security

High security on the premise of business use

It is cloud storage which was developed on the premise for business use. High security that distinguishes it from that for consumers. Moreover, it's a domestic production. Protect your company from data loss, virus, information leakage, three risks, reliable technology and a variety of functions.

Now in use over 190 countries worldwide! Reason why Fleekdrive is selected by global companies.

Strong Infrastructure Layer, Security by Application Layer

Point.1

The file is copied when uploaded and store on three or more hard disks at two physically separate data centers in Japan.

The file is copied when uploaded and store on three or more hard disks at two physically separate data centers in Japan.

Point.2

To create authority to view files only on the browser without downloading files.

To create authority to view files only on the browser without downloading files.

Point.3

security3

No need to take out files with USB memory or attach files with e-mail, without fear of lost media or erroneous mail sending.

Security feature

PDF security

When downloading PDF from the space, security can be applied such as file copy prohibition, content copy/paste prohibition, printing prohibition, encryption etc. By this function, it is possible to prevent leakage of file contents.

security4

PDF watermark

When the watermark is set in the space, if you download the content from the target space, watermark such as the user ID, user name, download time, and fixed text are automatically inserted into the PDF file. By this function, It is possible to suppress taking out of a file and to trace an outgoing route.

PDF watermark

Virus check

A virus check is executed when uploading the file to Fleekdrive. It reduces the spread risk of virus infection.

File encryption

It’s safe since the saved files are encrypted.

IP address restriction

It is possible to limit access sources to Fleekdrive. You can block access from sites that should not be accessed, such as Internet cafes and overseas access.

Security as the infrastructure

Data center security

security6

We use state-of-the-art electronic monitoring system and multi-element access control system. Trained security personnel are deployed to the data center 24 hours a day, 7 days a week, and they are strictly managed to allow access with the minimum necessary.

Application security

Application security

X Site Scripting (convert request parameters to safe ones (see Actual) so that client side can not run Javascript maliciously), X Site Scripting (can not move scripts on the server maliciously) and SQL Injection are set against the external attacks.

Mobile security

security8

The downloaded files are managed within the application. Taking it out to the computer via USB or sharing the file with another application are prohibited to ensure high security.

Please try it