Encryption, Data Loss Prevention and Audit Trail in M-Files EDMS
Encryption
It is imperative that your data is fully protected whether it’s being transmitted over a network or at rest so that no one gains unauthorized access to your information.
- M-Files encrypts network communication between M-Files clients (M-Files Desktop, M-Files Web and M-Files Mobile) and M-Files Server via HTTPS, RPC, VPN or IPSec
- M-Files encrypts data at rest with the AES-256 algorithm (compliant with the FIPS 140-2 standard)
- M-Files supports database encryption via Microsoft SQL Server Transparent Data Encryption (TDE)
Data Loss Prevention
M-Files provides comprehensive data loss prevention mechanisms out-of-the-box:
- Lost devices ≠ lost data: We provide guidance to help you safeguard data on individual client devices. Since all data in M-Files is stored securely on the server or in the cloud, no data is lost if an employee loses a laptop or fails to return a device upon leaving the company.
- Preserve old versions: Preservation of old versions and the ability to revert back to previous versions is built into M-Files.
- Check it out: Check-in and check-out functions, so you can keep track when a file is being edited and who is making changes.
- No file backup? No problem: Easily control which users can delete documents and data. Deleted files and data can be quickly undeleted by administrators without having to restore backup files.
- Backup: M-Files Cloud Vault users don’t have to worry about backing up their data – we take care of it and can even provide regular offsite copies for independent storage. For on-premises deployments, we provide best practices to maintain backups of your data.
- Track everything: View a change log of every version of a file that shows which user made edits, when they were made as well as other information about the lifecycle of the document.
Audit Trail
M-Files provides built in audit trail functionality to record key events like:
- Automatic record of object events, such as object creation, modification and deletion
- Information about who performed any operations and when they did it
- Tracking of logins, logouts, password changes and user group changes