How Foldr handles authentication, encryption, hosting and audit. No marketing-speak, no hand-waving about “enterprise-grade” anything. If your procurement team needs more, we’ll work through your questionnaire.
SSO via SAML, OIDC, Microsoft Entra ID, ADFS, Active Directory, Google Workspace, Kerberos and LDAP. Local accounts supported where you need them. Password policies, expiry and history all configurable.
TOTP, SMS, push, U2F and FIDO2/WebAuthn passkeys. Per-device approval for sensitive shares. Sudo re-prompt on admin actions. Self-service password reset via verified email or SMS, optional.
Every connection between users, Foldr, and your storage backends is encrypted in transit (TLS 1.2+). Internal service-to-service traffic is encrypted on SaaS and recommended on appliance deployments behind a VLAN.
Foldr connects to your existing storage; it doesn’t copy your files into our database. At-rest encryption is whatever you have configured on SMB, S3, Azure, OneDrive, etc. We don’t add a second layer because we don’t hold your files.
Foldr SaaS runs on hardened infrastructure in the UK and EU. Edge protection in front, isolated tenancy underneath. Data residency clarified per customer on request.
Linux appliance you install in your own VLAN, cluster or data centre. Air-gapped installs supported. Same Foldr Next UI as the SaaS, no internet dependency to operate.
Every file open, share, edit, delete, link creation and permission change is recorded against the user. Retained per your policy. Downloadable as CSV from admin Settings.
Foldr surfaces version history from the underlying storage backend where it’s available, so the audit trail isn’t a duplicate of what’s already there.
Per-user access tokens with explicit scopes and expiry. No broad service accounts; programmatic access is attributable to a person.
Per-share or per-user IP allowlist and blocklist. Combine with per-device approval for sensitive estates.
Your files stay in your storage; you control retention, residency, and rights handling. We follow standard secure development practices and use third-party penetration testing on major releases. We don’t list specific external certifications on this page because we’d rather work through your procurement questionnaire honestly than paste a logo soup. Get in touch and we’ll send you what you need.
Start a 30-day trial, no credit card. Or talk to us about deploying on-prem.