go2transfer is a file transfer service for professionals looking for security and confidentiality. In order to meet the safety requirements, we have designed an innovative and robust system. Connect and send multiple files to multiple recipients. The shipment is made under maximum security conditions. A notification is sent to the recipient. A tracking tool allows you to follow the progress of the transfer and the history of your previous transfers. Once downloaded, the file is deleted from the server.
Every day you hear about cyber attacks, hacking, phishing, etc. You have taken steps to protect your network and ensure the integrity of your data. When you send or receive files from your clients or subcontractors, these files are vulnerable when they travel over the Internet. It is important to use a method that is flawless.
go2transfer was designed to meet this need. The data is separated in pieces, encrypted and stored in secure servers. Encryption is based on a double key: the one of the sender and the one of the recipient. This means that the file can be decrypted by the recipient only.
go2transfer takes care of the transport of your data and relies on a third-party partner to ensure its protection. This is our double security contract.
How can I be sure that the file has arrived at its destination?
When the file is uploaded on our server, the recipient receives a notification email. The sender can connect track the download status of files. A history of shipments is also saved and serves as a receipt.
First, the exchange can only be done between 2 users registered with go2transfer. It is necessary to obtain the 2 protection keys.
When the user connects to the site www.go2transfer.net it is an HTTPS connection… i.e. a level of security…
Once connected, the sender can choose the files to send. These files will be split into several parts then encrypted according to each recipient. A notification is sent to the recipient. To download the file, the recipient connects by identifying himself, then he can download the files which will be decrypted. The encryption of the files is carried out with 2 keys, that of the sender and that of the recipient.