Military Grade Shared Folder Encryption
To secure your business data from potential malicious users, DSM adopts the AES 256-bit military grade encryption technology to store your data in a format protected by an encryption key.
Ease of useShared folders can be encrypted in a simple and convenient way, and can be mounted manually or automatically on system boot-up.
Flexible encryptionYou can encrypt pre-existing shared folders, including the homes folder, for enhanced security.
Secure key managementKey Manager allows you to use a USB storage device as a physical key to mount encrypted shared folders automatically without having to memorize all the encryption keys.
QualysGuard Security Scan
Synology protects your data with various DSM features, while also guaranteeing operating system security with a reliable, market-leading vulnerability scanner, QualysGuard, which allows Synology to conduct thorough system scans and implement remediation on every major DSM release. Get the security scan results of DSM. Learn more
Connecting a NAS to the Internet greatly increases its convenience and possible uses, but caution must be exercised to protect it from outside attacks. With DSM, you can block unusual attempts to enter your NAS in a highly customizable manner.
Manually double-checking system settings for potential security holes is tedious work, and often unfeasible or too complicated for ordinary users. Security Advisor conducts regular scans to rectify existing problems, as well as to cope with new security challenges when they emerge.
Secure network settings
Check if potentially vulnerable services which should be restricted to internal access only, such as SMB sharing, are open to the outside world.
Additional Security Measures
No matter where businesses store their sensitive files, malicious parties always attempt to exploit the system's weaknesses and acquire such data. To address this, Synology has developed a multitude of enhancements to ensure the most secure DSM environment.
- Let's Encrypt® is a registered trademark of the Internet Security Research Group, with all rights reserved.