing
    Suspension by Date - Yes Mark
    Suspension for Inactivity
    Prevent unnecessary access and potential breaches by implementing a number of days of inactivity before automatic suspension, while maintaining a safe and secure environment for active users
    Suspension for Inactivity - No Mark
    BCC Mailbox Journaling
    Journal all system notifications automatically to an internal email address of your choosing so they're always accessible, and easily searchable
    BCC Mailbox Journaling - No Mark
    Folder-level File Retention
    Establish policies for file retention and daily purge at the individual folder level or site wide
    Folder-level File Retention - No Mark
    Activity Notifications 
    Automatically send email notifications when a file is uploaded, downloaded, deleted, or when a storage threshold is reached
    Activity Notifications  - No Mark
    Failed Login Policies
    Essential defense mechanism that fortifies your system against unauthorized access attempts by IP address or username, effectively thwarting malicious actors, and reinforcing your organization's cybersecurity posture
    Failed Login Policies - Specialty Icon
    Brand to Your Business
    White label w/Your Logo
    Establish a strong brand presence by customizing and branding the software with your own logo, effectively creating a seamless and consistent user experience that reinforces your identity
    White label w/Your Logo - Yes Mark
    Customize Colors
    Customize Colors - Yes Mark
    Customize Site Title
    Customize Site Title - Yes Mark
    Login Announcements
    A critical legal and security notice used by organizations to establish clear boundaries, enforce compliance, and enhance overall security posture by promoting awareness and accountability among users
    Login Announcements - Specialty Icon
    Custom Domain Name
    Point your own subdomain (such as sftp.yourdomain.com) with a CNAME to your Sharetru subdomain with an SSL Certificate included at our expense
    Custom Domain Name - No Mark
    Custom User Agreements
    Legally enforces terms of service or company policies for system use by requiring user acceptance before application access
    Custom User Agreements - No Mark
    Concurrent Connections
    Per Remote IP Address
    The number of simultaneous FTP/S or SFTP connections per remote IP address (single office location for multiple users)
    10
    Total
    The total number of simultaneous FTP/S or SFTP connections for all users at all locations
    25
    Per User
    The number of simultaneous FTP/S or SFTP connections per username
    10
    Transfer Compatibility & File Sharing
    FTP, FTPS & SFTP Access
    Provides a robust and secure file transfer mechanism with no size limitations to help facilitate efficient data exchange, compatibility, security, automation, while supporting legacy systems. Configurable per user or at the site level
    FTP, FTPS & SFTP Access - Yes Mark
    Web Application Access
    Robust administration and file transfer capabilities supporting all modern web browsers
    Web Application Access - Yes Mark
    Guest Link Sharing
    Outbound and inbound file sharing links to send or receive files without creating a user account
    Guest Link Sharing - Yes Mark
    User Management & Authentication
    Site & Group Admin Roles 
    Site & Group Admin Roles  - Yes Mark
    Flexible User Permissions
    An industry benchmark. Grant users specific access and privileges based on their roles and responsibilities, ensuring data security and maintaining control over sensitive information
    Flexible User Permissions - Yes Mark
    Advanced Password Controls 
    Implement robust controls that empower employees with complex and unique passwords. Require change intervals and re-use controls to shield your sensitive data and safeguard your organization's reputation
    Advanced Password Controls  - Yes Mark
    SSH Key Authentication 
    Automated systems and SFTP software can use public SSH-key authentication to replace a tradition password, thwarting unauthorized access attempts and mitigating the risk of brute force attacks
    SSH Key Authentication  - Yes Mark
    Single Sign-On (SSO)
    Integrate your organization's SSO to streamline the authentication process, minimize the risk of password-related vulnerabilities, and simplify user experiences
    Single Sign-On (SSO) - No Mark
    User IP Restrictions
    User-based IP address and protocol restrictions can bolster security measures, protect against unauthorized access, and align with compliance requirements. Layer onto an SFTP connection for an additional security check
    User IP Restrictions - Specialty Icon
    Two-factor Authentication
    Indispensable security feature that fortifies your defenses and bolsters your peace of mind. Users can be required to use 2FA and admins can restrict the OTP method allowed for each user. Studies have shown 99% of breaches can be thwarted with MFA in place
    Two-factor Authentication - Specialty Icon

    Standard Security TEMP

    Cloud Partner Certifications
    SOC2 Type II Certified
    The IaaS, PaaS, and SaaS layers of Sharetru's Advanced Security & Compliance Enablement Platform are SOC 2 Type II certified
    SOC2 Type II Certified - Yes Mark
    ISO 27001 Certified
    An international standard for information security management systems (ISMS). It provides a framework for organizations to establish, implement, maintain, and continually improve their information security management practices
    ISO 27001 Certified - Yes Mark
    Encryption & Data Retention
    Encryption At-Rest
    NIST approved AES-256 encryption is widely regarded as the benchmark for secure symmetric encryption, and is used on all Sharetru storage systems
    Encryption At-Rest - Yes Mark
    Encryption in Transit
    Crucial for ensuring secure and private communication over the internet, shielding sensitive data from interception and unauthorized access. TLS 1.2 and NIST approved AES-256 and AES-128 on all protocols
    Encryption in Transit - Yes Mark
    FIPS 140-2 Approved
    FIPS 140-2 approved ciphers are an essential security feature due to their rigorous testing and validation process, ensuring that cryptographic algorithms meet stringent standards, thereby safeguarding sensitive information from potential breaches
    FIPS 140-2 Approved - Yes Mark
    Daily Offsite Backup
    Standard Security has 7 days of backups. If you're in need of disaster recovery on warm standby, please refer to the Advanced Compliance and Enablement offering
    Daily Offsite Backup - Yes Mark
    Infrastructure & Platform Security
    Dedicated Firewalls
    A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    Dedicated Firewalls - Yes Mark
    VMware High Availability
    Ensures seamless performance, maximum uptime, uninterrupted user experiences, and reliability
    VMware High Availability - Yes Mark
    Dedicated IP Address
    An essential asset that enhances reliability, strengthens security measures, and boosts reputation, providing you with a distinct identity and trustworthiness when operating our software
    Dedicated IP Address - Yes Mark
    Intruder IP Blacklisting
    Empowers our software to proactively ward off malicious actors permanently, keeping your systems and sensitive data shielded from unauthorized access, breaches, and cyber threats
    Intruder IP Blacklisting - Yes Mark
    Geo Fencing by Country
    An indispensable feature that enables you to fortify your defenses, restrict access to vulnerable regions, and effectively safeguard your data from malicious threats
    Geo Fencing by Country - Yes Mark
    A+ Qualys SSL Rating
    A crucial security feature as it demonstrates an organization's commitment to maintaining the highest level of cybersecurity standards. Sharetru’s SSL configuration for HTTPS have earned a rating of A+ by world-renowned Qualys SSL Labs.
    A+ Qualys SSL Rating - Yes Mark

    Advanced Security and Compliance Add-On TEMP

    Business Continuity
    Daily Onsite Backup
    By keeping 30 days of backups within arm's reach, we eliminate the risks of relying solely on offsite solutions, ensuring immediate accessibility, swift recovery, and total control while bolstering your company's resilience to disaster.
    Daily Onsite Backup - Specialty Icon
    Disaster Recovery
    Keep your business thriving even in the face of unforeseen disruptions with FedRAMP moderate authorized IaaS and PaaS on Warm Standby. By seamlessly transitioning to a ready-to-go secondary system, we minimize downtime, protect critical operations, and minimize business disruption.
    Disaster Recovery - Specialty Icon
    Certifications: IaaS & PaaS
    FedRAMP Moderate
    FedRAMP Moderate - Specialty Icon
    NIST SP800-53 R4
    NIST SP800-53 R4 - Specialty Icon
    StateRAMP
    StateRAMP - Specialty Icon
    CSA STAR
    Provides a comprehensive framework and transparency in assessing and validating the security posture of cloud service providers, enabling informed decision-making and ensuring the protection of sensitive data
    CSA STAR - Specialty Icon
    Certifications: SaaS
    SOC2 Type II Certified
    The IaaS, PaaS, and SaaS layers of Sharetru's Advanced Security & Compliance Enablement Platform are SOC 2 Type II certified
    SOC2 Type II Certified - Yes Mark
    Compliance Enablement
    NIST SP 800-171
    NIST SP 800-171 - Specialty Icon
    DFARS 252.204-7012
    DFARS 252.204-7012 - Specialty Icon
    DFARS 252.204-7019
    DFARS 252.204-7019 - Specialty Icon
    DFARS 252.204-7020
    DFARS 252.204-7020 - Specialty Icon
    DFARS 252.204-7021
    DFARS 252.204-7021 - Specialty Icon
    CMMC 2.0 Levels 1 & 2
    In depth Customer Responsibility Matrix (CRM) for CMMC 2.0 Level 2 for the sharing of CUI is available for Sharetru clients
    CMMC 2.0 Levels 1 & 2 - Specialty Icon
    ITAR / EAR
    ITAR / EAR - Specialty Icon
    FERPA
    FERPA (Family Educational Rights and Privacy Act) is a United States federal law that governs the privacy and security of student educational records. FERPA is unique in its focus on protecting student information
    FERPA - Specialty Icon
    GLBA | SOX | PCI-DSS
    GLBA | SOX | PCI-DSS - Specialty Icon
    HIPAA | HITECH
    HIPAA | HITECH - Specialty Icon
    GDPR
    The General Data Protection Regulation (GDPR) allows for the transfer of personal data outside the European Economic Area (EEA) to countries that are deemed to have adequate data protection standards or with appropriate safeguards in place, such as a Data Processing Agreement or the use of Standard Contractual Clauses (SCCs).
    GDPR - Specialty Icon
    Infrastructure & Platform Security
    Dedicated IP Address
    An essential asset that enhances reliability, strengthens security measures, and boosts reputation, providing you with a distinct identity and trustworthiness when operating our software
    Dedicated IP Address - Yes Mark
    Network IPS
    A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    Network IPS - Specialty Icon
    Host IDS
    A Host-based Intrusion Detection Service (HIDS) monitors for and issues alerts for any unauthorized operating system changes
    Host IDS - Specialty Icon
    Malware Protection
    Comprehensive real-time protection preventing viruses, spyware, and other Web threats to internal or external endpoints
    Malware Protection - Specialty Icon

    Terms & Agreements TEMP

    Options
    Standard Online Terms of Service (TOS)
    Most customers accept our standard terms as a clickwrap agreement with by a checkbox agreement on the order
    Standard Online Terms of Service (TOS) - Yes Mark
    Consideration of Changes to TOS
    Negotiated, written and signed Terms of Service
    Consideration of Changes to TOS - No Mark
    Signed TOS & HIPAA BAA
    Ensures that any third-party entities or organizations handling protected health information (PHI) are legally bound to safeguard the data, maintain its confidentiality, and comply with HIPAA regulations. Requires Advanced Security and Compliance add-on
    Signed TOS & HIPAA BAA - Specialty Icon
    Signed TOS & Privacy DPA
    Establishes clear guidelines and safeguards for the handling, processing, and protection of personal data, ensuring privacy and security for individuals. Requires Advanced Security and Compliance add-on
    Signed TOS & Privacy DPA - Specialty Icon
    Performance

    Platform Features TEMP

    Analytics & Reporting
    Permanent Logs
    An irrefutable source of truth. Non-deletable file and admin logs (free from your storage quota) provide invaluable protection against data tampering or unauthorized modifications, and enable comprehensive forensic analysis and incident response
    Permanent Logs - Yes Mark
    Analytics & Reporting
    Analytics dashboard with historical trends plus exportable reports
    Analytics & Reporting - Yes Mark
    Automation
    Suspension by Date
    Auto-suspend users based on a future date of an administrator's choosing
    Suspension by Date - Yes Mark
    Suspension for Inactivity
    Prevent unnecessary access and potential breaches by implementing a number of days of inactivity before automatic suspension, while maintaining a safe and secure environment for active users
    Suspension for Inactivity - Yes Mark
    BCC Mailbox Journaling
    Journal all system notifications automatically to an internal email address of your choosing so they're always accessible, and easily searchable
    BCC Mailbox Journaling - Yes Mark
    Folder-level File Retention
    Establish policies for file retention and daily purge at the individual folder level or site wide
    Folder-level File Retention - Yes Mark
    Activity Notifications 
    Automatically send email notifications when a file is uploaded, downloaded, deleted, or when a storage threshold is reached
    Activity Notifications  - Yes Mark
    Failed Login Policies
    Essential defense mechanism that fortifies your system against unauthorized access attempts by IP address or username, effectively thwarting malicious actors, and reinforcing your organization's cybersecurity posture
    Failed Login Policies - Yes Mark
    Brand to Your Business
    White label w/Your Logo
    Establish a strong brand presence by customizing and branding the software with your own logo, effectively creating a seamless and consistent user experience that reinforces your identity
    White label w/Your Logo - Yes Mark
    Customize Colors
    Customize Colors - Yes Mark
    Customize Site Title
    Customize Site Title - Yes Mark
    Login Announcements
    A critical legal and security notice used by organizations to establish clear boundaries, enforce compliance, and enhance overall security posture by promoting awareness and accountability among users
    Login Announcements - Yes Mark
    Custom Domain Name
    Point your own subdomain (such as sftp.yourdomain.com) with a CNAME to your Sharetru subdomain with an SSL Certificate included at our expense
    Custom Domain Name - Yes Mark
    Custom User Agreements
    Legally enforces terms of service or company policies for system use by requiring user acceptance before application access
    Custom User Agreements - Yes Mark
    Concurrent Connections
    Per Remote IP Address
    The number of simultaneous FTP/S or SFTP connections per remote IP address (single office location for multiple users)
    25
    Total
    The total number of simultaneous FTP/S or SFTP connections for all users at all locations
    75
    Per User
    The number of simultaneous FTP/S or SFTP connections per username
    25
    Transfer Compatibility & File Sharing
    FTP, FTPS & SFTP Access
    Provides a robust and secure file transfer mechanism with no size limitations to help facilitate efficient data exchange, compatibility, security, automation, while supporting legacy systems. Configurable per user or at the site level
    FTP, FTPS & SFTP Access - Yes Mark
    Web Application Access
    Robust administration and file transfer capabilities supporting all modern web browsers
    Web Application Access - Yes Mark
    Guest Link Sharing
    Outbound and inbound file sharing links to send or receive files without creating a user account
    Guest Link Sharing - Yes Mark
    User Management & Authentication
    Single Sign-On (SSO)
    Integrate your organization's SSO to streamline the authentication process, minimize the risk of password-related vulnerabilities, and simplify user experiences
    Single Sign-On (SSO) - Yes Mark
    Site & Group Admin Roles 
    Site & Group Admin Roles  - Yes Mark
    Flexible User Permissions
    An industry benchmark. Grant users specific access and privileges based on their roles and responsibilities, ensuring data security and maintaining control over sensitive information
    Flexible User Permissions - Yes Mark
    Advanced Password Controls 
    Implement robust controls that empower employees with complex and unique passwords. Require change intervals and re-use controls to shield your sensitive data and safeguard your organization's reputation
    Advanced Password Controls  - Yes Mark
    SSH Key Authentication 
    Automated systems and SFTP software can use public SSH-key authentication to replace a tradition password, thwarting unauthorized access attempts and mitigating the risk of brute force attacks
    SSH Key Authentication  - Yes Mark
    User IP Restrictions
    User-based IP address and protocol restrictions can bolster security measures, protect against unauthorized access, and align with compliance requirements. Layer onto an SFTP connection for an additional security check
    User IP Restrictions - Yes Mark
    Two-factor Authentication
    Indispensable security feature that fortifies your defenses and bolsters your peace of mind. Users can be required to use 2FA and admins can restrict the OTP method allowed for each user. Studies have shown 99% of breaches can be thwarted with MFA in place
    Two-factor Authentication - Yes Mark

    Standard Security TEMP

    Cloud Partner Certifications
    SOC2 Type II Certified
    The IaaS, PaaS, and SaaS layers of Sharetru's Advanced Security & Compliance Enablement Platform are SOC 2 Type II certified
    SOC2 Type II Certified - Yes Mark
    ISO 27001 Certified
    An international standard for information security management systems (ISMS). It provides a framework for organizations to establish, implement, maintain, and continually improve their information security management practices
    ISO 27001 Certified - Yes Mark
    Encryption & Data Retention
    Encryption At-Rest
    NIST approved AES-256 encryption is widely regarded as the benchmark for secure symmetric encryption, and is used on all Sharetru storage systems
    Encryption At-Rest - Yes Mark
    Encryption in Transit
    Crucial for ensuring secure and private communication over the internet, shielding sensitive data from interception and unauthorized access. TLS 1.2 and NIST approved AES-256 and AES-128 on all protocols
    Encryption in Transit - Yes Mark
    FIPS 140-2 Approved
    FIPS 140-2 approved ciphers are an essential security feature due to their rigorous testing and validation process, ensuring that cryptographic algorithms meet stringent standards, thereby safeguarding sensitive information from potential breaches
    FIPS 140-2 Approved - Yes Mark
    Daily Offsite Backup
    Standard Security has 7 days of backups. If you're in need of disaster recovery on warm standby, please refer to the Advanced Compliance and Enablement offering
    Daily Offsite Backup - Yes Mark
    Infrastructure & Platform Security
    Dedicated Firewalls
    A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    Dedicated Firewalls - Yes Mark
    VMware High Availability
    Ensures seamless performance, maximum uptime, uninterrupted user experiences, and reliability
    VMware High Availability - Yes Mark
    Dedicated IP Address
    An essential asset that enhances reliability, strengthens security measures, and boosts reputation, providing you with a distinct identity and trustworthiness when operating our software
    Dedicated IP Address - Yes Mark
    Intruder IP Blacklisting
    Empowers our software to proactively ward off malicious actors permanently, keeping your systems and sensitive data shielded from unauthorized access, breaches, and cyber threats
    Intruder IP Blacklisting - Yes Mark
    Geo Fencing by Country
    An indispensable feature that enables you to fortify your defenses, restrict access to vulnerable regions, and effectively safeguard your data from malicious threats
    Geo Fencing by Country - Yes Mark
    A+ Qualys SSL Rating
    A crucial security feature as it demonstrates an organization's commitment to maintaining the highest level of cybersecurity standards. Sharetru’s SSL configuration for HTTPS have earned a rating of A+ by world-renowned Qualys SSL Labs.
    A+ Qualys SSL Rating - Yes Mark

    Advanced Security and Compliance Add-On TEMP

    Business Continuity
    Daily Onsite Backup
    By keeping 30 days of backups within arm's reach, we eliminate the risks of relying solely on offsite solutions, ensuring immediate accessibility, swift recovery, and total control while bolstering your company's resilience to disaster.
    Daily Onsite Backup - Specialty Icon
    Disaster Recovery
    Keep your business thriving even in the face of unforeseen disruptions with FedRAMP moderate authorized IaaS and PaaS on Warm Standby. By seamlessly transitioning to a ready-to-go secondary system, we minimize downtime, protect critical operations, and minimize business disruption.
    Disaster Recovery - Specialty Icon
    Certifications: IaaS & PaaS
    FedRAMP Moderate
    FedRAMP Moderate - Specialty Icon
    NIST SP800-53 R4
    NIST SP800-53 R4 - Specialty Icon
    StateRAMP
    StateRAMP - Specialty Icon
    CSA STAR
    Provides a comprehensive framework and transparency in assessing and validating the security posture of cloud service providers, enabling informed decision-making and ensuring the protection of sensitive data
    CSA STAR - Specialty Icon
    Certifications: SaaS
    SOC2 Type II Certified
    The IaaS, PaaS, and SaaS layers of Sharetru's Advanced Security & Compliance Enablement Platform are SOC 2 Type II certified
    SOC2 Type II Certified - Yes Mark
    Compliance Enablement
    NIST SP 800-171
    NIST SP 800-171 - Specialty Icon
    DFARS 252.204-7012
    DFARS 252.204-7012 - Specialty Icon
    DFARS 252.204-7019
    DFARS 252.204-7019 - Specialty Icon
    DFARS 252.204-7020
    DFARS 252.204-7020 - Specialty Icon
    DFARS 252.204-7021
    DFARS 252.204-7021 - Specialty Icon
    CMMC 2.0 Levels 1 & 2
    In depth Customer Responsibility Matrix (CRM) for CMMC 2.0 Level 2 for the sharing of CUI is available for Sharetru clients
    CMMC 2.0 Levels 1 & 2 - Specialty Icon
    ITAR / EAR
    ITAR / EAR - Specialty Icon
    FERPA
    FERPA (Family Educational Rights and Privacy Act) is a United States federal law that governs the privacy and security of student educational records. FERPA is unique in its focus on protecting student information
    FERPA - Specialty Icon
    GLBA | SOX | PCI-DSS
    GLBA | SOX | PCI-DSS - Specialty Icon
    HIPAA | HITECH
    HIPAA | HITECH - Specialty Icon
    GDPR
    The General Data Protection Regulation (GDPR) allows for the transfer of personal data outside the European Economic Area (EEA) to countries that are deemed to have adequate data protection standards or with appropriate safeguards in place, such as a Data Processing Agreement or the use of Standard Contractual Clauses (SCCs).
    GDPR - Specialty Icon
    Infrastructure & Platform Security
    Dedicated IP Address
    An essential asset that enhances reliability, strengthens security measures, and boosts reputation, providing you with a distinct identity and trustworthiness when operating our software
    Dedicated IP Address - Yes Mark
    Network IPS
    A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    Network IPS - Specialty Icon
    Host IDS
    A Host-based Intrusion Detection Service (HIDS) monitors for and issues alerts for any unauthorized operating system changes
    Host IDS - Specialty Icon
    Malware Protection
    Comprehensive real-time protection preventing viruses, spyware, and other Web threats to internal or external endpoints
    Malware Protection - Specialty Icon

    Terms & Agreements TEMP

    Options
    Standard Online Terms of Service (TOS)
    Most customers accept our standard terms as a clickwrap agreement with by a checkbox agreement on the order
    Standard Online Terms of Service (TOS) - Yes Mark
    Signed TOS & HIPAA BAA
    Ensures that any third-party entities or organizations handling protected health information (PHI) are legally bound to safeguard the data, maintain its confidentiality, and comply with HIPAA regulations. Requires Advanced Security and Compliance add-on
    Signed TOS & HIPAA BAA - Specialty Icon
    Signed TOS & Privacy DPA
    Establishes clear guidelines and safeguards for the handling, processing, and protection of personal data, ensuring privacy and security for individuals. Requires Advanced Security and Compliance add-on
    Signed TOS & Privacy DPA - Specialty Icon
    Consideration of Changes to TOS
    Negotiated, written and signed Terms of Service
    Consideration of Changes to TOS - No Mark
    Enterprise

    Platform Features TEMP

    Analytics & Reporting
    Permanent Logs
    An irrefutable source of truth. Non-deletable file and admin logs (free from your storage quota) provide invaluable protection against data tampering or unauthorized modifications, and enable comprehensive forensic analysis and incident response
    Permanent Logs - Yes Mark
    Analytics & Reporting
    Analytics dashboard with historical trends plus exportable reports
    Analytics & Reporting - Yes Mark
    Automation
    Suspension by Date
    Auto-suspend users based on a future date of an administrator's choosing
    Suspension by Date - Yes Mark
    Suspension for Inactivity
    Prevent unnecessary access and potential breaches by implementing a number of days of inactivity before automatic suspension, while maintaining a safe and secure environment for active users
    Suspension for Inactivity - Yes Mark
    BCC Mailbox Journaling
    Journal all system notifications automatically to an internal email address of your choosing so they're always accessible, and easily searchable
    BCC Mailbox Journaling - Yes Mark
    Folder-level File Retention
    Establish policies for file retention and daily purge at the individual folder level or site wide
    Folder-level File Retention - Yes Mark
    Activity Notifications 
    Automatically send email notifications when a file is uploaded, downloaded, deleted, or when a storage threshold is reached
    Activity Notifications  - Yes Mark
    Failed Login Policies
    Essential defense mechanism that fortifies your system against unauthorized access attempts by IP address or username, effectively thwarting malicious actors, and reinforcing your organization's cybersecurity posture
    Failed Login Policies - Yes Mark
    Brand to Your Business
    White label w/Your Logo
    Establish a strong brand presence by customizing and branding the software with your own logo, effectively creating a seamless and consistent user experience that reinforces your identity
    White label w/Your Logo - Yes Mark
    Customize Colors
    Customize Colors - Yes Mark
    Customize Site Title
    Customize Site Title - Yes Mark
    Login Announcements
    A critical legal and security notice used by organizations to establish clear boundaries, enforce compliance, and enhance overall security posture by promoting awareness and accountability among users
    Login Announcements - Yes Mark
    Custom Domain Name
    Point your own subdomain (such as sftp.yourdomain.com) with a CNAME to your Sharetru subdomain with an SSL Certificate included at our expense
    Custom Domain Name - Yes Mark
    Custom User Agreements
    Legally enforces terms of service or company policies for system use by requiring user acceptance before application access
    Custom User Agreements - Yes Mark
    Concurrent Connections
    Per Remote IP Address
    The number of simultaneous FTP/S or SFTP connections per remote IP address (single office location for multiple users)
    No Limit
    Total
    The total number of simultaneous FTP/S or SFTP connections for all users at all locations
    Software Limit Removed
    Per User
    The number of simultaneous FTP/S or SFTP connections per username
    25
    Transfer Compatibility & File Sharing
    FTP, FTPS & SFTP Access
    Provides a robust and secure file transfer mechanism with no size limitations to help facilitate efficient data exchange, compatibility, security, automation, while supporting legacy systems. Configurable per user or at the site level
    FTP, FTPS & SFTP Access - Yes Mark
    Web Application Access
    Robust administration and file transfer capabilities supporting all modern web browsers
    Web Application Access - Yes Mark
    Guest Link Sharing
    Outbound and inbound file sharing links to send or receive files without creating a user account
    Guest Link Sharing - Yes Mark
    User Management & Authentication
    Single Sign-On (SSO)
    Integrate your organization's SSO to streamline the authentication process, minimize the risk of password-related vulnerabilities, and simplify user experiences
    Single Sign-On (SSO) - Yes Mark
    Site & Group Admin Roles 
    Site & Group Admin Roles  - Yes Mark
    Flexible User Permissions
    An industry benchmark. Grant users specific access and privileges based on their roles and responsibilities, ensuring data security and maintaining control over sensitive information
    Flexible User Permissions - Yes Mark
    Advanced Password Controls 
    Implement robust controls that empower employees with complex and unique passwords. Require change intervals and re-use controls to shield your sensitive data and safeguard your organization's reputation
    Advanced Password Controls  - Yes Mark
    SSH Key Authentication 
    Automated systems and SFTP software can use public SSH-key authentication to replace a tradition password, thwarting unauthorized access attempts and mitigating the risk of brute force attacks
    SSH Key Authentication  - Yes Mark
    User IP Restrictions
    User-based IP address and protocol restrictions can bolster security measures, protect against unauthorized access, and align with compliance requirements. Layer onto an SFTP connection for an additional security check
    User IP Restrictions - Yes Mark
    Two-factor Authentication
    Indispensable security feature that fortifies your defenses and bolsters your peace of mind. Users can be required to use 2FA and admins can restrict the OTP method allowed for each user. Studies have shown 99% of breaches can be thwarted with MFA in place
    Two-factor Authentication - Yes Mark

    Standard Security TEMP

    Cloud Partner Certifications
    SOC2 Type II Certified
    The IaaS, PaaS, and SaaS layers of Sharetru's Advanced Security & Compliance Enablement Platform are SOC 2 Type II certified
    SOC2 Type II Certified - Yes Mark
    ISO 27001 Certified
    An international standard for information security management systems (ISMS). It provides a framework for organizations to establish, implement, maintain, and continually improve their information security management practices
    ISO 27001 Certified - Yes Mark
    Encryption & Data Retention
    Encryption At-Rest
    NIST approved AES-256 encryption is widely regarded as the benchmark for secure symmetric encryption, and is used on all Sharetru storage systems
    Encryption At-Rest - Yes Mark
    Encryption in Transit
    Crucial for ensuring secure and private communication over the internet, shielding sensitive data from interception and unauthorized access. TLS 1.2 and NIST approved AES-256 and AES-128 on all protocols
    Encryption in Transit - Yes Mark
    FIPS 140-2 Approved
    FIPS 140-2 approved ciphers are an essential security feature due to their rigorous testing and validation process, ensuring that cryptographic algorithms meet stringent standards, thereby safeguarding sensitive information from potential breaches
    FIPS 140-2 Approved - Yes Mark
    Daily Offsite Backup
    Standard Security has 7 days of backups. If you're in need of disaster recovery on warm standby, please refer to the Advanced Compliance and Enablement offering
    Daily Offsite Backup - Yes Mark
    Infrastructure & Platform Security
    Dedicated Firewalls
    A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    Dedicated Firewalls - Yes Mark
    VMware High Availability
    Ensures seamless performance, maximum uptime, uninterrupted user experiences, and reliability
    VMware High Availability - Yes Mark
    Dedicated IP Address
    An essential asset that enhances reliability, strengthens security measures, and boosts reputation, providing you with a distinct identity and trustworthiness when operating our software
    Dedicated IP Address - Yes Mark
    Intruder IP Blacklisting
    Empowers our software to proactively ward off malicious actors permanently, keeping your systems and sensitive data shielded from unauthorized access, breaches, and cyber threats
    Intruder IP Blacklisting - Yes Mark
    Geo Fencing by Country
    An indispensable feature that enables you to fortify your defenses, restrict access to vulnerable regions, and effectively safeguard your data from malicious threats
    Geo Fencing by Country - Yes Mark
    A+ Qualys SSL Rating
    A crucial security feature as it demonstrates an organization's commitment to maintaining the highest level of cybersecurity standards. Sharetru’s SSL configuration for HTTPS have earned a rating of A+ by world-renowned Qualys SSL Labs.
    A+ Qualys SSL Rating - Yes Mark

    Advanced Security and Compliance Add-On TEMP

    Business Continuity
    Daily Onsite Backup
    By keeping 30 days of backups within arm's reach, we eliminate the risks of relying solely on offsite solutions, ensuring immediate accessibility, swift recovery, and total control while bolstering your company's resilience to disaster.
    Daily Onsite Backup - Specialty Icon
    Disaster Recovery
    Keep your business thriving even in the face of unforeseen disruptions with FedRAMP moderate authorized IaaS and PaaS on Warm Standby. By seamlessly transitioning to a ready-to-go secondary system, we minimize downtime, protect critical operations, and minimize business disruption.
    Disaster Recovery - Specialty Icon
    Certifications: IaaS & PaaS
    FedRAMP Moderate
    FedRAMP Moderate - Specialty Icon
    NIST SP800-53 R4
    NIST SP800-53 R4 - Specialty Icon
    StateRAMP
    StateRAMP - Specialty Icon
    CSA STAR
    Provides a comprehensive framework and transparency in assessing and validating the security posture of cloud service providers, enabling informed decision-making and ensuring the protection of sensitive data
    CSA STAR - Specialty Icon
    Certifications: SaaS
    SOC2 Type II Certified
    The IaaS, PaaS, and SaaS layers of Sharetru's Advanced Security & Compliance Enablement Platform are SOC 2 Type II certified
    SOC2 Type II Certified - Yes Mark
    Compliance Enablement
    NIST SP 800-171
    NIST SP 800-171 - Specialty Icon
    DFARS 252.204-7012
    DFARS 252.204-7012 - Specialty Icon
    DFARS 252.204-7019
    DFARS 252.204-7019 - Specialty Icon
    DFARS 252.204-7020
    DFARS 252.204-7020 - Specialty Icon
    DFARS 252.204-7021
    DFARS 252.204-7021 - Specialty Icon
    CMMC 2.0 Levels 1 & 2
    In depth Customer Responsibility Matrix (CRM) for CMMC 2.0 Level 2 for the sharing of CUI is available for Sharetru clients
    CMMC 2.0 Levels 1 & 2 - Specialty Icon
    ITAR / EAR
    ITAR / EAR - Specialty Icon
    FERPA
    FERPA (Family Educational Rights and Privacy Act) is a United States federal law that governs the privacy and security of student educational records. FERPA is unique in its focus on protecting student information
    FERPA - Specialty Icon
    GLBA | SOX | PCI-DSS
    GLBA | SOX | PCI-DSS - Specialty Icon
    HIPAA | HITECH
    HIPAA | HITECH - Specialty Icon
    GDPR
    The General Data Protection Regulation (GDPR) allows for the transfer of personal data outside the European Economic Area (EEA) to countries that are deemed to have adequate data protection standards or with appropriate safeguards in place, such as a Data Processing Agreement or the use of Standard Contractual Clauses (SCCs).
    GDPR - Specialty Icon
    Infrastructure & Platform Security
    Dedicated IP Address
    An essential asset that enhances reliability, strengthens security measures, and boosts reputation, providing you with a distinct identity and trustworthiness when operating our software
    Dedicated IP Address - Yes Mark
    Network IPS
    A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    Network IPS - Specialty Icon
    Host IDS
    A Host-based Intrusion Detection Service (HIDS) monitors for and issues alerts for any unauthorized operating system changes
    Host IDS - Specialty Icon
    Malware Protection
    Comprehensive real-time protection preventing viruses, spyware, and other Web threats to internal or external endpoints
    Malware Protection - Specialty Icon

    Terms & Agreements TEMP

    Options
    Standard Online Terms of Service (TOS)
    Most customers accept our standard terms as a clickwrap agreement with by a checkbox agreement on the order
    Standard Online Terms of Service (TOS) - Yes Mark
    Consideration of Changes to TOS
    Negotiated, written and signed Terms of Service
    Consideration of Changes to TOS - Yes Mark
    Signed TOS & HIPAA BAA
    Ensures that any third-party entities or organizations handling protected health information (PHI) are legally bound to safeguard the data, maintain its confidentiality, and comply with HIPAA regulations. Requires Advanced Security and Compliance add-on
    Signed TOS & HIPAA BAA - Specialty Icon
    Signed TOS & Privacy DPA
    Establishes clear guidelines and safeguards for the handling, processing, and protection of personal data, ensuring privacy and security for individuals. Requires Advanced Security and Compliance add-on
    Signed TOS & Privacy DPA - Specialty Icon