Why companies should consider seamless recovery of Office365 and MS Teams file data as part of their CyberSecurity and DR Strategy

Microsoft Teams BackupData continues to grow inside of companies at an exponential rate, with the pandemic fuelling an acceleration of many companies digital transformation strategy.

What we have seen is that many companies have embraced Microsoft Teams and Office 365, often in short order due to business remote working needs.

Continue reading “Why companies should consider seamless recovery of Office365 and MS Teams file data as part of their CyberSecurity and DR Strategy”

Facebooktwitterredditpinterestlinkedinmailby feather

Data Management and Collaboration for Ceph and File Based Data Storage – ITRI and the Enterprise File Fabric Case Study

ITRI (Taiwan Industrial Technology Research Institute), is a world-leading applied technology research institute which is also a key player in autonomous vehicle development.

Its technology combines real-time positioning, mapping technology, machine learning, and a range of sensors to simulate driving and capture test data in real world situations. This process generates massive amounts of data that need to be analyzed quickly and precisely, and here is where the the Storage Made Easy (SME) Enterprise File Fabric comes into play.

Continue reading “Data Management and Collaboration for Ceph and File Based Data Storage – ITRI and the Enterprise File Fabric Case Study”

Facebooktwitterredditpinterestlinkedinmailby feather

Steps to ensure CCPA Compliance for Remote or Hybrid Workers

CCPAHow Organizations treat data privacy has never been under more scrutiny and there have been various legislation changes to protect data consumers including, initially, The General Data Protection Regulations (GDPR) and more recently the California Consumer Privacy Act (CCPA).

The CCPA became law on Jan 1st 2020 becoming the  first, but unlikely to be the last,  data privacy law to be enacted in the United States. It is a state rather than federal law but it requires any company that manages the data of California citizens to comply with the CCPA terms and definitions.

Continue reading “Steps to ensure CCPA Compliance for Remote or Hybrid Workers”

Facebooktwitterredditpinterestlinkedinmailby feather

Webinar: Enable your end users to get secure web, mobile and desktop access to Azure Files, Amazon FSx and other SMB File Services.

Join us for this “how to” webinar  which will demonstrate the ability of the Enterprise File Fabric for enabling a secure, audited way for end users to access their native file data including web, mobile and desktop Apps.

Continue reading “Webinar: Enable your end users to get secure web, mobile and desktop access to Azure Files, Amazon FSx and other SMB File Services.”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™

In a recent post about authentication with the Enterprise File Fabric™  I briefly mentioned authorization and committed to a follow-up post on that topic.  This post explains how the the File Fabric’s authorization features are used to manage user access to directories and their contents on the storage that is attached to the File Fabric.  As we’ll see, the File Fabric can use the groups that are set up in  authentication system to create a unified security structure that spans all storage.  Additionally, for some resources,  the File Fabric can import and use established  user authorizations  and also allow the storage’s native access controls to govern users read and write actions.

Continue reading “CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

Integrating with ADFS for secure document sharing and external partner collaboration

The Enterprise File Fabric’s Secure Data Management solution is a powerful way to enable sharing and collaboration on company documents with other company team members using existing company storage resources, whether that is on -cloud or on-premises. Additionally, secure link sharing provides an audited compliant way  for users to provide password protected links to people outside of a company. However, what about when users want to easily invite people external to a company to securely share and collaborate on documents?

Continue reading “Integrating with ADFS for secure document sharing and external partner collaboration”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™

The Enterprise File Fabric™ has a very good internal authentication system.  It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords.  If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.

Continue reading “CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather