Certain Safe - The Most Secure Cloud Storage Solution

CertainSafe® Digital Safety Deposit Box
Ultra-Secure Cyber Security For Sensitive Files

Our award winning MicroEncryption® technology secures data at a level never before possible. Our CertainSafe Digital Safety Deposit Box high security cloud storage solution mitigates risk, ensures compliance and protects your reputation with your clients.

Get Started Now!

Secure Portals Available Now


A Portal is a private online site where groups can share files and information.  A CertainSafe Secure Portal is an ultra-secure online site for storing, sharing and messaging in total secrecy.  

Ready-to-use sites are available for several industries, so the experience matches the business need.

CertainSafe has also made available a Personal portal for individuals and families.  

White Labeling branding to include company logos and colors is available.


CertainSafes Digital Safety Deposit Box

What We Do

Join Us For A Live Webinar Demonstration


Every Tuesday 12:00 pm EST  –  Every Thursday 3:00 pm EST



CertainSafe MicroEncryption

CS Video


CertainSafe Awarded PC Magazine Editor’s Choice

 Fourth Year In A Row “2017”



Absolute Data Security - The CertainSafe Digital Vault MicroEncryption Technology Overview

Step 1: Upload

Remove sensitive data from its original location, manually or via automated application APIs.

Step 2: MicroEncryption

Simultaneously replace the sensitive data with CertainSafes's proprietary DigiToken placeholders. Your storage system now only contains a virtual representation of the original data, and the sensitive data is securely transferred to our cloud.

Step 3: MicroEncryption (Con't)

The removed data is immediately encrypted using AES256 with key pairs and a unique compound key for each data object, providing unsurpassed security. Encrypted files are broken into pieces and distributed across multiple physical and virtual locations. Data uploaded to our system is never saved in unencrypted form at any time.

Step 4: Retrieval

When retrieval is required, files are unencrypted and de-tokenized, reassembled and returned in real-time to whatever application requires the information for processing. Whole files can be returned or specific data objects curated for batch processing. Retrieval is blazingly fast.

For more information check out our FAQ's
Get Started Now!

Recent Blog Posts

10 Questions Every Business Should Ask Their Cloud Security Provider

You put a lot of faith in your cloud security provider. You trust that their security is better than yours. Nut how much do you really know? Here are 10 questions to ask your cloud security provider. What cloud security aspects is your business responsible for? Where does your responsibility end and where does theirs begin? Will your data be encrypted in transit and at rest? Don’t settle for general statements like “We will encrypt your data.” What security certifications does the provider possess? In addition to being certified SAS 70, CertainSafe® maintains databases in PCI DSS Level 1 Certified,…Read More

Breach Response Poor Following the Equifax Hack

Equifax, one the three main credit reporting agencies in the country, recently disclosed that a recent data breach may have impacted as many as 143 million Americans. On September 26, Equifax CEO Richard Smith announced his retirement. Data stolen in the breach includes 209,000 credit card numbers as well as millions of names, Social Security numbers, addresses, birth dates, drivers license numbers, etc. But what may be more concerning than the hack itself is Equifax’s breach response. Poor Breach Response Compounds Hack’s Damage First, the company took 6 weeks to disclose the breach, which gave hackers ample time to use…Read More

Hackers Gain Hands-On Access to US Power Grid

In an age when hackers and cyber-attacks seem to be in the news every day, extraordinary attacks with greater consequences can get lost in the headlines. That seems to be exactly what happened this week when it was announced that a series of attacks not only compromised the data of US and European energy companies, but also gave the intruders actual hands-on access to power grid operations. The intruders had enough control that they could have actually induced blackouts on U.S. soil at will – disrupting not only business, but also putting lives at risk. The Attack In the spring…Read More

"The CertainSafe approach to cloud security may be the most brilliant and effective that I've seen to date, in an area that is critical if Net-based commerce, applications, and transactions are to go forward."

- Mark Anderson, FiRe chair and CEO of the Strategic News Service