Prevent security risks
Prevention is your first line of defense against security breaches. Your Synology server can be protected with intelligent solutions to stop attacks on your system and unauthorized user access.
Create firewall rules, automatically block IP addresses with too many failed login attempts, and enable Account Protection to reduce the threat of brute-force attacks from untrusted clients.
Add an extra layer of security if your credentials are leaked. Secure SignIn offers secure multi-factor authentication methods or convenient passwordless options. User-level permission settings can be applied to restrict access to files and features on a per folder or application basis.
Certified and trusted encryption
Synology DSM has been thoroughly tested and certified with FIPS 140 for cryptographic modules, as well as OpenChain 2.0 and 2.1 for open source compliance. Industry-standard AES-256 encryption is also used to keep your files secure.
Activate 2-factor authentication or choose from a range of passwordless login methods. Eliminate weak passwords and secure your Synology DSM account.
Tap a button in the Synology Secure SignIn mobile app on your phone or tablet to approve sign-in requests.
Hardware security key
Authenticate DSM account logins using hardware security keys, including built-in biometric identification (macOS Touch ID, Windows Hello) or U2F/FIDO2 compliant USB keys.
Minimize security risks by implementing recommended changes delivered by Synology Security Advisor based on routine scans for malware, vulnerable configurations and abnormal login activities.
Select predefined security baselines or customize essential security checks that identify configuration issues and cyber threats.
Set a scan schedule to ensure system integrity when files are modified and identify out-of-date packages that need updating.
Get alerted of suspicious login attempts to help you pinpoint and react against malicious third-party activity and brute-force attacks.
Beat the security bugs
Your security is our priority. We work with and reward security researchers who highlight newly discovered vulnerabilities through the Bounty Program. The Synology Product Security Incident Response Team (PSIRT) will investigate and publicly report these while you can feel assured that your NAS will receive firmware and software updates for up to five years.
Proactive recovery methods
There are multiple ways to recover your data if you are affected by threats like encryption-based ransomware or physical damage to hardware.
Back up externally
Bolster your security strategy with another layer of protection by backing up a copy of your NAS data to an off-site NAS or external device using Synology's Hyper Backup, Snapshot Replication, and USB Copy. Multi-version backups can be set up, offering more recovery points, greater data consistency, and restore efficiency.
Back up to the cloud
Store backups of your files to C2 Storage for Hyper Backup to complete your protection plan and ensure your data is accessible even if local copies are compromised.
Learn more about our data protection solutions
Complete backup solutions
Your backup plan should be extensive and thoroughly validated. Discover Synology's complete collection of backup solutions.
Secure your data with Synology systems
For IT enthusiasts
Synology's reliable devices are the ideal choice for individuals looking to store, manage, and protect their personal and work data.
Small and medium-sized businesses looking for a sophisticated storage solution can benefit from cost-efficient and reliable Synology NAS.