The File Fabric has many features for safeguarding data and we have published articles describing some of them. The point of this brief post, however, is slightly different. Here I want to discuss how the philosophy behind the File Fabric is as important as any individual feature for protecting enterprise data access.by
The team behind the Storage Made Easy Blog has published articles on the hottest topics of the year: remote working, challenges and changes in the way companies are dealing with data, or remote cybersecurity; are some of the topics covered.
Here are our top 5 picks:by
With employees working increasingly from home corporate IT and CISO’s are increasingly focused on how they can improve upon data security and privacy for end users. The below tips are not new but they should server as a means to focus on what may be required for organizational change in the new hybrid work culture:
Continue reading “5 Tips for enhancing Cloud Data Security and Privacy in 2020”
In a recent post about authentication with the Enterprise File Fabric™ I briefly mentioned authorization and committed to a follow-up post on that topic. This post explains how the the File Fabric’s authorization features are used to manage user access to directories and their contents on the storage that is attached to the File Fabric. As we’ll see, the File Fabric can use the groups that are set up in authentication system to create a unified security structure that spans all storage. Additionally, for some resources, the File Fabric can import and use established user authorizations and also allow the storage’s native access controls to govern users read and write actions.by
The Enterprise File Fabric™ has a very good internal authentication system. It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords. If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.by
Ransomware is one of the most vexing issues confronting information security professionals. Prevention is difficult, recovery is challenging for legal, ethical and practical reasons and the potential negative impact, in terms of both operations and reputation, can be enormous. So far there is no silver bullet for ransomware but there are ways to facilitate quick and palatable recoveries. The File Fabric’s ForeverFile feature is one such way.by
Initiatives to deploy the Enterprise File Fabric™ are often driven by infrastructure managers who need a way to give WFH workers frictionless access to the organisation’s on-premises and on-cloud data. This is great use case for the File Fabric and we endorse it wholeheartedly. At the same time we think it is also important for the enterprise’s information security professionals to understand the File Fabric’s security features, both so they can ensure that the File Fabric’s configuration aligns with the organisations information risk management standards and also so they can realise operational benefits provided by the File Fabric’s rich security oriented feature set as they go about their work of managing information security risk.by
A pre Covid-19 Microsoft commissioned Harvard Business Review research report looks at how the proliferation of corporate data may require global companies to alter their data security, privacy, risk, and compliance policies and it found that:by
Over 750 SMB’s (Small to Medium Businesses) took part in the survey which was conducted in the first quarter of 2020, in February and March. Of the respondents 554 where classed as enterprise respondents as opposed to 196 Small to Medium Business respondents. SMB’s were defined as having fewer than 1,000 employees whereas enterprise was defined as having more than 1,000 employees.by
As every information security professional knows, constant vigilance is required to ensure that enterprise information is adequately protected. The widespread adoption of cloud and hybrid infrastructures over the past decade have only amplified the requirement, and today’s demand for remote working at scale brings yet another set of challenges.
If you are working to keep your organization’s information safe under these dynamic conditions, it may be helpful to be familiar with the ways that the Enterprise File Fabric™ can be configured to provide and enforce strong protection of data through encryption, both in flight and at rest.by
With so many employees working from home, organizations are looking for ways to enhance the security of their data, often spread between on-premises and cloud data stores, without compromising employee productivity. For enterprises using the Enterprise File Fabric™ , activating Two Factor Authentication (2FA) is an easy way to improve information security with minimum disruption for end users.