• (888) 634-7684
MetaSource Document Management Software & Workflow Automation Solutions

8


Locations

1,000+


Associates

4,700+


Clients

120+


Current BPO Engagements


Blog

How to Ensure Secure Document Submission Beyond SFTP

Colin Graf | Thursday, October 01, 2015

How to Ensure Secure Document Security Beyond SFTPWhether you need to share a contract or application to a partner, upload mortgage documents to your quality control compliance advisor or send any other confidential information electronically, SFTP is not enough to guarantee secure access. Below are the limitations and how to overcome them.

Limitations of SFTP

  • Whoever has the SFTP address, login and password can access documents where they reside
  • No way to ensure document-level access beyond creating a password for each document
  • No way to apply document watermarking, rights expiration or guest access
  • No version control or way to ensure only the current version of a document is accessible to users
  • No audit trails
  • FTP/SFTP can be difficult to use as most do not have FTP client software or know how to use it

Document Security from MetaSource

Below are ways that we help ensure secure secure document sharing:

  • eSubmit: ensures encrypted transmission for mortgage compliance quality control submissions
  • Cloud Document Management Certifications: PCI Level 1, version 3 and SOC 2 Type II (helps ensure I-9 and HIPAA compliance)
  • Information Security: leverage robust information controls such as watermarking, rights expiration, and guest access
  • Access Control: specify with document field-level precision which users or groups of users are able to access information
  • User-Driven Controls: empower end users with dynamic information controls to revoke or alter access permissions to sensitive information
  • Version Control: ensure only the current version of a document is accessible to users

Using SFTP is much better than using email with document passwords but is much less secure in this era of hacking and cyber attacks. Let us know your document security concerns so that we can help you find the right solution.

Contact us to learn more about how you can ensure document security


Comments

All Recent Posts


Tags

invoice processing automation philanthropy captiva document capture software applicationxtender 8.1 emc software emc applicationxtender (ax) workflow automation applicationxtender 8.0 5 dysfunctions of a team legacy application data migration state's attorney emc captiva captiva mobile capture clean energy ax 16.3 workflow automation software digital transformation SFTP emc world law enforcement customer service I-9 pre-fund quality control (QC) records management opentext competitive advantage partner portal paper checks diskxtender (DX) document scanning cloud document management software government remittance processing mortgage patient records electronic health/medical records (EHR/EMR) infoarchive enterprise content management (ECM) kofax kapow SOC 2, Type II credit union emc remote support certification ImageTrust information governance personnel files lockbox ax 8.0 loan origination software (LOS) captiva 7.5 document security document management software whitepaper contractor onboarding kofax check 21 purchasing automation trucking careers body worn and dashboard cameras accounts payable (AP) automation case study opentext enterprise world accounts receivable (AR) medical records advanced document capture legacy software decommissioning emc partners Strategic Advisory Council court documents esubmit property-assessed clean energy (PACE) robotic process automation (RPA) lendercare contractor management Business Process Outsourcing (BPO) emc infoarchive information rights management (IRM) high performance teams construction document capture software transportation metastor Productivity national partner meeting applicationxtender 16.3 post-close quality control (QC) human resources (HR) contact center services

Archive