What we have seen is that many companies have embraced Microsoft Teams and Office 365, often in short order due to business remote working needs.by
The Enterprise File Fabric provides a global file system through which users and applications can transparently access corporate file systems and object storage no matter where they or the storage is located. To provide universal browsing, search, and other services the File Fabric scans and smartly indexes file and object metadata. In this way, no data is copied or replicated, and the metadata is used to build out the high-performance global file system.
Unlike other global file system solutions, the File Fabric does not prevent direct access to the storage – what we call bi-model access. Data can be accessed and updated concurrently through the File Fabric and directly through native file and object-APIs. When objects are updated through native APIs the File Fabric metadata should also be updated to keep indexes and other metadata synchronized.
An earlier blog article outlined three general approaches for keeping metadata up to date, including a specific example using Amazon S3 object notifications. See Using AWS Lambda to Automatically Sync Metadata With S3 Events. This article describes a similar approach we have developed for file systems using the same framework we call Jibe.by
ITRI (Taiwan Industrial Technology Research Institute), is a world-leading applied technology research institute which is also a key player in autonomous vehicle development.
Its technology combines real-time positioning, mapping technology, machine learning, and a range of sensors to simulate driving and capture test data in real world situations. This process generates massive amounts of data that need to be analyzed quickly and precisely, and here is where the the Storage Made Easy (SME) Enterprise File Fabric comes into play.by
With employees working increasingly from home corporate IT and CISO’s are increasingly focused on how they can improve upon data security and privacy for end users. The below tips are not new but they should server as a means to focus on what may be required for organizational change in the new hybrid work culture:
Continue reading “5 Tips for enhancing Cloud Data Security and Privacy in 2020”
How Organizations treat data privacy has never been under more scrutiny and there have been various legislation changes to protect data consumers including, initially, The General Data Protection Regulations (GDPR) and more recently the California Consumer Privacy Act (CCPA).
The CCPA became law on Jan 1st 2020 becoming the first, but unlikely to be the last, data privacy law to be enacted in the United States. It is a state rather than federal law but it requires any company that manages the data of California citizens to comply with the CCPA terms and definitions.by
Join us for this “how to” webinar which will demonstrate the ability of the Enterprise File Fabric for enabling a secure, audited way for end users to access their native file data including web, mobile and desktop Apps.by
As, post Covid-19, more companies evaluate a ‘cloud first’ strategy and open up Object Storage access to end users, in addition to other strategic use cases, there are five things that Companies should check when assessing their access vendor of choice:by
Metadata is in basic terms, data about other data. We can think of Metadata is similar to an iceberg, on the surface is what is visible ie. the file with basic information such as time, date etc, but beneath the surface is a wealth of valuable data which can make finding and working with certain types of data easier.by
In a recent post about authentication with the Enterprise File Fabric™ I briefly mentioned authorization and committed to a follow-up post on that topic. This post explains how the the File Fabric’s authorization features are used to manage user access to directories and their contents on the storage that is attached to the File Fabric. As we’ll see, the File Fabric can use the groups that are set up in authentication system to create a unified security structure that spans all storage. Additionally, for some resources, the File Fabric can import and use established user authorizations and also allow the storage’s native access controls to govern users read and write actions.by
The Enterprise File Fabric’s Secure Data Management solution is a powerful way to enable sharing and collaboration on company documents with other company team members using existing company storage resources, whether that is on -cloud or on-premises. Additionally, secure link sharing provides an audited compliant way for users to provide password protected links to people outside of a company. However, what about when users want to easily invite people external to a company to securely share and collaborate on documents?by
The Enterprise File Fabric™ has a very good internal authentication system. It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords. If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.by