My TrueCloud

Toll Free : 866-426-5485      Free Trial Demo Webinar  Cloud Security

True Secure Cloud Collaboration - Anytime, Anywhere, Any Device

True Security


Data privacy is noted by CIO’s as the single biggest reason for not adopting cloud and mobile solutions. To fully harness the power of the cloud with data security as the highest priority, My TrueCloud has developed a proprietary scheme using 2-Factor Authentication with SSL Virtual Private Network Tunneling to create an easy to deploy Token-less (an industry first) above military grade security solution. Click here for more information on our new Invisible Cloud Token Technology. There are simply no collaboration vendors today, other than MTC, who can deliver that level of security. Industries that use patient information daily, customer financial information, confidential HR information and highly sensitive intellectual property cannot accept anything less than military-grade security. My Security used in conjunction with My Documents will provide the security and forensics to ensure your company knows exactly what is happening with your data. My Security can be purchased as a stand alone system (same new technology being introduced into Credit Card security today) or with any of MTC’s solutions.

Below are highlights of MY Security unique functionality:
  • 2-Factor Authentication utilizes 2 forms of unique identification (an Individuals password and a unique One-Time Password) during the sign-in process to insure users are who they claim to be.
  • One-Time Passwords can be sent via Mobile Text, email Notification and e-Token apps for all SmartPhones and Tablets.
  • Token-less One-Time Passwords provides the additional advantage for customers using MTC’s VPN by turning each device’s browser into a Token thus eliminating the need to carry a physical token and rekey the One-Time Password each time. Thus, gaining ease of use without sacrificing security.
  • SSL VPN Tunneling utilizes proprietary algorithms to establish an AES encrypted network link providing true entry-to-exit security.
  • Access Rules by individual users to minimizes rogue employee mal-use.
  • System Diagnostics to monitor what applications and release levels are on each device to ensure compliance each time a transmission is established.
  • Unique Digital Certificate is assigned to each company account.
  • Active Directory or LDAP Link that allows for automatic bulk registration.
  • Forensic Monitoring to capture real-time transmission data (Who, What and When) and provides security audits and logs.