• Subscribe   
  • Subscribe   

Security

Security

Looking for a platform that prioritizes security? Look no further.

You need a customer communication platform that has been developed with the security of data and processes at its core, and an information security framework that is ISO/IEC 27001:2013 certified.

Protecting customer data is fundamental and a key focus of our software development. We ensure that data passing through our platform is protected by multiple layers of security and our strict access control ensures that only authorized users or systems can retrieve stored documents.

We offer both basic industry encryption of PDF documents as well as our own ultra-secure Striata-encrypted formats, plus the optional layer of a password or pin code to access the document.

We ensure your customer’s data is secure throughout the process


Multiple layers of security protect customer data throughout the processing and distribution of messages:

Access control

Role-based user permission system controls access to the application and hierarchical tree structure that allows for tiered access levels.

Documents in storage

Stored documents are protected by multiple layers of security, including document encoding, database encryption and application access control.

Document security

Stored and sent documents are encrypted and can be protected by a pin, password or shared secret known only to the recipient.

Reader application

Our reader app allows users to securely decrypt and open documents on a desktop or mobile device.

Complimentary resources


Striata Security Overview

Tags: Product and Technical Overview, Overview, Security, Cyber Security, Data Privacy, Data protection, striata security, security product overview, data security, privacy laws, security policies, security layers, platform security, access control, data centers, saas environment, infrastructure security,document security,password management

As a digital communication specialist, our reputation is built on our ability to keep the information entrusted to us, safe and secure. We know that information security is not a destination - it is a journey we take alongside our clients, to constantly mitigate the many risks of an ever-changing cyber landscape.

Get the Striata Security Overview

Please enter your details to get the Striata Security Overview emailed to you:

By submitting your details via this form, you are consenting that we receive and store your information for the exclusive purpose of contacting you (if requested).
  • We will not share or publish your information or process it for any other reason.
  • Once your request is fulfilled, we will either delete your information or request your consent for further processing.
  • Please find additional information in our Privacy policy.
View our Terms of use | Protected by reCAPTCHA.

Striata Secure Document Repository Technical Overview

Tags: Product and Technical Overview,eBilling, Encryption, Secure Document Delivery, Striata Application Platform, Striata Reader, Secure PDF, Interactive PDF, Adobe PDF

Striata's Secure Document Repository (SDR) is a complementary solution to Secure Document Delivery (SDD). It enables customers to retrieve (pull) their past documents using the organization's existing self-service interfaces such as web portals and mobile applications. The solution is also cloud ready, which provides both organizations and their customers with access to the documents from any location and any device, in a controlled and secure manner. This includes customer service teams who need access to documents to resolve customer queries.

Get the Striata Secure Document Repository Technical Overview

Please enter your details to get the Striata Secure Document Repository Technical Overview emailed to you:

By submitting your details via this form, you are consenting that we receive and store your information for the exclusive purpose of contacting you (if requested).
  • We will not share or publish your information or process it for any other reason.
  • Once your request is fulfilled, we will either delete your information or request your consent for further processing.
  • Please find additional information in our Privacy policy.
View our Terms of use | Protected by reCAPTCHA.

Striata Phishing and Identity Theft White Paper

Tags: Sending emails, Spray Phishing, User Phishing, Spear Phishing, Personalization, Sender Authentication, Pharming, Vishing, Smishing, eBills, eStatement, Contracts, Legal Documents, Confidential information, Fraudsters, Customer Verification Data, Phishing education, data security, Secure Document Delivery

Today email is the most common form of business communication. It has surpassed he fax and postal mail, and is now relied upon for critical communication thanks to its ease of use, speed and low cost. Email is used for everything from financial instructions, to sending contracts and legal documents, to sharing confidential information. Many of these communications have a link to a webpage to login or retrieve further information. This has made email a target for fraudsters.

Get the Striata Phishing and Identity Theft White Paper

Please enter your details to get the Striata Phishing and Identity Theft White Paper emailed to you:

By submitting your details via this form, you are consenting that we receive and store your information for the exclusive purpose of contacting you (if requested).
  • We will not share or publish your information or process it for any other reason.
  • Once your request is fulfilled, we will either delete your information or request your consent for further processing.
  • Please find additional information in our Privacy policy.
View our Terms of use | Protected by reCAPTCHA.

Improve the customer experience with secure document delivery today

 

By submitting your details via this form, you are consenting that we receive and store your information for the exclusive purpose of contacting you.
  • We will not share or publish your information or process it for any other reason.
  • Once your request is fulfilled, we will either delete your information or request your consent for further processing.
  • Please find additional information in our Privacy policy.
View our Terms of use | Protected by reCAPTCHA.