25.07.2012 Views

YouSendIt Security Data Sheet – Secure File Transfer and Data ...

YouSendIt Security Data Sheet – Secure File Transfer and Data ...

YouSendIt Security Data Sheet – Secure File Transfer and Data ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>YouSendIt</strong><br />

<strong>Security</strong><br />

Network <strong>and</strong> System <strong>Security</strong><br />

<strong>YouSendIt</strong> leverages ISP <strong>and</strong> enterprise-grade<br />

firewalls that provide IP filtering <strong>and</strong> DOS<br />

protection for intrusion detection protection.<br />

All incoming network ports are blocked except<br />

for 80 <strong>and</strong> 443, which are dynamically opened<br />

<strong>and</strong> closed to allow HTTP <strong>and</strong> HTTPS traffic.<br />

Proactive network scans run at all times,<br />

<strong>and</strong> Internet spiders <strong>and</strong> search engines are<br />

blocked from files. At-rest encryption ensures<br />

that your entire system, operating system, <strong>and</strong><br />

data <strong>and</strong> system files are secured at the highest<br />

level against cyber threats as well as lost or<br />

stolen disks.<br />

Application <strong>Security</strong><br />

In addition to a hardened operating system,<br />

<strong>YouSendIt</strong> uses password <strong>and</strong> privilege<br />

policies to authenticate <strong>and</strong> authorize users.<br />

All passwords <strong>and</strong> credentials are encrypted<br />

during transmissions. With Active Directory<br />

integration, users are deployed <strong>and</strong> managed<br />

within the customer network. No passwords<br />

are stored outside of the corporate network,<br />

<strong>and</strong> the administrator can tightly manage the<br />

entire process.<br />

<strong>Data</strong> Protection During <strong>Transfer</strong> <strong>and</strong> At Rest<br />

All data in motion is encrypted using 128-bit<br />

SSL encryption with class 3 certificates <strong>and</strong><br />

cryptography. <strong>File</strong> names are dynamically<br />

scrambled, <strong>and</strong> data is continuously replicated<br />

<strong>and</strong> scanned for viruses. All data in our secure<br />

data centers is encrypted using 256-bit AES<br />

encryption. These measures ensure that<br />

the integrity of the data is maintained during<br />

transmission, uploading, downloading,<br />

<strong>and</strong> storage of a file.<br />

© 2010 <strong>YouSendIt</strong>. All rights reserved.<br />

Application<br />

• Hardened operating system<br />

• Proactive vulnerability scan<br />

• No single point of failure<br />

• Horizontally scalable modules<br />

• Advanced access <strong>and</strong><br />

authentication controls<br />

<strong>Data</strong> Center<br />

• SAS 70 Type II certified<br />

• Video surveillance<br />

• Highly restricted access<br />

• Biometric scanning<br />

• Detailed audit logs<br />

• Redundant power supplies<br />

• Seismically protected<br />

<strong>Data</strong>sheet<br />

<strong>Data</strong><br />

• Encryption in transit: 128-bit SSL<br />

• Encryption at rest: 256-bit AES<br />

• Redundant file copies<br />

• Virus scanning<br />

• Dynamic file name scrambling<br />

• <strong>Data</strong> confidentiality—No search<br />

engine or spider access<br />

• <strong>File</strong> expiration <strong>and</strong> password<br />

protection options<br />

Network<br />

• Redundant 10GB b<strong>and</strong>width<br />

• ISP grade firewalls<br />

• High performance load balancers<br />

• IP <strong>and</strong> protocol filtering<br />

• DOS protection<br />

• Proactive network vulnerability scans

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!