• Subscribe   
  • Subscribe   

Security

You need a customer communication platform that has been developed with the security of data and processes at its core.

Protecting customer data is fundamental and a key focus of our software development. We ensure that data passing through our platform is protected by multiple layers of security and our strict access control ensures that only authorized users or systems can retrieve stored documents.

We offer both basic industry encryption of PDF documents as well as our own ultra secure Striata-encrypted formats, plus the optional layer of a password or pin code to access the document.

Get in touch with us

Keen to find out more or get an expert's opinion?

By submitting your details via this form, you are consenting that we receive and store your information for the exclusive purpose of contacting you.
  • We will not share or publish your information or process it for any other reason.
  • Once your request is fulfilled, we will either delete your information or request your consent for further processing.
  • Please find additional information in our Privacy policy.
View our Terms of use | Protected by reCAPTCHA.

We ensure your customer’s data is secure throughout the process

Multiple layers of security protect customer data throughout the processing and distribution of messages:

Access control

Role-based user permission system controls access to the application and hierarchical tree structure that allows for tiered access levels.

Documents in storage

Stored documents are protected by multiple layers of security, including document encoding, database encryption and application access control.

~

Document security

Stored and sent documents are encrypted and can be protected by a pin, password or shared secret known only to the recipient.

Reader application

Our reader app allows users to securely decrypt and open documents on a desktop or mobile device.

Striata Secure Document Repository Technical Overview

Tags: Product and Technical Overview,eBilling, Encryption, Secure Document Delivery, Striata Application Platform, Striata Reader, Secure PDF, Interactive PDF, Adobe PDF

Give your customers the ability to retrieve (pull) their past documents via your organization's existing self-service interfaces with Striata's cloud ready, Secure Document Repository (SDR). Read on to see how it works.

Get the Striata Secure Document Repository Technical Overview

Please enter your details to get the Striata Secure Document Repository Technical Overview emailed to you:

By submitting your details via this form, you are consenting that we receive and store your information for the exclusive purpose of contacting you (if requested).
  • We will not share or publish your information or process it for any other reason.
  • Once your request is fulfilled, we will either delete your information or request your consent for further processing.
  • Please find additional information in our Privacy policy.
View our Terms of use | Protected by reCAPTCHA.

Striata Phishing and Identity Theft White Paper

Tags: Sending emails, Spray Phishing, User Phishing, Spear Phishing, Personalization, Sender Authentication, Pharming, Vishing, Smishing, eBills, eStatement, Contracts, Legal Documents, Confidential information, Fraudsters, Customer Verification Data, Phishing education, data security, Secure Document Delivery

Phishing is the act of attempting to acquire information such as usernames, passwords and banking details by masquerading as a trustworthy entity in an electronic communication. Read how to education yourself, your company and your clients in order to protect yourself.

Get the Striata Phishing and Identity Theft White Paper

Please enter your details to get the Striata Phishing and Identity Theft White Paper emailed to you:

By submitting your details via this form, you are consenting that we receive and store your information for the exclusive purpose of contacting you (if requested).
  • We will not share or publish your information or process it for any other reason.
  • Once your request is fulfilled, we will either delete your information or request your consent for further processing.
  • Please find additional information in our Privacy policy.
View our Terms of use | Protected by reCAPTCHA.