LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • Storage.
  • File Management.
  • File Security

Was this helpful?

  1. Dashboard
  2. Projects

Files

At Cyphor Technologies, we take the security and privacy of your files very seriously. We understand that sharing your files with a SaaS platform can be a daunting task, and we want to assure you that we have measures in place to ensure the safety and confidentiality of your files.

When you upload a file to our platform, it is immediately encrypted using industry-standard encryption algorithms. This ensures that your file is protected while it is in transit to our servers.

Once your file reaches our servers, it is stored in a secure, encrypted environment. Only authorized personnel with the necessary permissions have access to this environment, and all access is closely monitored and logged for security purposes.

When it is time to obfuscate your file, it is processed in a secure, isolated environment. This ensures that your file is never mixed with any other files, and that it cannot be accessed by anyone other than the authorized personnel working on it.

After your file has been obfuscated, it is immediately deleted from our servers. We do not keep any copies of your files, and we do not share them with any third parties.

We are committed to protecting files at all times. If you have any further questions or concerns, please don't hesitate to contact us.

Storage.

Our platform utilizes Amazon S3 buckets to store and manage files. These buckets are securely encrypted at all times, ensuring that your data is safe both during uploading and when it is stored.

Additionally, users have the option to bring their own S3 IAM user and our file manager service will fetch the files from there when needed. This allows users to utilize their own S3 account and have added control over their data.

File Management.

Our platform offers a range of tools and features for managing files within projects. These include:

  • Versioning: Users can track and manage different versions of their files within a project.

  • Sharing: Users can easily share files with other users within a project.

  • Deletion: Users have the ability to delete files at any time.

File Security

Security is a top priority for our platform and we take great care to ensure that all files are kept safe and secure. In addition to encrypting all data in S3 buckets, we also offer audit logs where users can access audit logs to track and monitor file activity within a project.

Overall, our file management system offers users a range of tools and features for securely storing and managing their files within projects. Whether you choose to utilize our S3 buckets or bring your own, we strive to provide a secure and efficient file management system.

PreviousRolesNextSAML and SSO

Last updated 1 year ago

Was this helpful?