Security
Military-Grade Security
With the increase in attack surfaces, it's time to do things right. This page will go through the basics of online security and how we implement best-in-class technology, processes and tools to ensure your data & online experience are the most secure.
#1 - Isolation
Only trust yourself
Private servers
This is the number 1 rule in security. There is only one trustworthy entity, and that's you.
SaaS vulnerability
SaaS (Software as a Service) is the #1 vulnerability online today.
OneOffice innovation
We bundle all services to run on your own servers.
#2 - Encryption
Everything is Encrypted
End-to-end encryption
End-to-end encryption is the most secure encryption, it uses keys that only you possess.
All communications
Unlike legacy platforms all your calls, chats, even notifications are E2E encrypted.
#3 - Identity
Securing Access 24/7
Malicious behaviour detection
We have systems in place to detect malicious behaviour.
Brute-force protection
Brute-force attacks are stopped at their heel, suspicious access is detected very early.
Two-Factor Authentication
For additional security, you can opt-in to Two-Factor Authentication.
#4 - Code & Processes
Nothing Closed
Open-source technologies
We leverage the best of open-source technologies, reviewed and audited by thousands of developers.
Standardized processes
Our processes are standardized and rigurously tested with a keen ability to move fast should issues arise.
#5 - Document Security
Share the Strict Minimum
Server-side editing
The OneOffice document editor opens document on-server so external users can't copy it.
Fine-tuned controls
Fine-tuned sharing controls allow you to block downloads, timed unshares and enable file-drop only.
Audit history
Having doubts? Just check the history to see who did what.
Still on the fence?
A 10 min online demo will set your mind at ease!