You are on page 1of 2

by EMC

Syncplicity Enterprise and Business Editions deliver AES-256 encryption of data


during transmission and at rest in
a highly secure file sync and sharing service built to
our data centers and on user
meet the requirements of businesses. Ensuring
mobile devices
customer data is safe and available are of the
Data stored in four geographi-
utmost importance. In order to achieve the goal of
cally dispersed SSAE16 SOC2
security, Syncplicitys service is built upon many Audited data centers using high
years of experience and uses multiple levels of redeundancy storage
defense-in-depth to ensure end-to-end confidential- 99.999999999% data durability
ity of customer data. Encryption keys and data stored
in separate data centers
Hosting Certifications
All of Syncplicitys servers are housed AES-256 SSL encryption is used for
Internal controls protect user
in data centers that have successfully all authenticated website access, as privacy
completed a SSAE 16 SOC2 audit well as client interactions with the Customer IT Controls and trans-
and testing from independent audi- service backend. No data is ever parency protect user data
tors. This certifies that each data transmitted unencrypted over the
center has met rigorous requirements internet.
around physical security, physical
given key or a weakness found within
access, and internal controls. To ensure client security, the client
the AES encryption algorithm itself,
never opens any externally accessible
the combination of using the highest
Network and Storage port, communicates with any non-
level of AES and a unique key per file
Security authenticated source, and stores
revision substantially increase security
All data being transported or stored cached credential information in an
by increasing the level of work
within Syncplicity is encrypted with the encrypted format to close three of the
required for a compromise and by
highest levels of encryption available most common client attack vectors.
limiting the potential scope of vulner-
for each phase of its lifecycle to
ability to a single file revision.
protect files the moment they leave a All files within Syncplicity are stored
clients computer. Data in flight and at with AES-256 encryption using a
All files are stored in quadruplicate
rest are encrypted using military grade strongly generated key that is unique
across three data centers to provide
AES encryption set to its highest to each file revision. In the unlikely
99.99999999999% durability for files
256-bit level. case of a brute-force compromise of a
and provide availability in the face of

sales@syncplicity.com | www.syncplicity.com | 1-888-997-9627 2013 Syncplicity, Inc. All Rights Reserved.


by EMC

the loss of two data centers. If a file is data. The encrypted file data and sync and share files and folders,
deleted, the encrypted file itself will be proper file version encryption key are along with tracking of the sync and
removed from storage and the related brought together only on an sharing of corporate data for
encryption key for each of its associ- as-needed basis and in a tracked compliance purposes.
ated file revisions will be destroyed. manner. By keeping the encryption Easy enforcement of data retention
When storage is decommissioned, all key completely separate from the file policies, enabling shared files and
current providers use the techniques vault, Syncplicity provides a higher folders to be automatically and
detailed in DoD 5220.22-M (National level of security by not having a single permanently deleted from user
Industrial Security Program Operating point of compromise. devices when that information is
Manual) or NIST 800-88 (Guidelines un-shared with a user, whether
for Media Sanitation) to destroy the Internal Syncplicity Controls they are an employee, contractor
encrypted customer files as part of the To ensure proper internal controls on or anyone outside of the company.
decommissioning process. access to customer files, employee
The ability to remote wipe any
access to the Syncplicity infrastructure
users account, their individual
Internal networks are kept clearly is controlled and managed. Systems
computers or mobile devices of all
divided from external networks and are monitored for security issues and
corporate data managed under
are protected by industry standard software updates.
Syncplicity associated with a user
firewall and proxy configurations to
or particular device, in the event a
prevent unauthorized direct access. Syncplicity only provides data center
device is lost, an employee is
access to employees who have a
terminated, a contractor is finished
Best-in-Class Mobile App Security legitimate business need. When an
with their assignment, or for any
Syncplicity protects user data on employee no longer has a business
other information compliance
mobile devices by using AES 256-bit need, access is immediately revoked.
reason.
encryption for data during transmis- Additionally, no employee besides our
Native support for single sign-on
sion and while stored on the mobile VP of Engineering and our CTO have
(SSO) against any SAML or
device. Syncplicity Mobile Apps allow access to both authentication and key
OpenID based federated identity
users to set 4-digit PINs in addition to management data centers and
provider to enable use of existing
their normal device password as an encrypted file storage data centers to
credentials such as Active
extra layer of security. Failure to prevent any potential unauthorized
Directory/LDAP, Google Apps, and
properly enter the 4-digit PIN will disclosure of customer data.
OneLogin, including optional
automatically delete user data.
2-factor authentication.
Syncplicity Mobile Apps can also be Customer-controlled Policies
remote-wiped by users or Admins if a Syncplicity offers business several
device is lost or stolen. ways to protect data from loss at the
user-level. The Syncplicity Security
Two Data Center Policy and Compliance Center in our Busi-
For an additional layer of security, ness Edition gives companies and
Syncplicity maintains all servers their IT Administrators:
responsible for authentication and Centralized control over which
encryption key management in a devices -- either computers or
separate data center from the data mobile -- inside or outside the
centers housing the encrypted file company may be used to access,

sales@syncplicity.com | www.syncplicity.com | 1-888-997-9627 2013 Syncplicity, Inc. All Rights Reserved.