• (888) 634-7684
MetaSource Document Management Software & Workflow Automation Solutions








Current BPO Engagements


How to Ensure Secure Document Submission Beyond SFTP

Colin Graf | Thursday, October 01, 2015

How to Ensure Secure Document Security Beyond SFTPWhether you need to share a contract or application to a partner, upload mortgage documents to your quality control compliance advisor or send any other confidential information electronically, SFTP is not enough to guarantee secure access. Below are the limitations and how to overcome them.

Limitations of SFTP

  • Whoever has the SFTP address, login and password can access documents where they reside
  • No way to ensure document-level access beyond creating a password for each document
  • No way to apply document watermarking, rights expiration or guest access
  • No version control or way to ensure only the current version of a document is accessible to users
  • No audit trails
  • FTP/SFTP can be difficult to use as most do not have FTP client software or know how to use it

Document Security from MetaSource

Below are ways that we help ensure secure secure document sharing:

  • eSubmit: ensures encrypted transmission for mortgage compliance quality control submissions
  • Cloud Document Management Certifications: PCI Level 1, version 3 and SOC 2 Type II (helps ensure I-9 and HIPAA compliance)
  • Information Security: leverage robust information controls such as watermarking, rights expiration, and guest access
  • Access Control: specify with document field-level precision which users or groups of users are able to access information
  • User-Driven Controls: empower end users with dynamic information controls to revoke or alter access permissions to sensitive information
  • Version Control: ensure only the current version of a document is accessible to users

Using SFTP is much better than using email with document passwords but is much less secure in this era of hacking and cyber attacks. Let us know your document security concerns so that we can help you find the right solution.

Contact us to learn more about how you can ensure document security


All Recent Posts


contractor management captiva 7.5 body worn and dashboard cameras accounts payable (AP) automation mortgage high performance teams robotic process automation (RPA) emc world workflow automation software records management document scanning contractor onboarding court documents information rights management (IRM) gartner magic quadrant opentext national partner meeting SFTP legacy software decommissioning paper checks applicationxtender 16.3 careers cloud document management software post-close quality control (QC) 5 dysfunctions of a team construction partner portal contact center services metastor captiva mobile capture information governance whitepaper electronic health/medical records (EHR/EMR) law enforcement state's attorney patient records ax 16.3 government case study remittance processing pre-fund quality control (QC) customer service personnel files competitive advantage Strategic Advisory Council clean energy transportation legacy application data migration trucking kofax emc software Business Process Outsourcing (BPO) business process as a services (BPaaS) emc partners check 21 property-assessed clean energy (PACE) human resources (HR) workflow automation philanthropy SOC 2, Type II emc captiva emc remote support certification kofax kapow lendercare loan origination software (LOS) ax 8.0 applicationxtender 8.1 credit union applicationxtender 8.0 lockbox document management software advanced document capture accounts receivable (AR) emc applicationxtender (ax) Productivity captiva document capture software esubmit enterprise content management (ECM) I-9 emc infoarchive ImageTrust medical records infoarchive diskxtender (DX) document security