Digital customer communication software - security | Striata
  • Log in   
  • Sign up   


Sign up | Reset password
  • Log in   
  • Sign up   


Sign up | Reset password

Security

You need a customer communication platform that has been developed with the security of data and processes at its core.

Protecting customer data is fundamental and a key focus of our software development. We ensure that data passing through our platform is protected by multiple layers of security and our strict access control ensures that only authorized users or systems can retrieve stored documents.

We offer both basic industry encryption of PDF documents as well as our own ultra secure Striata-encrypted formats, plus the optional layer of a password or pin code to access the document.

Get in touch with us

Keen to find out more or get an expert's opinion?

Contact us

We ensure your customer’s data is secure throughout the process

Multiple layers of security protect customer data throughout the processing and distribution of messages:

Access control

Role-based user permission system controls access to the application and hierarchical tree structure that allows for tiered access levels.

Documents in storage

Stored documents are protected by multiple layers of security, including document encoding, database encryption and application access control.

~

Document security

Stored and sent documents are encrypted and can be protected by a pin, password or shared secret known only to the recipient.

Reader application

Our reader app allows users to securely decrypt and open documents on a desktop or mobile device.

Striata Secure Document Repository Technical Overview

Tags: Product and Technical Overview,eBilling, Encryption, Secure Document Delivery, Striata Application Platform, Striata Reader, Secure PDF, Interactive PDF, Adobe PDF

Give your customers the ability to retrieve (pull) their past documents via your organization’s existing self-service interfaces with Striata's cloud ready, Secure Document Repository (SDR). Read on to see how it works.

To access this resource please sign up and/or log in.

Sign up    Log in   

Striata Phishing and Identity Theft White Paper

Tags: Sending emails, Spray Phishing, User Phishing, Spear Phishing, Personalization, Sender Authentication, Pharming, Vishing, Smishing, eBills, eStatement, Contracts, Legal Documents, Confidential information, Fraudsters, Customer Verification Data, Phishing education, data security, Secure Document Delivery

Phishing is the act of attempting to acquire information such as usernames, passwords and banking details by masquerading as a trustworthy entity in an electronic communication. Read how to education yourself, your company and your clients in order to protect yourself.

To access this resource please sign up and/or log in.

Sign up    Log in