Committed to Security

DPP ‘Committed to Security’ mark Award

Because our customers use Signiant technology to move their most valuable assets, we take precaution to secure every layer involved in file movement. Our security technology and implementation regularly undergo extensive third-party reviews to ensure effective protection.

Trusted across the Media & Entertainment industry and beyond, Signiant was awarded the DPP ‘Committed to Security’ mark in 2018 for both production and broadcast.


Designing Secure Software

Building secure software requires a strong understanding of both the threats you’re protecting against and secure design principles. Otherwise, security functions can be implemented in ways that don’t actually protect assets from threats. Our dev team receives continuing education to stay up to date on secure design principles, and rigorously applies security functions such as:

  • Authentication: to ensure users are who they say they are,
  • Authorization: to ensure that users and automated processes have access to approved assets,
  • Data confidentiality: to protect data from unwanted disclosure,
  • Data integrity: to ensure data cannot be corrupted,
  • Non-repudiation: to make sure users cannot deny having taken an action,
  • Availability: to protect from interrupted access.


Three parts of how Signiant security works: protected assets, security functions, threats.


Signiant utilizes standards-based security technology like Transport Layer Security (TLS) to secure data and information as it is transmitted, including advanced authentication, data integrity, and data confidentiality. We ensure that all transfers are appropriately authorized and tracked to provide non-repudiatable proof that files were delivered.

However, designing secure software is only half the picture. Operating a secure service is equally as important. As a SaaS provider, Signiant employs service organization controls implemented in accordance with industry standards and best practices.

At Signiant, security is much more than just applying technology to mitigate threats; it is deeply ingrained into our way of thinking about software development and operational procedures.

Security is integral to the way Signiant approaches software design and development. Explore the other main components to Signiant technology: