Connected Review: While you’d like to think that they always arrive safely with no third parties peeking in, constant security breaches can make you feel like you’re in a James Bond movie. The good news is, there’s a simple way to send secure files that only the intended recipient sees.
Connected offers all the tools you need to handle secure data communications while reducing risk and ensuring compliance with data processing laws like GDPR and HIPPA.
Combining powerful identity verification with secure file transfer and encrypted messaging, your virtual security guard makes sending files to clients and partners a secure and efficient process.
Transfer files up to 5GB with no maximum upper message limit, with confidence that these files will not be intercepted by third parties. If you want an additional layer of security, you can also enable Two-Factor Authentication for accessing your vault, which requires a one-time passcode from your mobile phone.
While these vaults are private by default, you can also share the files from your vault with others with just a click of a button. Connected guarantees the authenticity of the files you receive, allowing you to view the verified identity and authenticity of the sender.
Using digital signatures to guarantee that files haven’t been modified in any way, Connected displays a validated message next to your files to confirm that they’re originals. Connected helps you say goodbye to spam and block distractions from people you don’t want to hear from by letting you control who can contact you and send files.
You can activate message screening in your Connected inbox based on a number of criteria, including verified address, verified identity, and connections. Connected also makes it easy to receive files from your customers and partners with File Drop pages that can be customized with your branding.
For maximum productivity, you can instantly push files uploaded via your File Drop page to storage solutions like Google Drive, Microsoft OneDrive, or Dropbox. Plus, you’ll get tools that are normally reserved for enterprise solutions, a full audit trail of transactions, eDiscovery, and retention policies.