YouSendIt Security Data Sheet – Secure File Transfer and Data ...
YouSendIt Security Data Sheet – Secure File Transfer and Data ...
YouSendIt Security Data Sheet – Secure File Transfer and Data ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>YouSendIt</strong><br />
<strong>Security</strong><br />
Network <strong>and</strong> System <strong>Security</strong><br />
<strong>YouSendIt</strong> leverages ISP <strong>and</strong> enterprise-grade<br />
firewalls that provide IP filtering <strong>and</strong> DOS<br />
protection for intrusion detection protection.<br />
All incoming network ports are blocked except<br />
for 80 <strong>and</strong> 443, which are dynamically opened<br />
<strong>and</strong> closed to allow HTTP <strong>and</strong> HTTPS traffic.<br />
Proactive network scans run at all times,<br />
<strong>and</strong> Internet spiders <strong>and</strong> search engines are<br />
blocked from files. At-rest encryption ensures<br />
that your entire system, operating system, <strong>and</strong><br />
data <strong>and</strong> system files are secured at the highest<br />
level against cyber threats as well as lost or<br />
stolen disks.<br />
Application <strong>Security</strong><br />
In addition to a hardened operating system,<br />
<strong>YouSendIt</strong> uses password <strong>and</strong> privilege<br />
policies to authenticate <strong>and</strong> authorize users.<br />
All passwords <strong>and</strong> credentials are encrypted<br />
during transmissions. With Active Directory<br />
integration, users are deployed <strong>and</strong> managed<br />
within the customer network. No passwords<br />
are stored outside of the corporate network,<br />
<strong>and</strong> the administrator can tightly manage the<br />
entire process.<br />
<strong>Data</strong> Protection During <strong>Transfer</strong> <strong>and</strong> At Rest<br />
All data in motion is encrypted using 128-bit<br />
SSL encryption with class 3 certificates <strong>and</strong><br />
cryptography. <strong>File</strong> names are dynamically<br />
scrambled, <strong>and</strong> data is continuously replicated<br />
<strong>and</strong> scanned for viruses. All data in our secure<br />
data centers is encrypted using 256-bit AES<br />
encryption. These measures ensure that<br />
the integrity of the data is maintained during<br />
transmission, uploading, downloading,<br />
<strong>and</strong> storage of a file.<br />
© 2010 <strong>YouSendIt</strong>. All rights reserved.<br />
Application<br />
• Hardened operating system<br />
• Proactive vulnerability scan<br />
• No single point of failure<br />
• Horizontally scalable modules<br />
• Advanced access <strong>and</strong><br />
authentication controls<br />
<strong>Data</strong> Center<br />
• SAS 70 Type II certified<br />
• Video surveillance<br />
• Highly restricted access<br />
• Biometric scanning<br />
• Detailed audit logs<br />
• Redundant power supplies<br />
• Seismically protected<br />
<strong>Data</strong>sheet<br />
<strong>Data</strong><br />
• Encryption in transit: 128-bit SSL<br />
• Encryption at rest: 256-bit AES<br />
• Redundant file copies<br />
• Virus scanning<br />
• Dynamic file name scrambling<br />
• <strong>Data</strong> confidentiality—No search<br />
engine or spider access<br />
• <strong>File</strong> expiration <strong>and</strong> password<br />
protection options<br />
Network<br />
• Redundant 10GB b<strong>and</strong>width<br />
• ISP grade firewalls<br />
• High performance load balancers<br />
• IP <strong>and</strong> protocol filtering<br />
• DOS protection<br />
• Proactive network vulnerability scans