Verified products benefit from complete end-to-end encryption of all documents and data from the point of capture, through transmission and when at rest in our secure storage servers. Encrypted data simply changes the format of the data using an encryption key and algorythms that change the data from its raw form into a jumble of letters, numbers and special characters that make no sense without the opposing decryption key.Encryption methods
Using the latest enterprise-grade encryption methods, Verified takes the data you collect through the platforms, encodes it with 256Bit Encryption and transmits the encrypted data through a secure socket layer (SSL) to our data servers.Using private keys
The Verified platforms gain acces to our server network using a sequence of secure public and private keys. with synchronised key sharing, the server network will only accept data from authenticated sources, adding another layer of security to your data throughout its lifecycle.Decrypting your data
As your data is received we reverse the process and decrypt it using 256 Bit decryption methods. Our algorthyms reverse the process we use to encrypt your data ready for processing or long term storage.Neatly wrapped up with secure hosting
If the privacy and encryption controls we offer just aren't enough, you can be confident that our server infrastructure is also robust, offering secure hosting behind network load balancers and a private firewall. Find out more about our hosting here.