Security is paramount at Cloudsmith, and we take pride in taking every precaution to secure the service. All communication and storage is encrypted in-transit and at-rest (with 256-bit or hardware-based encryption). Checksums and GPG signatures are provided to detect tampering. For increased trust you can also provide your own GPG key for signing.
Entitlements allow you to control who has read-only access to your package repositories. Whether you're automating server or application installs, or you're building a license-only software distribution, entitlements facilitates these.
Edge Caching Rules
Take control of geographic edge caching for your assets. With Edge Caching Rules, you're in control of how long assets stay close to your users, all across the world. Known as the Time-To-Live (TTL) expiry. Edge cached assets will be immediately available for use with minimal time required to fetch them. Reduced latency, better throughput, high availability.