Data Security – Four Levels That Secure Your File Shares

ExaVault takes data security and the security of your file transfers seriously. Very seriously. Protect each step of the process using our file sharing service from login to data storage to sharing files and sending links to your clients.

Data security image on computer screen

1. Data Security at the Account Level

We know how critical data security is, so we decided to start with the basics – beefy protection for every account’s storage and file transfer connections. The main features, which are available with all ExaVault accounts are:

   • IP address restrictions

   • Secure FTP connections

   • Permissions
   • Complex passwords 


IP Address Restrictions

IP address restrictions allow connections from only those devices that are specified by the owner of the account. Why is this important? Let’s say you are hacked. What then? With ExaVault’s IP address restrictions, you aren’t able to be hacked by a person trying to log in from a location that doesn’t match an approved IP address.

This feature is becoming common for lots of online services. For example, Google sends you a notification when you log in to your account from a new device. At ExaVault it works even better. Nobody (not even you) can log in on a new device until the IP address restrictions are enabled. Pretty sweet, right?

SFTP and FTPS

After making sure your account’s storage is safe, we turn to file transfer connections. We consider sending and receiving files as a vital part of everyday business. That is why we don’t work exclusively with insecure FTP for file sharing. You can use secure connections on protocols like SFTP and FTPS freely. Switch between SFTP and FTPS via your FTP client to encrypt your file shares for sending and receiving files securely. If you use our web file management system, you can be sure that your file transfers are secure due to the HTTPS connection.  

Web File Management

It is difficult to make user management safe, especially when you create an unlimited number of users. With our nifty web file management system, you can enable complex password enforcement that keeps users from creating accounts with easy-to-guess passwords. Once new users get their accounts, you can set up permissions allowing users to see (or not see) certain files and folders. Last, but certainly not least, our file management system allows you to set up expiration periods for both users and file shares.  

2. Data Security at the Data Level

Precious, Precious Data

We care about your data so much that we go to great lengths to keep it secure. First, we make backups to multiple locations in near-real time at our primary data centers. Second, the backups are sent to our secondary disaster recovery data centers. Third, all of your data is encrypted from the moment it is sent via SFTP, FTPS or HTTPS (the last one works when you use ExaVault’s web interface).

Finally, with ExaVault’s unique “FTP Resume” feature, you can rest assured that your data will go where you want it to go. If a large file transfer is interrupted (which we all know is inevitable), it will resume when the internet connection is restored. Thus instilling confidence that all of your precious data is in the best of hands with ExaVault.

3. Data Security at the Server Level

It is near impossible to maintain protected data storage and secure file transfers without a powerful FTP server. Our team has gone to great lengths to create a platform with security as a core requirement. We fully control the cloud infrastructure all the way down to the hardware level. We have our own data storage platform with a high-security profile for all servers. Access to our FTP servers is logged and monitored for intrusions or other anomalies continuously.

Rest assured that all databases and customer data storage have firewalls at the edge along with internal controls. Your privacy is just as precious as your data, so all encrypted traffic uses an SSL certificate with a 2048 bit private key, employing TLS v1.2.

4. Data Security at the Physical Level

ExaVault owns and physically controls all of its infrastructure. Our equipment is housed in best-in-class carrier-grade data centers. The level of security at ExaVault is like the Pentagon, with 24/7 surveillance by data center staff year round without breaks or holidays. Nobody can just come and look at the equipment due to highly controlled sign-in/sign-out procedures. Plus four-factor biometric verification on each floor is required for all personnel. Of course, all our data centers are SOC 2 Type ½ Compliant and ISO 27001 Certified.

We do Audits

The four levels of data security described above have been built and controlled by the ExaVault team from the very beginning. Our secure system for sending, receiving and storing files is the most crucial part of our work, but it is not complete without audits. ExaVault performs regular audits and training using internal and third-party tools to make sure our platform is secure at all times. We have strong terms of service and data privacy policies with customization available for enterprise customers.

ExaVault will keep your data safe. Our strongly protected physical infrastructure for data storage and an easy-to-use web interface to ensures the safest FTP online experience. You can count on us to keep your data secure, and your business files uploading and downloading securely with our extensive customer-accessible security options, fully redundant infrastructure, and real-time backup systems. For current and future ExVaultians, may your files forever be secure!