Solutions that provide flexibility and control
Designed for organizations in regulated industries such as financial services, insurance, life sciences, and the public sector.
The DocuSign Security Appliance enables you to store DocuSign eSignature encryption keys behind your firewall for additional privacy and security control.
DocuSign Security Appliance benefits
Maximize compliance
DocuSign’s Security Appliance meets rigorous security standards and certifications.
Get more flexibility
Meet your organization’s unique business requirements and challenges with hybrid and on-premises deployment options.
Leverage existing systems
Get up and running quickly with pre-built integrations for popular applications and services, allowing your employees to continue using the systems they already know and trust.
DocuSign Security Appliance
The DocuSign Security Appliance is a software application for managing your DocuSign eSignature encryption keys in your data center. As an add-on to DocuSign eSignature, it delivers all the benefits of our cloud application, plus the security assurance of storing encryption keys behind your firewall, separate from encrypted documents.
Data encryption compliant
DocuSign satisfies the stringent requirements for data protection, identity verification, and security controls based on detailed criteria developed in conjunction with the Cloud Security Alliance (CSA).
FAQ
The DocuSign Security Appliance is a software application that enables you to store and manage DocuSign eSignature encryption keys within your data center—in the application or in your Hardware Security Module (HSM). It is a premium add-on for DocuSign eSignature, utilizing the same core data encryption technology as DocuSign’s ISO 27001-certified encryption systems, and delivering the same easy-to-use eSignature experience. Customers can design their security and maintenance processes around the appliance and are responsible for appliance maintenance and updates.
The Security Appliance is an add-on to DocuSign eSignature for ultra-high security implementations that enables organizations to store encryption keys behind their firewall, separate from encrypted documents.