• (888) 634-7684
MetaSource Document Management Software & Workflow Automation Solutions

8


Locations

1,000+


Associates

4,700+


Clients

120+


Current BPO Engagements


Blog

How to Ensure Secure Document Submission Beyond SFTP

Colin Graf | Thursday, October 01, 2015

How to Ensure Secure Document Security Beyond SFTPWhether you need to share a contract or application to a partner, upload mortgage documents to your quality control compliance advisor or send any other confidential information electronically, SFTP is not enough to guarantee secure access. Below are the limitations and how to overcome them.

Limitations of SFTP

  • Whoever has the SFTP address, login and password can access documents where they reside
  • No way to ensure document-level access beyond creating a password for each document
  • No way to apply document watermarking, rights expiration or guest access
  • No version control or way to ensure only the current version of a document is accessible to users
  • No audit trails
  • FTP/SFTP can be difficult to use as most do not have FTP client software or know how to use it

Document Security from MetaSource

Below are ways that we help ensure secure secure document sharing:

  • eSubmit: ensures encrypted transmission for mortgage compliance quality control submissions
  • Cloud Document Management Certifications: PCI Level 1, version 3 and SOC 2 Type II (helps ensure I-9 and HIPAA compliance)
  • Information Security: leverage robust information controls such as watermarking, rights expiration, and guest access
  • Access Control: specify with document field-level precision which users or groups of users are able to access information
  • User-Driven Controls: empower end users with dynamic information controls to revoke or alter access permissions to sensitive information
  • Version Control: ensure only the current version of a document is accessible to users

Using SFTP is much better than using email with document passwords but is much less secure in this era of hacking and cyber attacks. Let us know your document security concerns so that we can help you find the right solution.

Contact us to learn more about how you can ensure document security


Comments

All Recent Posts


Tags

document scanning Productivity enterprise content management (ECM) 5 dysfunctions of a team high performance teams emc infoarchive business process as a services (BPaaS) competitive advantage pre-fund quality control (QC) Business Process Outsourcing (BPO) medical records legacy application data migration I-9 mortgage electronic health/medical records (EHR/EMR) metastor construction post-close quality control (QC) applicationxtender 8.0 information rights management (IRM) emc remote support certification SFTP human resources (HR) check 21 law enforcement SOC 2, Type II remittance processing court documents contractor onboarding property-assessed clean energy (PACE) robotic process automation (RPA) lockbox state's attorney kofax kapow emc applicationxtender (ax) contractor management kofax workflow automation patient records ImageTrust whitepaper captiva 7.5 philanthropy gartner magic quadrant clean energy lendercare document management software partner portal emc captiva esubmit national partner meeting body worn and dashboard cameras infoarchive case study trucking accounts payable (AP) automation emc software information governance accounts receivable (AR) ax 8.0 paper checks opentext government diskxtender (DX) contact center services careers emc world customer service cloud document management software records management legacy software decommissioning applicationxtender 8.1 personnel files credit union Strategic Advisory Council loan origination software (LOS) transportation workflow automation software captiva mobile capture document security

Archive