Secure Document Sharing
Why Secure File Share? It’s true. ICFiles is swifter than most other document-sharing systems and more secure than a cabinet with a lock on it. In sum, Secure Document Sharing it’s like having a lock on every client file, and it takes a trillion years to hack the encryption.
Here’s how we handle safety:
- ICFiles.com is hosted in a SOC 2 Type II data center.
- At the core is an SSL DigiCert that supports 4096-bit SHA2 encryption.
- All data are stored in an encrypted state on the server using 256-bit AES encryption.
- ICFiles regularly undergo security & vulnerability scanning.
- Our servers are real-time virus protected, intrusion protected, and backed up while encrypted.
- Not Vulnerable to Cryptolocker Ransomware.
- ICFiles uses strong passwords.
- All account passwords are encrypted with one-way encryption. No one knows your password except you.
- Audit Trails for past and present documents.
- User and Admin level permissions.
- The file size upload limit per file is 4 GBs – 10 GBs or more with ICF Express
- Compliance Reports on request with NDA (Non-Disclosure Agreement).
- No free access. All users are identified and verified.
Get Started
Making it Make Sense for Everyone
SAS 70 is now SSAE 16
In April 2010, the AICPA (American Institute of Certified Public Accountants) announced the end of SAS 70 and replacement of SAS 70 with a standard based on international standards in mind and AICPA standards, the “Statement on Standards for Attestation Engagements” or SSAE 16. Secure Client Portal.
So an SSAE 16 audit can now report in three standards and two types: SOC 1, 2, and 3, Type I and Type II.
Further, the SSAE 16 report is sometimes referred to as SOC 1.
Why is SOC 2 better for your data than SOC 1?
- SOC 1 (SSAE 16) reports on an organization’s financial reports standards.
- SOC 2 report was designed for technology companies that like to keep their security private and include auditor testing and results, and require a signed NDA (Non-Disclosure Agreement) to view the results.
- SOC 3 is for public use and provides a system description and the auditor’s opinion, and is designed more for marketing.
Intended Scope:
- SOC 1: Internal Controls over Financial Reporting (ICFR).
- SOC 2: Controls at a service organization relevant to security, availability, processing integrity, confidentiality, or privacy.
Type I report focuses on the system design of an organization’s controls.
Type II report focuses on the operating effectiveness of an organization’s controls and includes all Type I (the auditor verifies that the reported controls work as stated).
The importance of a SOC 2 Type II Data Center
A SOC 2 Data Center can provide you with a feeling of trust, knowing that your data is protected by a facility, a group of employees, and a company that adheres to a standard of excellence.
Trust Services Principles of a SOC 2 facility
- Security
The system protects against unauthorized access (both physical and logical).
- Availability
The system is available for operation and use as committed or agreed.
- Processing Integrity
System processing is complete, accurate, timely, and authorized.
- The Confidentiality
Information designated as confidential is protected as committed or agreed.
- The Privacy of Personal Information
The service organization collects, uses, retains, discloses, and disposes of user entities.
- Compliance Reports on request with NDA (Non-Disclosure Agreement).
eSign
Separate Yourself
What ICFiles offers that others don’t
In addition, to complete customization to fit your every need at every price, we offer:
Secure Document Sharing
- phoenixNAP SOC 2 Type II data center.
- Unlimited client/user accounts.
- Unlimited Administrator accounts.
- Super Admin level.
- SS Admin level.
- No charges for bandwidth.
- Customer branding to match your website look and feel.
- Custom Website sign-on box comes with set up.
- Free U.S. customer support.
Price