Technical features

Get the easiest-to-use cloud-based comprehensive solution to Secure, Store & Share Data anytime anywhere in a highly protected environment. Compatible with Windows, Mac, Android and iOS devices.

File transfer

DCirrus uses SSL/TLS protocols to protect client authentication, authorization and file transfers.

High grade encryption

DCirrus secures files in transit with no less than 256-bit encryption using industry-standard encryption protocols.

File integrity

DCirrus employs a keyed hashed message authentication code (MFA) to authenticate and ensure the integrity of intra-system communications. DCirrus verifies file size and file hash to ensure integrity.

Link generation

DCirrus download links are uniquely and randomly generated using strong hash-based message authentication codes. DCirrus provides technical countermeasures to protect links from guessing attacks.


DCirrus stores client files at rest using AES 256-bit encryption, a Federal Information Processing Standards (FIPS) encryption algorithm.


Files are processed using systems protected by securely configured firewalls that effectively limit and control access to network segments.


Files are backed up according to configurable file-retention and versioning settings.

Password policy

Clients have the option of configuring password policies, including password history, expiration, and complexity controls such as length, uppercase and lowercase letters, at least one number and at least one special character.

Custom SMTP (mail) settings

DCirrus enables clients to route email messages though their own mail servers. When enabled all emails sent through DCirrus will be routed through the client's mail server instead of DCirrus mail servers. Clients may optionally configure the connection to support SSL.

Multi-factor authentication

Clients may set up a multi-factor (or strong) authentication process that requires submission of the account password and a secondary authentication such as Google Authenticator or SMS/ text message in order to access the account. DCirrus supports various two-factor and two-step authentication methods including forms and token-based authentication as well as SMS, voice and backup codes.

File retention

Users can choose to automatically delete files a certain number of days after upload to support retention preferences and policies. Administrative users can set folder permissions to ensure that employee and client users may only access specific folders. These permissions may be set to propagate to subfolders or apply only to specific subfolders.

File versioning

Users can view different versions of a file uploaded with the same name to ensure that no changes are lost between updates or edits.

Terms and conditions

Terms and conditions can be displayed on the login page with the option of including a check box on the login screen that must be marked to indicate compliance with the terms before logging in.

Account lockout

DCirrus can configure your account to lock for five minutes after five invalid logon attempts to prevent account tampering. This application control is an account preference that can be customized to meet individual compliance needs.

Customized folder permissions

Users can choose to automatically delete files a certain number of days after upload to support retention preferences and policies.

Account activity reporting

DCirrus allows administrative users to run and access various reports on activity, usage, storage and permissions. Reports can be run on demand or emailed daily, weekly or monthly.

Email notifications

Users can choose to have customized notifications sent in real time or in a consolidated daily message.

Access log retention

Detailed file-access logs are retained for at least one year.

Full self destruct

Users can determine the number of days downloaded files remain on a device before they are automatically removed after a lapse in user login or account access even if offline.

External applications interaction

Users can control whether downloaded files can be opened outside of the DCirrus application.

Offline access

Downloaded files can be accessed on iOS and Android mobile devices even when offline.

Permissions management

Users can manage permissions and access rights to DCirrus files and folders from a mobile device.

Restrict modified devices

Administrative users can enable this feature to restrict other users from using the iPad or iPhone apps on jail-broken devices.

Remote wipe

Users can remotely lock and wipe DCirrus data from a lost or stolen device.

Restrict modified device

Administrative users can enable this feature to restrict other users from using the iPad or iPhone apps on jail-broken devices.

Attachment conversion

DCirrus allows users to send secure links to files and folders up to 10 GB in size bypassing limitations on attachment size in email systems and preventing email bounce backs.

Document watermarking

Customizable dynamic watermarking is available whenever documents are viewed, downloaded or printed to discourage unauthorized distribution of data.

Enhanced analytics

Administrative users can track how and when files are being accessed, including data on the most active users, recent searches, most-viewed documents and longest-viewed documents.

Document Q & A

Users can submit questions directly to administrative users via the Virtual Data Room. Answer questions privately or provide added clarity with secure public or private questions annotated onto a file. Receive real-time notifications when comments are made or export the entire question log.

Audit controls

Clients can use the tools provided within DCirrus to review account activity such as account usage, access to files and folders to track disclosures.

Unique users and authentication

DCirrus provides clients the capability to assign individual user accounts based on unique email addresses. Clients are responsible for providing unique accounts and logins to each client.

Testing and evaluation

To maintain compliance with the HIPAA Security Rule DCirrus engages an independent third party to perform periodic risk assessments and gap analyses.