Sensitive Content Manager™ combines Microsoft Azure cloud hosting, the industry’s highest level of security, customized security controls, and privately distributed apps to deliver a solution unmatched by any other provider.
Service Organization Controls (SOC) are a series of accounting standards that measure the control of financial information for a service organization. Our SOC 1 and SOC 2 Type 2 audit reports attest to the Effectiveness of the design and operation of our security controls.
The international acceptance and applicability of ISO/IEC 27001—one of the most widely recognized certifications for a cloud service—is a key reason why certification to this standard is a foundation of our approach to information security.
The Health Insurance Portability and Accountability Act (HIPAA) is the US law that regulates patient Protected Health information (PHI). We offer customers a HIPAA Business Associate Agreement (BAA), stipulating adherence to HIPAA’s security and privacy provisions.
Government and industry-standard encryption
Utilizes 256-bit AES encryption, an industry accepted standard (FIPS 197), the only encryption technology approved for protecting U.S. Government classified information.
Each piece of content stored in the system has its own unique key, ensuring each individual piece of content maintains security independent from one another.
Sensitive Content Manager™ is licensed by the U.S. Department of Commerce, Bureau of Industry & Security (BIS) for export of encryption technology.
Distribute our apps world-wide.
Flexible and owner-defined security controls.
Content owners and publishers can control how users view their content through a comprehensive system of configurable security settings.
Convenience and security are balanced to meet your organization’s needs. Content can be configured for access between a certain date and time, or blocked from access outside your company’s network. Content owners can allow for offline viewing and control which devices are used to access content.
Content access can be revoked at the press of a button, and access will be immediately withdrawn, regardless of where the device is located.
Content can only be viewed by validated users using your customized app.
Users view content securely using fully custom and configured native applications available across all major devices including iOS, Android, PC and Mac.
Apps are configured to meet your distribution and security needs, be assured that your users will have the functionality and user experience they expect on their favorite device.