FileBox is a solution for both secure file transfer and secure file storage. It provides you with the ability to securely exchange documents with people from inside your company, and with external persons.

Use-Cases

  • file sharing between users with a FileBox account
  • sending files securely, to external persons
  • receiving files securely from external persons

Features

  • web-based, simple to use interface
  • strong authentication using mTAN (text message token)
  • audit log of all actions
  • support for large files of up to 10 GB
  • integrated anti-virus check
  • web-service and file-based interfaces
  • additional Windows client and iPhone app
  • integrated user and group mangement
  • fine-grained access rights
  • LDAP integration
  • multitenancy capability
  • customer-specific branding

Deployment Options

    • Hosting: installation operated by Compass Security, "as a service".
    • Appliance: installation in customer's premises.

    Further information

    CALENDAR

    Security Training: Social Engineering

    In the 2-day course (in German) from June 9/10, 2020, you will get to know and understand the methods, tools and tricks of social engineering. Read more

    it-sa 2020

    Europas führende Fachmesse für IT-Sicherheit findet vom 06. - bis 08. Oktober 2020 im Messezentrum Nürnberg (DE) statt. Reservieren Sie bereits heute... Read more

    ALL DATES

    NEWS

    Sicherheitsrisiken erkennen und reduzieren

    Im «KMU Magazin» gibt Security Analyst Fabio Poloni Tipps, wie KMU sich gegen Cyberangriffe wappnen können.  Read more

    Vulnerability in the Windows Task Scheduler

    Sylvain Heiniger identified a vulnerability in the Windows Task Scheduler. Read more

    Ransomware-Attacke: Datendiebe erpressen Schweizer Unternehmen

    Die Schweizer Herstellerin von Schienenfahrzeugen Stadler Rail AG wurde Opfer einer Cyber Attacke. Das Vorgehen der Angreifer sei typisch, sagt... Read more

    ARCHIVES

    Compass Security Blog

    Relaying NTLM authentication over RPC

    Since a few years, we - as pentesters - (and probably bad guys as well) make use of NTLM relaying a lot for privilege escalation in Windows networks. In this article, we propose adding support for... mehr

    Reversing a .NET Orcus dropper

    In this blog post we will reverse engineer a sample which acts as downloader for malware (aka a “dropper”). It is not uncommon to find such a downloader during DFIR engagements so we decided to take a... mehr

    ZUM BLOG