SOC 2 Type II · GDPR · CCPA · ISO 27001

Security built in,
not bolted on.

Enterprise-grade encryption, compliance, and audit trails. Your files are protected on every hop, in every store.

SOC 2 Type II
Audited annually
GDPR
EU data residency
CCPA
Right to delete
ISO 27001
In progress, 2026

Encryption

How your file travels.

  1. 1

    On your device

    TLS 1.3 only. Your file is split into 32 MB chunks, each hashed with SHA-256 for integrity checking.

  2. 2

    In transit

    Chunks travel through our edge network over TLS 1.3 only. No older versions, no weak ciphers.

  3. 3

    At rest

    Each file is encrypted with a unique AES-256-GCM key, wrapped by a customer master key in a managed KMS.

  4. 4

    On deletion

    When you delete a file, we zero the per-file key and purge content from all edge caches within 24 hours.

Access & Control

Your data, your rules.

👥

Role-based access control

Admin, editor, and viewer roles. Granular permissions for enterprise teams. Single-use download links with expiration.

📋

Audit logs

Every action logged. Who accessed what, when, and from where. 90-day retention by default, longer available on request.

🔒

IP allowlisting

Restrict access to specific IP ranges. Perfect for enterprise networks and secure file sharing.

🗑️

Right to deletion

Permanently delete files on demand. Crypto-erasure: we zero keys and wipe content within 24 hours.

Infrastructure

Built for scale and safety.

Availability

  • 99.9% uptime SLA
  • Multi-region redundancy
  • Automatic failover
  • Daily backups, 30-day retention

Performance

  • Global CDN (100+ POPs)
  • DDoS protection (built-in)
  • Rate limiting & WAF
  • Sub-50ms median latency

Data Residency

  • EU (Ireland) – GDPR default
  • US (Virginia) – SOC 2 audited
  • Custom regions (enterprise)
  • No third-party CDN caching

Monitoring

  • 24/7 security monitoring
  • Real-time threat detection
  • Incident response < 1h
  • Monthly security reports

Security concerns

Found a vulnerability?

If you discover a security vulnerability, please email [email protected] with details. We acknowledge within 24 hours and work to resolve security issues promptly. Please practice responsible disclosure and avoid public disclosure until we've had time to patch.

< 24h
Response time
Confidential
Handling approach