Trust

Security posture, plainly described.

How Foldr handles authentication, encryption, hosting and audit. No marketing-speak, no hand-waving about “enterprise-grade” anything. If your procurement team needs more, we’ll work through your questionnaire.

Authentication

Bring your own identity

SSO via SAML, OIDC, Microsoft Entra ID, ADFS, Active Directory, Google Workspace, Kerberos and LDAP. Local accounts supported where you need them. Password policies, expiry and history all configurable.

Multi-factor

2FA, passkeys, device trust

TOTP, SMS, push, U2F and FIDO2/WebAuthn passkeys. Per-device approval for sensitive shares. Sudo re-prompt on admin actions. Self-service password reset via verified email or SMS, optional.

In transit

TLS everywhere

Every connection between users, Foldr, and your storage backends is encrypted in transit (TLS 1.2+). Internal service-to-service traffic is encrypted on SaaS and recommended on appliance deployments behind a VLAN.

At rest

Your storage, your encryption

Foldr connects to your existing storage; it doesn’t copy your files into our database. At-rest encryption is whatever you have configured on SMB, S3, Azure, OneDrive, etc. We don’t add a second layer because we don’t hold your files.

Hosting

Two options. Neither requires a US data centre.

SaaS

UK / EU hosted

Foldr SaaS runs on hardened infrastructure in the UK and EU. Edge protection in front, isolated tenancy underneath. Data residency clarified per customer on request.

Appliance

Your own infrastructure

Linux appliance you install in your own VLAN, cluster or data centre. Air-gapped installs supported. Same Foldr Next UI as the SaaS, no internet dependency to operate.

Audit and oversight

Every action, attributable.

Activity log

Who did what, when

Every file open, share, edit, delete, link creation and permission change is recorded against the user. Retained per your policy. Downloadable as CSV from admin Settings.

Versions

File-level history

Foldr surfaces version history from the underlying storage backend where it’s available, so the audit trail isn’t a duplicate of what’s already there.

API tokens

Scoped, expiring

Per-user access tokens with explicit scopes and expiry. No broad service accounts; programmatic access is attributable to a person.

IP rules

Allow- and blocklist

Per-share or per-user IP allowlist and blocklist. Combine with per-device approval for sensitive estates.

Compliance

GDPR-friendly by design.

Your files stay in your storage; you control retention, residency, and rights handling. We follow standard secure development practices and use third-party penetration testing on major releases. We don’t list specific external certifications on this page because we’d rather work through your procurement questionnaire honestly than paste a logo soup. Get in touch and we’ll send you what you need.

Bring it together. On your terms.

Start a 30-day trial, no credit card. Or talk to us about deploying on-prem.