CertainSafe® Digital Safety Deposit Box
Ultra-Secure Cyber Security For Sensitive Files

Our award winning MicroEncryption® technology secures data at a level never before possible. Our CertainSafe Digital Safety Deposit Box high security cloud storage solution mitigates risk, ensures compliance and protects your reputation with your clients.

Get Started Now!

"The CertainSafe approach to cloud security may be the most brilliant and effective that I've seen to date, in an area that is critical if Net-based commerce, applications, and transactions are to go forward."

- Mark Anderson, FiRe chair and CEO of the Strategic News Service

Keep Your Most Valuable Digital Assets Hidden


The Digital Safety Deposit Box is an ultra-secure and impenetrable cloud-based portal that makes it easy for small businesses and medium sized enterprises to store, access, and securely share their most valuable and private assets, no matter what format they are in – documents, videos, medical imaging, audio, and more.

Ready-to-use sites are available for several industries, so the experience matches the business need.

CertainSafe has also made available a Personal portal for individuals and families.  

White Labeling branding to include company logos and colors is available.


CertainSafes Digital Safety Deposit Box

What We Do

Join Us For A Live Webinar Demonstration


Every Tuesday 12:00 pm EST  –  Every Thursday 3:00 pm EST



CertainSafe MicroEncryption

CS Video

Absolute Data Security - The CertainSafe Digital Vault MicroEncryption Technology Overview

Step 1: Upload

Remove sensitive data from its original location, manually or via automated application APIs.

Step 2: MicroEncryption

Simultaneously replace the sensitive data with CertainSafe's proprietary MicroToken™ placeholders. Your storage system now only contains a virtual representation of the original data, and the sensitive data is securely transferred to our cloud.

Step 3: MicroEncryption (Con't)

The removed data is immediately encrypted using AES256 with key pairs and a unique compound key for each data object, providing unsurpassed security. Encrypted files are broken into pieces and distributed across multiple physical and virtual locations. Data uploaded to our system is never saved in unencrypted form at any time.

Step 4: Retrieval

When retrieval is required, files are unencrypted and de-tokenized, reassembled and returned in real-time to whatever application requires the information for processing. Whole files can be returned or specific data objects curated for batch processing. Retrieval is blazingly fast.

For more information check out our FAQ's
Get Started Now!

Recent Blog Posts

Mortgage Lender Cybersecurity: 5 Simple Steps

Mortgage lender cybersecurity is one of the greatest issues facing the financial services industry. Originators handle huge volumes of personal borrower data, all of which is worth a lot to cybercriminals. The move to digital has also multiplied the threat level. Digital lending, powered by algorithms and dynamic software, delivers instant decisions, and with Millennials’ preference for everything on-demand, it is becoming the new norm. The very nature of these origination systems — the fact that everything is done online, and that the software is usually supported by a third-party vendor — make them far more vulnerable to data breaches…Read More

Cybersecurity Incidents Double in 2018; More on the way?

Cybersecurity incidents doubled in 2017 compared to the previous year, from 82,000 incidents in 2016 to an roughly 160,000 in 2017, marking the worst ever year for data breaches.   Why the sudden and dramatic rise in cybersecurity incidents? Ransomware, experts at the Online Trust Alliance say, which accounted for an estimated 134,000 of the attacks, or 83 percent. Because many data breaches go unreported, especially ransomware attacks, the total number of cybersecurity incidents could actually be much higher. The most dramatic cybersecurity incidents, like the infamous WannaCry attack, infected over 300,000 devices across 150 countries. The cost of a…Read More

Can the Private Sector meet the Government’s Cybersecurity Needs?

The government’s cybersecurity needs can’t be understated. Unfortunately, according to many government IT workers, those needs are not being met by the private sector. The history of cooperation between the private and public sector is long. The U.S. military, as the most obvious example, relies on close partnerships with companies like Boeing, Raytheon, and Lockheed Martin to create equipment, vehicles and technology that allow them to do their job: protect the country. Cybersecurity companies hoping to serve the government must take a closer look at the specialized needs of the agencies they target, such as ensuring that their technology is…Read More