• (888) 634-7684
MetaSource Document Management Software & Workflow Automation Solutions








Current BPO Engagements


How to Ensure Secure Document Submission Beyond SFTP

Colin Graf | Thursday, October 01, 2015

How to Ensure Secure Document Security Beyond SFTPWhether you need to share a contract or application to a partner, upload mortgage documents to your quality control compliance advisor or send any other confidential information electronically, SFTP is not enough to guarantee secure access. Below are the limitations and how to overcome them.

Limitations of SFTP

  • Whoever has the SFTP address, login and password can access documents where they reside
  • No way to ensure document-level access beyond creating a password for each document
  • No way to apply document watermarking, rights expiration or guest access
  • No version control or way to ensure only the current version of a document is accessible to users
  • No audit trails
  • FTP/SFTP can be difficult to use as most do not have FTP client software or know how to use it

Document Security from MetaSource

Below are ways that we help ensure secure secure document sharing:

  • eSubmit: ensures encrypted transmission for mortgage compliance quality control submissions
  • Cloud Document Management Certifications: PCI Level 1, version 3 and SOC 2 Type II (helps ensure I-9 and HIPAA compliance)
  • Information Security: leverage robust information controls such as watermarking, rights expiration, and guest access
  • Access Control: specify with document field-level precision which users or groups of users are able to access information
  • User-Driven Controls: empower end users with dynamic information controls to revoke or alter access permissions to sensitive information
  • Version Control: ensure only the current version of a document is accessible to users

Using SFTP is much better than using email with document passwords but is much less secure in this era of hacking and cyber attacks. Let us know your document security concerns so that we can help you find the right solution.

Contact us to learn more about how you can ensure document security


All Recent Posts


metastor infoarchive post-close quality control (QC) emc applicationxtender (ax) emc remote support certification law enforcement ax 16.3 SOC 2, Type II competitive advantage information rights management (IRM) emc world kofax paper checks contractor management opentext workflow automation enterprise content management (ECM) contractor onboarding Business Process Outsourcing (BPO) applicationxtender 8.0 SFTP applicationxtender 16.3 clean energy transportation construction philanthropy robotic process automation (RPA) document management software government check 21 partner portal emc captiva 5 dysfunctions of a team remittance processing property-assessed clean energy (PACE) accounts payable (AP) automation captiva document capture software body worn and dashboard cameras accounts receivable (AR) electronic health/medical records (EHR/EMR) I-9 loan origination software (LOS) whitepaper ImageTrust customer service gartner magic quadrant human resources (HR) high performance teams applicationxtender 8.1 Strategic Advisory Council ax 8.0 personnel files pre-fund quality control (QC) esubmit legacy application data migration Productivity document scanning court documents captiva mobile capture mortgage state's attorney information governance document security national partner meeting contact center services case study cloud document management software medical records emc partners careers lockbox credit union lendercare business process as a services (BPaaS) workflow automation software patient records trucking captiva 7.5 emc software diskxtender (DX) emc infoarchive records management legacy software decommissioning kofax kapow