Security You Can Trust

HubStor Security & Compliance

Like you, we take security seriously. HubStor makes cloud storage even more trustworthy for businesses requiring strong data security, compliance, privacy, and eDiscovery. HubStor includes a patent-pending design for securely getting data to the cloud. And in the cloud, HubStor puts you in control with data-awareness, PII tagging, data loss prevention, activity auditing, RBAC, directory integration, retention, litigation hold, and more.

cloud storage security

Talk with us about HubStor security

azure compliance

Secure Data Storage in the Cloud

HubStor enhances your data’s security with its patent-pending method of writing data securely to the cloud. Unlike standard practice, we connect you to the cloud without ever exposing the API key or password of the target cloud storage container. Our secure approach also detects and handles malicious user scenarios and monitors for distributed denial-of-service (DDoS) attacks against your cloud archive tenant.

Encryption Options to Suit Your Needs

Data is always encrypted in motion, and HubStor includes two approaches — both AES 256-bit — for encrypting your data-at-rest.

cloud storage security

Identity & Access Management

HubStor integrates with your directory to simplify user management and authentication. Authorization includes HubStor’s role-based access control (RBAC) and synchronized access control lists (ACLs).


Easily authorize HubStor to synchronize users and groups from your directory via Azure AD, making HubStor a secure and easy extension to your infrastructure, and giving you superior visibility and control.


HubStor authenticates your users via OpenID to your Azure AD. Optionally take advantage of single sign-on (SSO) and multi-factor authentication (MFA) to meet compliance needs while enhancing security for your users. And service accounts that connect to your Office 365 tenant support modern authentication.


You control authorization for administrators, privileged users, and end users with HubStor’s role-based access control. Easily manage access at the individual, group, or role level.


Item and folder ACLs persist in your HubStor cloud archive, maintaining familiar security for your users.  Access rights are correlated to actual users and groups, giving you administrative visibility of entitlements and data ownership at any level.

Data Awareness

Multi-dimensional visibility into your storage — providing on-demand intelligence about your content, users, and activity — is the advantage for security, compliance, eDiscovery, and IT.

search as a service


Query admin, system, and user activities. Immutable event history shows you changes in your configuration and what data users are accessing. You can even assess activities of a particular user or group within a date range.


Understand trends in your data growth, legal hold activity, as well as ingestion and egress activity.


Enjoy always-on visibility into your data. HubStor shows you what is in your archive. Visualize the types of data, growth rates, legal holds and cases, policies, and more!


Understand access data maps to see exactly the folders and items a particular user or group of users can access.


Construct policies and run them in preview mode before executing them. Preview mode gives you insight into the affected data in your policy’s scope.


Isolate data of interest and inspect version history, assigned tags and policies, access controls, and user activities.


Correlate storage consumption to business entities such as projects, clients, or cost centers. Run historical reports for any date range or see future cost projections.

Advanced Search Security

Access controls are maintained in the search index, providing fast custodian searching for eDiscovery as well as security for end-users.  HubStor performs additional security trimming on search results to ensure users only see what they should even when index permission synchronization is running.

More About Search
cloud storage security

Built-in Data Loss Prevention (DLP)

Identify and protect data assets that are important, private, or sensitive to your business.


Perform regular expression searches and advanced queries that scan your HubStor content to identify data containing credit card numbers and other private / sensitive information.  Apply tagging policies.  Then make use of tags in eDiscovery, for managing retention, and in other HubStor policies to protect and manage important content.


Maintain intelligence about the activity of your users and easily generate reports as needed.  Detect unusual behavior and view audit histories on items, folders, and users.


Deploy rules to protect corporate data from particular user activities.  For instance, block users from externally sharing any data tagged with private or sensitive content.

cloud storage security

eDiscovery & GDPR Readiness

HubStor simplifies eDiscovery and GDPR scenarios by giving you fast, scalable visibility into your data.  If you need to interrogate full content, indexing can be provisioned on-demand and scoped using policies to keep costs low.  HubStor lets administrators create cases, perform searches, place holds, collect data, or purge datasets with precision and ease.


HubStor itself maintains SOC 2 Type II compliance. If you are a customer, HubStor can commit to providing annual reports for SOC 2 and pen testing. Additionally, HubStor runs in Microsoft Azure, a leading cloud infrastructure that meets a broad set of international and industry-specific compliance standards, such as PCI DSS, ISO 27001, HIPAA, FedRAMP, SOC 1 and SOC 2.  Plus, HubStor’s WORM storage, retention management, auditing, and private/sensitive data identification and tagging make it easy for you to prove additional compliance as needed.

azure compliance

Learn More about HubStor Security & Compliance

Request access to our security whitepaper or to speak with HubStor’s CISO.


Schedule Demo