TurnKey Cloud provides unique per customer per client account military grade 256 bit AES encryption of all stored data including locally on your system, on mobile devices, and in the cloud. No one outside of your company, including TurnKey Cloud server administrators, will ever be able to see or access your data.
Downloading and uploading data is facilitated through a 2048 bit digitally signed CA trusted SSL certificate. Optional site to site VPN services can add an even greater level of security when required by HIPPA regulations or legal entities.
All data is stored within TurnKey Cloud's privately owned SSAE-16 Type II certified data center with around-the-clock on site staff and CCTV security monitoring. All local and off site backups are fully encrypted copies of your already encrypted data (encrypted twice), which are transferred through the TurnKey Cloud via private P2P tunnels using SSL technologies to ensure your data is safe and secure in every aspect.
Share highly confidential documents or sensitive persondata. The TurnKey Cloud permission and reporting subsystem enables you to manage and differentiate access to your corporate files
Individual Permissions The differential permission including Read-Only and Read/Write enables administrators to specify exactly which users have access to which business data
Remote Wipe Any Device If users switch or lose devices, all it takes is a click of a button to securely wipe the encrypted data on the lost devices
Enterprise-Grade Safety TurnKey Cloud combines the ease of use from well-known consumer cloud solutions, with powerful enterprise-grade security – protecting you from security policy breach
Administrators always know when anyone Edits, Deletes or Uploads documents, and you can even receive extensive activity reports helping you to verify that everyone is safely sharing your corporate data
Who Does What When See what’s happening, view file activity, search for content across the organization and centrally manage ownership
Centralized Management The centralized web-based management interface makes it easy to get an overview as well as manage Users, Groups and Sharing Rights for the entire organization – including external users
Detailed File and User Reports Generate detailed User, File and Access Reports to ensure company policies and guidelines are being followed