Reliability and Security
Sigsync uses secure cloud services for email signatures and disclaimers as per the flow instructed by Microsoft. Your emails are not stored or read by anyone. Your Office 365 credentials are not stored and safeguarded by Auth 2.0 and TLS encryption during configurations / authentication.
We are @ Sigsync ISO 27001:2013 certified
Sigsync follows Information Security Management Standards ISO 27001 certification. Hence, you can be assured that complete email signature process is secured. To learn more about ISO/IEC 27001:2013 Information Security Management Standards
OAuth 2.0 Authentication
We use OAuth 2.0 secured authentication to create seamless registration and integration. Credentials are not stored at any point of time as we use access tokens issued by Microsoft's Office 365 API to setup the mail flow in Office 365 tenant.
Multi-Factor Authentication Supported
Sigsync also works with multi-factor authentication (MFA). For this, you have to enable MFA in your Office 365 tenant, accordingly Sigsync will be functional with MFA.
TLS Encryption and Authentication
A TLS encrypted secured connection is made between your tenant to our server that cannot be read by third party. Office 365 verifies the TLS certificate of our server when mail is sent back through InBound Connector and this ensures secured mail flow.
Our servers are GDPR compliant. Data related to signatures are stored with encryption for additional protection. We only send mails back to Office 365 and hence there is no data movement outside. We have taken care to ensure all the process are safe and private.
Load Balancing, Scalability, Up-time
Our servers are highly reliable and are able to scale according to traffic and balance the mail handling to optimal flow. Servers are designed to provide best up-time possible.
Emails are Not Stored or Read
Your emails are only passing through our servers to add signatures. They are not stored anywhere or read by anyone. Your Office 365 credentials are also not stored anywhere on our server (Refer section 'OAuth 2.0 authentication').
Centralized Role Based Control
Only Admins will be able to do changes to the settings / rules. This will ensure any unauthorized person won't be able to do any changes intentionally or unintentionally to avoid unforeseen security risks.
Private Storage of Signature Rules
We only store signature rules created by Admin to process mails and add necessary signatures as set by you. All the settings stored are encrypted and not accessible by any third party. You can edit, delete or read this information by web interface with your account login credentials only.