Holdfast
Holdfast

Our process
We compress and encrypt your files.
Your encrypted data is transferred to the cloud.
Your client logs in to our website and clicks a link to download.
The transfer is encrypted end-to-end.
We securely delete your files from our servers and drives.
Security
Encryption at rest: When we receive your drive, we use an offline computer to create one or more .zip files that are encrypted with a long, randomly-generated password. We use the same encryption protocol that the U.S. government uses for classified data (AES-256). This encryption method would take many years to break using current technology.
Login verification: When setting up your project, you define every user who will have access to download. Once we have your data prepared, your client can login to our secure web app to begin their download. Every login requires a verification via email; there are no passwords to lose or get compromised.
Encryption in transit: Once your client clicks the download link, their browser will download the encrypted .zip file. The transfer is encrypted end-to-end using the same protocol (HTTPS) that banks use to secure your online banking.
Expiration: Your data is available for download for a brief period of time that you define. Once that time lapses, we securely purge your data from our system.
The team



Connect with us
Holdfast
faster, simpler, and safer.