Security

Military-Grade Security

With the increase in attack surfaces, it's time to do things right. This page will go through the basics of online security and how we implement best-in-class technology, processes and tools to ensure your data & online experience are the most secure.

#1 - Isolation

Only trust yourself

Private servers

This is the number 1 rule in security. There is only one trustworthy entity, and that's you.

SaaS vulnerability

SaaS (Software as a Service) is the #1 vulnerability online today.

OneOffice innovation

We bundle all services to run on your own servers.

#2 - Encryption

Everything is Encrypted

End-to-end encryption

End-to-end encryption is the most secure encryption, it uses keys that only you possess.

All communications

Unlike legacy platforms all your calls, chats, even notifications are E2E encrypted.

#3 - Identity

Securing Access 24/7

Malicious behaviour detection

We have systems in place to detect malicious behaviour.

Brute-force protection

Brute-force attacks are stopped at their heel, suspicious access is detected very early.

Two-Factor Authentication

For additional security, you can opt-in to Two-Factor Authentication.

#4 - Code & Processes

Nothing Closed

Open-source technologies

We leverage the best of open-source technologies, reviewed and audited by thousands of developers.

Standardized processes

Our processes are standardized and rigurously tested with a keen ability to move fast should issues arise.

#5 - Document Security

Share the Strict Minimum

Server-side editing

The OneOffice document editor opens document on-server so external users can't copy it.

Fine-tuned controls

Fine-tuned sharing controls allow you to block downloads, timed unshares and enable file-drop only.

Audit history

Having doubts? Just check the history to see who did what.

Still on the fence?

A 10 min online demo will set your mind at ease!