Sign In
platform
VeriVault Verification Platform
VeriVault How It Works
What Makes It Unique
Compliance Is Important
DocVerify
White Papers
Security
The Most Secure Digital Document Verification Solution. Period.
We Take Security Seriously
DocVerify solutions are easy to use. They enable significant boosts to productivity and efficiency. But underneath those shiny, simplified results is a security framework that is unequalled in its sophistication and reliability. To verify the integrity of your documents with 100% certainty, security is built into every aspect of our products.
How do we protect your documents beyond a shadow of doubt? Let us count the ways:
7 Layers of Document Security
DocVerify's 7 layers of protection safeguard your documents by providing:
A DocVerify cover page with bar coding and watermarking technologies
Time stamping, bar coding, encryption, and watermarking for every page
Unique 128 bit DocVerify ID's
Two unique 384 bit or 512 bit fingerprints
Compliant PKI technologies
Unique bar codes
Unique Digital Signatures
Ultra Strong Document Encryption
NIST FIPS 197 and IETF RFC 4107
DocVerify features one of the strongest 256-bit advanced encryption standards (AES) providing powerful document and file encryption. This prevents unauthorized access or views, including access by our own IT personnel. Encrypted documents can only be opened or viewed by the document owner or users the document owner has authorized. Nobody else. No way.
Highest Encryption of Stored Data
Document encryption is achieved at multiple levels, with a cascaded key and cipher management to prevent access to confidential documents stored in the E-Vault. All keys required for document decryption are also encrypted with strong 512-bit encryption. That is a serious level of encryption.
AES 256 bit SSL Security
Communications through DocVerify, and documents emailed through DocVerify are encrypted with strong AES 256 bit SSL enhanced validation security.
Strong PKI Hashing
Each document is protected with strong PKI hashing. Certificates are stored securely and encrypted in order to protect them from being compromised. This is a good thing. Ask your local hacker.
Strong PKI Standards
ISO/IEC 9594-8/ITU-T X.509
DocVerify is its own Certificate Authority (CA) IETF RFC 3647 and IETF RFC 4210. We generate our own tamper-proof certificates on a regular basis. This keeps the bad guys at bay.
Strong Two-factor & Three-factor Authentication
Access to any member area is through a strong challenge response password-based authentication system. Passwords as well as other confidential information are encrypted with RSA keys in order to keep them safe.
Ultra Secure SSAE16 Data Centers
DocVerify data centers are all audited SSAE16 formerly SAS 70 type II certified facilities. SSAE 16 represents that a service or outsourcing organization has been through an in-depth audit of their control activities, which generally include controls over information technology and related processes, logical and physical access, security of the environment, backup/recovery, secure storage, and other such operations. Expensive. But worth it. Reports are available upon request.
Salesforce Approved
Our security systems and infrastructure have been fully tested and certified by Salesforce.com.
Digital Signature Standard (FIPS 186-2, FIPS 186-4)
Advanced Digital Signature technologies in order to ensure and maintain the integrity of documents.
Sequential Document System
Time-stamped documents are kept secure within a sequential sub-system, which prevents documents from being injected into the system. Unlike a paper-based method where entries can be easily forged, the system maintains a sequential tamper proof method that prevents forgeries with full audit trails.
Tamper-Proof Audit Trail
Actions are recorded in a tamper-proof audit trail, providing a completely transparent and fully documented information flow. The data reports may be formatted in a variety of different ways or available as a certificate download.
Watermarking / Stamping
In order to prevent document manipulation or camera-based attacks, each page is stamped with a date/time the document was created, page numbers, unique bar codes, and dynamically embedded watermarks.
Electronic Signatures and Infrastructure
(ETSI TS 101 733)
The European Telecommunications Standards Institute (ETSI) produces globally-applicable standards for Information and Communications Technologies (ICT), including fixed, mobile, radio, converged, broadcast and internet technologies. DocVerify meets these standards.
Password Based Cryptography IETF RFC 2898
DocVerify meets or exceeds The Internet Engineering Task Force on Password-Based Cryptography.
Information Security Management Systems
(ISO/IEC 27002 and ISO 17799)
The "ISO/IEC 27000 and ISO 17799 series" is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) which provides best practice recommendations on information security.
NIST FIPS 140-2 Level 1 and Level 2 Validated
Easily set DocVerify to notify signers if they have documents waiting to be signed. Your follow-up process is simplified, as DocVerify automatically reminds customers (and you!) of documents needing their attention.
IETF RFC 3161 Timestamps
DocVerify implements trusted timestamping that securely not only tracks the creation and modification time of documents, but also prevent anyone from ever being able to modify them.
IETF RFC 5126, ISO 14533-1 (CAdEs)
Electronic signatures created through DocVerify utilize CMS Advanced Electronic Signatures standards, which not only protects, but keeps data valid for long periods of time.
Title 21 CFR Part 11
Code of Federal Regulations Title 21. The system meets the requirements of the section.
The Bottom Line
With DocVerify your documents are secure and enforceable in a court of law. Way more than paper.
Learn More
Receive the White Papers --
Click HERE
Note:
laws or regulations may have changed from the time this page was posted. It is the responsibility of the person to properly research the items. Additionally, if items exist on this page may not indicate that formal audits or certifications may exist for them respectively, and may only appear based on internal assessments.
The Most Secure Digital Document Verification Solution. Period.
We Take Security Seriously
DocVerify solutions are easy to use. They enable significant boosts to productivity and efficiency. But underneath those shiny, simplified results is a security framework that is unequalled in its sophistication and reliability. To verify the integrity of your documents with 100% certainty, security is built into every aspect of our products.
How do we protect your documents beyond a shadow of doubt? Let us count the ways:
7 Layers of Document Security
DocVerify's 7 layers of protection safeguard your documents by providing:
A DocVerify cover page with bar coding and watermarking technologies
Time stamping, bar coding, encryption, and watermarking for every page
Unique 128 bit DocVerify ID's
Two unique 384 bit or 512 bit fingerprints
Compliant PKI technologies
Unique bar codes
Unique Digital Signatures
Ultra Strong Document Encryption
NIST FIPS 197 and IETF RFC 4107
DocVerify features one of the strongest 256-bit advanced encryption standards (AES) providing powerful document and file encryption. This prevents unauthorized access or views, including access by our own IT personnel. Encrypted documents can only be opened or viewed by the document owner or users the document owner has authorized. Nobody else. No way.
Highest Encryption of Stored Data
Document encryption is achieved at multiple levels, with a cascaded key and cipher management to prevent access to confidential documents stored in the E-Vault. All keys required for document decryption are also encrypted with strong 512-bit encryption. That is a serious level of encryption.
AES 256 bit SSL Security
Communications through DocVerify, and documents emailed through DocVerify are encrypted with strong AES 256 bit SSL enhanced validation security.
Strong PKI Hashing
Each document is protected with strong PKI hashing. Certificates are stored securely and encrypted in order to protect them from being compromised. This is a good thing. Ask your local hacker.
Strong PKI Standards
ISO/IEC 9594-8/ITU-T X.509
DocVerify is its own Certificate Authority (CA) IETF RFC 3647 and IETF RFC 4210. We generate our own tamper-proof certificates on a regular basis. This keeps the bad guys at bay.
Strong Two-factor & Three-factor Authentication
Access to any member area is through a strong challenge response password-based authentication system. Passwords as well as other confidential information are encrypted with RSA keys in order to keep them safe.
Ultra Secure SSAE16 Data Centers
DocVerify data centers are all audited SSAE16 formerly SAS 70 type II certified facilities. SSAE 16 represents that a service or outsourcing organization has been through an in-depth audit of their control activities, which generally include controls over information technology and related processes, logical and physical access, security of the environment, backup/recovery, secure storage, and other such operations. Expensive. But worth it. Reports are available upon request.
Salesforce Approved
Our security systems and infrastructure have been fully tested and certified by Salesforce.com.
Digital Signature Standard (FIPS 186-2, FIPS 186-4)
Advanced Digital Signature technologies in order to ensure and maintain the integrity of documents.
Sequential Document System
Time-stamped documents are kept secure within a sequential sub-system, which prevents documents from being injected into the system. Unlike a paper-based method where entries can be easily forged, the system maintains a sequential tamper proof method that prevents forgeries with full audit trails.
Tamper-Proof Audit Trail
Actions are recorded in a tamper-proof audit trail, providing a completely transparent and fully documented information flow. The data reports may be formatted in a variety of different ways or available as a certificate download.
Watermarking / Stamping
In order to prevent document manipulation or camera-based attacks, each page is stamped with a date/time the document was created, page numbers, unique bar codes, and dynamically embedded watermarks.
Electronic Signatures and Infrastructure
(ETSI TS 101 733)
The European Telecommunications Standards Institute (ETSI) produces globally-applicable standards for Information and Communications Technologies (ICT), including fixed, mobile, radio, converged, broadcast and internet technologies. DocVerify meets these standards.
Password Based Cryptography IETF RFC 2898
DocVerify meets or exceeds The Internet Engineering Task Force on Password-Based Cryptography.
Information Security Management Systems
(ISO/IEC 27002 and ISO 17799)
The "ISO/IEC 27000 and ISO 17799 series" is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) which provides best practice recommendations on information security.
NIST FIPS 140-2 Level 1 and Level 2 Validated
Easily set DocVerify to notify signers if they have documents waiting to be signed. Your follow-up process is simplified, as DocVerify automatically reminds customers (and you!) of documents needing their attention.
IETF RFC 3161 Timestamps
DocVerify implements trusted timestamping that securely not only tracks the creation and modification time of documents, but also prevent anyone from ever being able to modify them.
IETF RFC 5126, ISO 14533-1 (CAdEs)
Electronic signatures created through DocVerify utilize CMS Advanced Electronic Signatures standards, which not only protects, but keeps data valid for long periods of time.
Title 21 CFR Part 11
Code of Federal Regulations Title 21. The system meets the requirements of the section.
The Bottom Line
With DocVerify your documents are secure and enforceable in a court of law. Way more than paper.
Learn More
Receive the White Papers --
Click HERE
Note:
laws or regulations may have changed from the time this page was posted. It is the responsibility of the person to properly research the items. Additionally, if items exist on this page may not indicate that formal audits or certifications may exist for them respectively, and may only appear based on internal assessments.