Nextpoint has spent years fine-tuning a sophisticated architecture, utilizing multiple tiers of security to ensure user and data protection and privacy.
Two-factor user authentication, daily penetration testing, and sophisticated encryption protocols are just a few of the many tools employed. With the entire Amazon Web Services Incident Response team on our side, these are security protocols and protections no on-site security solution can match.
For all details, check out the Nextpoint Security FAQ.
When you upload your evidence to Nextpoint, you create a completely secure repository, stored in the most advanced and tightly defended facilities in the world.
That means even if you lose your laptop, your data is always secure. We use the highest encryption standards available SSL Encryption Certificate (AES-256, 256-bit keys) in all stages of transmission and storage. When you close the browser, the gateway is closed and your work product continues to reside in the cloud behind robust physical security parameters.
Nextpoint meets many federally regulated security standards. Our utilized data centers meet Sarbanes-Oxley and HIPAA compliance standards, as well as meeting the Statement on Auditing Standards No. 70: Service Organizations, Type II (SSAE16 SOC-1 Type II). Nextpoint technology has passed numerous security and compliance audits from Fortune 50 companies.