CISO Bulletin: Two Factor Authentication for any Storage using the Enterprise File Fabric™

With so many employees working from home, organizations are looking for ways to enhance the security of their data, often spread between on-premises and cloud data stores, without compromising employee productivity and to comply with cyber insurance policies that may be, being added or renewed.

For enterprises using the Enterprise File Fabric™ , activating Two Factor Authentication (2FA) is an easy way to enhance access security on resources such as remote SMB/file and Object Storage with minimum disruption for end users.

 

Continue reading “CISO Bulletin: Two Factor Authentication for any Storage using the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: The Added Value of a Unified Storage Security Management Interface.

The File Fabric has many features for safeguarding data and we have published articles describing some of them. The point of this brief post, however, is slightly different.  Here I want to discuss how the philosophy behind the File Fabric is as important as any individual feature for protecting enterprise data access.

Continue reading “CISO Bulletin: The Added Value of a Unified Storage Security Management Interface.”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™

In a recent post about authentication with the Enterprise File Fabric™  I briefly mentioned authorization and committed to a follow-up post on that topic.  This post explains how the the File Fabric’s authorization features are used to manage user access to directories and their contents on the storage that is attached to the File Fabric.  As we’ll see, the File Fabric can use the groups that are set up in  authentication system to create a unified security structure that spans all storage.  Additionally, for some resources,  the File Fabric can import and use established  user authorizations  and also allow the storage’s native access controls to govern users read and write actions.

Continue reading “CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™

The Enterprise File Fabric™ has a very good internal authentication system.  It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords.  If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.

Continue reading “CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Ransomware Recovery With the Enterprise File Fabric™

Ransomware is one of the most vexing issues confronting information security professionals.  Prevention is difficult, recovery is challenging for legal, ethical and practical reasons and the potential negative impact, in terms of both operations and reputation, can be enormous.  So far there is no silver bullet for ransomware but there are ways to facilitate quick and palatable recoveries.  The File Fabric’s ForeverFile feature is one such way.

Continue reading “CISO Bulletin: Ransomware Recovery With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Using the Enterprise File Fabric to Understand Who is Accessing Your Data

Initiatives to deploy the Enterprise File Fabric™ are often driven by infrastructure managers who need a way to give WFH workers frictionless access to the organisation’s on-premises and on-cloud data.  This is great use case for the File Fabric and we endorse it wholeheartedly.  At the same time we think it is also important for the enterprise’s information security professionals to understand the File Fabric’s security features, both so they can ensure that the File Fabric’s configuration aligns with the organisations information risk management standards and also so they can realise operational benefits provided by the File Fabric’s rich security oriented feature set as they go about their work of managing information security risk.

Continue reading “CISO Bulletin: Using the Enterprise File Fabric to Understand Who is Accessing Your Data”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Use Encryption to Continuously Protect Multi-Cloud Data With the Enterprise File Fabric™

As every information security professional knows, constant vigilance is required to ensure that enterprise information is adequately protected. The widespread  adoption of cloud and hybrid infrastructures over the past decade have only amplified the requirement, and today’s demand for remote working at scale brings yet another set of challenges.

If you are working to keep your organization’s information safe under these dynamic conditions, it may be helpful to be familiar with the ways that the Enterprise File Fabric™ can be configured to provide and enforce  strong protection of data through encryption, both in flight and at rest.

Continue reading “CISO Bulletin: Use Encryption to Continuously Protect Multi-Cloud Data With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

How to Enable Remote Employees to Securely Access On-premises Company Data in Under 1 Hour

Interest in letting employees to work from home has never been higher and will remain high even after the Covid-19 virus has run its course.  For Companies large and small  the key challenge is how to make Company data available remotely in a way that is easy for employees to use without compromising on information security.  The Enterprise File Fabric™ offers an unmatched set of features to support secure remote working.  In this post we’ll see how to set up the File Fabric in less than an hour to provide secure remote access to on-premises data, be that SMB, NAS / SAN or Microsoft DFS shares.  The best part is that data is not copied or removed anywhere, it remains in the same secure place and the File Fabric provides web scale secure access  to it .

Continue reading “How to Enable Remote Employees to Securely Access On-premises Company Data in Under 1 Hour”

Facebooktwitterredditpinterestlinkedinmailby feather

File Fabric Group Collaboration Becomes Even Better With Keycloak

The Keycloak authentication system will be bundled with the next major release of the File Fabric.

Keycloak is an open source single sign-on  Identity Management and Access Management solution for applications and services.

We have integrated Keycloak in a way that makes it secure and convenient to use,  just like any of the File Fabric’s existing authentication mechanisms, but it is especially well suited for use with the File Fabric’s Business Groups feature.

Continue reading “File Fabric Group Collaboration Becomes Even Better With Keycloak”

Facebooktwitterredditpinterestlinkedinmailby feather

Using Rclone with the SME S3 Drive for Perfect Data Migrations

Amazon S3 DriveHere at Storage Made Easy we can quite often get involved in helping a customer clone, or move, their data from one storage provider to another. This is often a one time operation, and we have a number of in-house apps and scripts that we are able to use but today I’d like to discuss a third party free solution called  Rclone.

Continue reading “Using Rclone with the SME S3 Drive for Perfect Data Migrations”

Facebooktwitterredditpinterestlinkedinmailby feather