Included | Standard | Advanced |
Sync and share from any device: Support for Apple and Android smartphones and tablets, Windows PCs, Macs, and all popular web browsers | 🔷 | 🔷 |
Folder sharing | 🔷 | 🔷 |
PDF editing and annotation tools | 🔷 | 🔷 |
Unlimited file versioning | 🔷 | 🔷 |
Audit trail section: Shows the history of all activities | 🔷 | 🔷 |
Encryption at rest and in transit | 🔷 | 🔷 |
Two-factor authentication | 🔷 | 🔷 |
Control over files and folders, and policy controls for users, applications and data | 🔷 | 🔷 |
Remote file notarization: Accelerate the pace of your clients' business by digitizing their notarial processes | - | 🔷 |
Embedded eIDAS AdES B-LTA eSignature | - | 🔷 |
Notarization and signature certificates: Give an irrefutable proof that a file was notarized or signed at a specific time | - | 🔷 |
Trusted, independent verification | - | 🔷 |
Frequently Asked Questions
eIDAS is an E.U. regulation, also known as the Electronic Identification and Trust Services Regulation, or eIDAS Regulation 910/2014/EC.
While contracts were previously expected to be signed in person or in wet ink, the eIDAS regulation empowers businesses and customers to sign contracts digitally and securely, paving the way for easier cross-border transactions.
An advanced electronic signature is an electronic signature which is:
All electronic signatures of the document can be analyzed and reports produced with the validation results on https://dss.nowina.lu/validation or https://ec.europa.eu/digital-building-blocks/DSS/webapp-demo/validation
There are a lot of file sync and share solutions on the market, so it is important to evaluate the solution that’s right for specific business environments.
Key criteria include:
It can be. Truly secure cloud EFSS services are possible thanks to advanced methods for sharing and storing files, flexible policy controls and highly secure data centers. These methods ensure you have full control over the data’s location, management and privacy.
FSS solutions that do not include such capabilities, however, should not be considered secure.
Blockchain is a technology based on the principle of a continuously growing list of data records, or blocks, which are linked and secured using cryptography. Each block contains a cryptographic hash of the previous block, including a timestamp and transaction data.
Most people know the term “blockchain” because it is used as the basis for cryptocurrencies like Bitcoin or Ethereum. But the underlying concept allows blockchain technology to have a variety of use-cases, such as file notarization, digital voting, creating smart contracts, and more.
The key advantages of the technology includes: