Compliance Through Control

Data Compliance

CenterStack provides the auditing, security, and control needed for regulatory compliance.

Delivering Control and Compliance with File Sharing and Remote Access

Compliance Through Control

Enterprises can use CentreStack to comply with their internal security requirements or regulatory standards like FINRA, HIPAA, Sarbanes Oxley and more.

Auditing for Compliance

An essential component of compliance is recording the Who, What, When, and How attributes of every user action within the system. Admins can easily search and filter logs to identify incidents.


CenterStack uses industry best practices, tools, and robust encryption techniques to store and transmit data securely. Furthermore, its three-tiered architecture can be deployed entirely on-premise.

Two-Factor Authentication

CenterStack provides an additional layer of login security using security codes sent via existing channels.

Enterprise Security Audits

CenterStack's enterprise customers have performed extensive security audits which have led to successful, secure deployments and advanced features like token-based authentication on mobile devices with expiring, revokable tokens, and certificate pinning.

Data-at-Rest Encryption and Secure SSL Transmission

Before transmission through a secure SSL connection, data is encrypted using AES-256 bit encryption. Encryption keys are private for each enterprise, even in a multi-tenant deployment.

Revoking Access Rights

CentreStack allows admins to revoke the access rights of specific devices, clients and users.

Remote Wipe

CentreStack allows admins to remotely wipe corporate information from a lost or stolen mobile device, maintain confidentiality.

Information Leakage and Security

Information leakage occurs when sensitive business data gets into the wrong hands. CentreStack's on-premise deployment addresses third-party service threats, but the platform goes further to prevent information leakage by protecting business data across all devices.
check out the incredible

check out the incredible

Remote Access Server

CentreStack adds secure remote access and file sharing, disaster prevention and recovery, to file servers on-premises with easy cloud migration to private cloud storage. It is the real cloud file server solution you have been looking for! 

Remote Access

CentreStack bridges file servers and cloud storage for secure remote access without the need of a VPN.

Web Access

Accessing files and folders directly from within a web browser as if it is as interactive as from a desktop drive.

Mobile Access

CentreStack leverage cloud storage for secure mobile file sharing from a web browser or from a mobile application.

Hybrid Access

CentreStack sets up a hybrid deployment between local file servers and cloud storage that can be seamlessly converted to cloud only.

Core Value


The remote access solution extends the current internal Windows file server's reach to remote locations via HTTPS and web protocols. It is privacy by default.


The same corporation owns the internal Windows file server and existing IT infrastructure, including the new CentreStack server, and the files and folders on the file server are privately owned.


The internal Windows file server is the data repository for the newly added remote file access service. For employees, the files at work are the same files available remotely on mobile devices.


Since files never leave the current on-premise file servers, it is much easier to pass compliance auditing. The new remote access server is the only component that need additional work.

Permission Control

The same NTFS permissions that was in place to protect the internal Windows file server files will be the same permission control in place to protect the remote file access service.

CentreStack Security Features

Active Directory Integration

Integrates with Active Directory for authorization and authentication.

NTFS Permission Integration

Integrates with NTFS permissions control for file and folder access.

SAML SSO Integration

Integrates with SAML Single-Signon for authentication.

Two-factor Authentication

Supports Google Authenticator, Microsoft Authenticator and Amazon MFA.

Group Policies

Company-wide policies controlling different aspects of the solution.

Access Policies

Specific access policy controlling files and folder access.

AES SSL & Encryption

Supports Data-in-Transit and Data-at-Rest encryptions.

Endpoint Encryption

Encrypt local cache at the endpoint device for further protection.

File Version Control

Version control protects files and folders.

Granular Folder Permission

Besides NTFS permission control integration, more granular permission control can be defined.

Compliance Center

The compliance center helps GDPR and HIPAA data compliance.

Self-Hosted Control

Self-host the file sharing solution for further data compliance.


Ready to boost mobile productivity and enable workforce to work from home today?