File Fabric integration with external Vault Key Server by HashiCorp (Part 2)

Welcome to Part 2 of our File Fabric integration with Vault by HashiCorp blog.  In part 1, we discussed the benefits of integrating your Storage Made Easy appliance with your Vault instance as well as a walk through of setting up the integration between vault and File Fabric.  In this follow-up blog we will look …

File Fabric integration with external Vault Key Server by HashiCorp (Part 1)

The primary purpose of the File Fabric encryption feature is to protect  a users/companies files on local and remote storage resources, such as Object Storage, Dropbox, Google Drive etc, and to achieve this in an easy and seamless manner. When files are encrypted in by the File Fabric, users cannot access or share them directly …

CISO Bulletin: Use Encryption to Continuously Protect Multi-Cloud Data With the Enterprise File Fabric™

As every information security professional knows, constant vigilance is required to ensure that enterprise information is adequately protected. The widespread  adoption of cloud and hybrid infrastructures over the past decade have only amplified the requirement, and today’s demand for remote working at scale brings yet another set of challenges. If you are working to keep …

Using the File Fabric to Provide Security of Data Across Storage Silos With Streamed Encryption

GDPR; CCPA; PIPEDAR, Coppa, CalOPPA, Nevada Senate Bill 220, APP, New Zealand Privacy Act, Japan’s APPI.  Privacy laws are here to stay, more are approaching, and they are becoming deeper and wider. Every organization looking to become compliant with the existing and emerging regulations will need to perform multi-dimensional analysis of how they are handling …

How to encrypt, secure and access sensitive cloud storage data

**Updated 1st July 2016* The recent PRISM Data snooping controversies have heightened almost every companies awareness of the potential vulnerabilities of data stored off-premise in the Cloud. Many Cloud Storage companies’ talk about encrypting data ‘at rest’ but the real issue is that the storage companies control the encryption rather than the company whose data is …