Trust

Security posture, plainly described.

How Foldr handles authentication, encryption, hosting and audit. No marketing-speak, no hand-waving about “enterprise-grade” anything. If your procurement team needs more, we’ll work through your questionnaire.

Authentication

Bring your own identity

SSO via SAML 2.0, Microsoft Entra ID, ADFS, Active Directory, Google Workspace, Kerberos and LDAP. Local accounts supported where you need them. Password policies, expiry and history all configurable.

Multi-factor

2FA, passkeys, device trust

TOTP authenticator apps, Duo push, and FIDO2/WebAuthn passkeys. Per-device approval for sensitive shares. Sudo re-prompt on admin actions. Self-service password reset via verified email or SMS, optional.

In transit

TLS everywhere

Every connection between users, Foldr, and your storage backends is encrypted in transit (TLS 1.2+). On SaaS, traffic between Foldr and customers terminates at the edge with TLS; cluster-internal traffic runs on the private network with Kubernetes NetworkPolicy segmentation. On appliance deployments, run Foldr behind your own VLAN or reverse proxy.

At rest

Originals stay in your storage

Foldr connects to SMB, S3, Azure, OneDrive and the rest in place; the original files never move into our database, and by default no file content lives on Foldr’s side. Search, previews and OCR are opt-in per share or tenant; when they’re on, the derived output (extracted text, rendered thumbnails, OCR JSON) is held server-side, encrypted at rest by the underlying service on SaaS, or on infrastructure you control on an appliance. The Trust Centre lists it explicitly.

Hosting

Two options. UK/EU SaaS, or your own appliance.

SaaS

UK and EU hosted

Foldr SaaS runs on UK and EU infrastructure for compute and customer data. A small number of operational services (telemetry, default AI inference, support tooling) sit outside the UK/EU; the Trust Centre has the full residency table.

Appliance

Your own infrastructure

Linux appliance you install in your own datacentre, hypervisor or cloud account. Air-gapped installs supported. Same Foldr Next UI as the SaaS, no internet dependency to operate.

Audit and oversight

Every action, attributable.

Activity log

Who did what, when

Every file open, share, edit, delete, link creation and permission change is recorded against the user. Retained per your policy. Downloadable as CSV from admin Settings.

Versions

File-level history

Foldr surfaces version history from the underlying storage backend where it’s available, so the audit trail isn’t a duplicate of what’s already there.

API tokens

Scoped, expiring

Per-user access tokens with explicit scopes and expiry. Programmatic access is attributable to the issuing user; the small number of platform-level system actions (e.g. background crawls) are logged separately.

IP rules

Allow- and blocklist

Per-share or per-user IP allowlist and blocklist. Combine with per-device approval for sensitive estates.

Compliance

GDPR-friendly by design.

Your files stay in your storage; you control retention, residency, and rights handling. We follow standard secure development practices and commission a third-party penetration test annually. We don’t list specific external certifications on this page because we’d rather work through your procurement questionnaire honestly than paste a logo soup. Get in touch and we’ll send you what you need.

Bring it together. On your terms.

Start a 30-day trial, no credit card. Or talk to us about self-hosting the appliance.