For information. Elmatica can not guarantee for the security of files transferred by standard email. Email sent from your client servers will enter and pass through several unsecured locations/servers/routers before they enter our secure environment, hence it is not secure.
If you want to transfer files securely to us, please use the upload functionality on our website (www.elmatica.com), which states FILES OVER 20 MB. This opens a secure and encrypted channel between our companies and it can be used for all occasions where you want more control over the transfer/upload. The portal/service allows you to upload the data in a secure environment and Elmatica staff will immediately be notified concerning the upload and we will download it securely to our secure site. Please se a description of the security protocool provided by our supplier, DigitalPidgeon.com:
Digital Pigeon uses several technologies and methodologies to keep your files secure.
Encryption & Digital Security
- All requests to our app and API are secured using standard HTTPS SSL encryption with the AES_128_GCM cipher and files are transferred using standard HTTPS SSL with the AES_128_CBC cipher.
- As the files are uploaded we encrypt them with server-side encryption using one of the strongest block ciphers available the AES_256 cipher before storing them on disk. This ensures that even if someone got physical access to our servers they would not be able to read the files without a secret key.
- Each recipient you send files to receives a unique link to those files, the link is made up of a unique identifier and the recipients email address – using a link that’s made up of these two components makes it practically impossible for a third party to guess the link to your files
- We also provide an optional password field when sending the files which you must communicate to the recipients separately – this means that even if a third party could guess the unique link to your files they would then be challenged for a password
Digital Pigeon hosts it's application in the Amazon AWS cloud infrastructure. AWS’s data centers are state of the art, utilizing innovative architectural and engineering approaches. Amazon has many years of experience in designing, constructing, and operating large-scale data centers. This experience has been applied to the AWS platform and infrastructure. AWS data centers are housed in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a minimum of two times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.