• (888) 634-7684
MetaSource Document Management Software & Workflow Automation Solutions

8


Locations

1,000+


Associates

4,700+


Clients

120+


Current BPO Engagements


Blog

How to Ensure Secure Document Submission Beyond SFTP

Colin Graf | Thursday, October 01, 2015

How to Ensure Secure Document Security Beyond SFTPWhether you need to share a contract or application to a partner, upload mortgage documents to your quality control compliance advisor or send any other confidential information electronically, SFTP is not enough to guarantee secure access. Below are the limitations and how to overcome them.

Limitations of SFTP

  • Whoever has the SFTP address, login and password can access documents where they reside
  • No way to ensure document-level access beyond creating a password for each document
  • No way to apply document watermarking, rights expiration or guest access
  • No version control or way to ensure only the current version of a document is accessible to users
  • No audit trails
  • FTP/SFTP can be difficult to use as most do not have FTP client software or know how to use it

Document Security from MetaSource

Below are ways that we help ensure secure secure document sharing:

  • eSubmit: ensures encrypted transmission for mortgage compliance quality control submissions
  • Cloud Document Management Certifications: PCI Level 1, version 3 and SOC 2 Type II (helps ensure I-9 and HIPAA compliance)
  • Information Security: leverage robust information controls such as watermarking, rights expiration, and guest access
  • Access Control: specify with document field-level precision which users or groups of users are able to access information
  • User-Driven Controls: empower end users with dynamic information controls to revoke or alter access permissions to sensitive information
  • Version Control: ensure only the current version of a document is accessible to users

Using SFTP is much better than using email with document passwords but is much less secure in this era of hacking and cyber attacks. Let us know your document security concerns so that we can help you find the right solution.

Contact us to learn more about how you can ensure document security


Comments

All Recent Posts


Tags

accounts payable (AP) automation emc captiva kofax paper checks ImageTrust case study infoarchive SFTP Business Process Outsourcing (BPO) legacy software decommissioning check 21 careers robotic process automation (RPA) 5 dysfunctions of a team medical records information governance contractor management loan origination software (LOS) property-assessed clean energy (PACE) contractor onboarding workflow automation personnel files captiva document capture software competitive advantage document management software esubmit philanthropy national partner meeting credit union enterprise content management (ECM) post-close quality control (QC) patient records emc partners mortgage diskxtender (DX) construction applicationxtender 8.1 captiva mobile capture document scanning opentext high performance teams electronic health/medical records (EHR/EMR) cloud document management software pre-fund quality control (QC) kofax kapow applicationxtender 16.3 emc remote support certification law enforcement emc software gartner magic quadrant I-9 legacy application data migration trucking whitepaper records management Productivity business process as a services (BPaaS) workflow automation software lendercare government captiva 7.5 court documents Strategic Advisory Council metastor SOC 2, Type II applicationxtender 8.0 emc infoarchive customer service body worn and dashboard cameras emc world ax 16.3 lockbox clean energy emc applicationxtender (ax) advanced document capture contact center services remittance processing partner portal state's attorney document security information rights management (IRM) transportation accounts receivable (AR) ax 8.0 human resources (HR)

Archive