You can control who and when downloaded your files. When you send someone a file via email, you never know if the person downloaded the attachment.
Sendit24.com servers are located in facilities that are managed by Windstream Hosted Solutions and Amazon Web Services, trusted providers of secure and reliable data centers.
The data centers feature the following computer network security measures:
SAS 70 audited data centers
Ballistic-proof exterior, including doors & windows
Fingerprint scanners and ID checking for all entry and exit of the facility
Double Man Traps force double verification and provides extra secure data center entry
Redundant off-site monitoring of all security systems
Locked Cabinets and Cages
Our privately managed server farm is equipped with the latest firewalls and computer internet security updates to help keep your data completely safe.
All communications between Sendit24.com and the user are encrypted using the Secure Socket Layer (SSL). This is the same functionality used by banks and popular e-commerce services such as Amazon.com for secure communication. Sendit24.com also offers the ability to store your files encrypted when they are at rest on our servers, adding an additional layer of security.
When Sendit24.com users create folders in the system, only the specified users that are designated by owner of the folder are able to access the contents of those folders. Users who do not have access to the folder will not even see the folder in their view of the system.
Each user of the system has a unique login and password. All user passwords are hashed in the Sendit24.com database, meaning that not even the Sendit24.com support personnel have the ability to view or in any way determine any user password.
Sendit24.com computer network security is subject to daily security audits by a third-party security monitoring firm. This helps us stay one step ahead of the latest security threats.
To protect against data loss, our servers are equipped with technology that automatically mirrors all data in real-time to two separate locations. Additionally, regular incremental and full backups of all system data are performed, including off-site data backups stored in two separate secure physical locations, to protect against almost all disaster scenarios.