Top 5 Multi-Cloud Data Governance Recommendations

File Fabric Data GovernancePost pandemic has resulted in a surge of cloud adoption with many companies now operating a hybrid mix and match approach to corporate data to fit in with new digital transformation approaches that encompass hybrid or remote workers.

Whereas a hybrid multi-cloud approach is best for flexibility and ROI it can increase the threat surface of data so it is key to adopt a unified policy based approach to data governance and compliance. Below are 5 key recommendations for multi-cloud data governance:

Continue reading “Top 5 Multi-Cloud Data Governance Recommendations”

Facebooktwitterredditpinterestlinkedinmailby feather

GDPR Checklist for 2021

Today, almost every aspect of our lives revolves around and is influenced by data. Various entities collect, analyse, and, more importantly, store our personal data, such as our names, home and IP addresses, and credit card numbers. This phenomenon was further confirmed by the 2020 UK Business Data Survey, which showed that 81% of businesses handle digitised personal and non-personal data from employees and customers alike. As these businesses expand, the use of data increases as well.

Continue reading “GDPR Checklist for 2021”

Facebooktwitterredditpinterestlinkedinmailby feather

Secure Email Sharing is Critical to Maintaining Productivity, Security and Compliance in a Hybrid Workforce

SecureEmailSharingOne of the security and productivity features that the File Fabric ships with is secure link sharing. This feature works with any of the 60+ on-premises and on-cloud storage solutions that the File Fabric supports,  including SMB file style storage and object storage solutions such as Amazon S3, Azure, Google, or other S3 compatible Object Storage such as Cloudian Hyperstore.

Continue reading “Secure Email Sharing is Critical to Maintaining Productivity, Security and Compliance in a Hybrid Workforce”

Facebooktwitterredditpinterestlinkedinmailby feather

How to Secure and Simplify End User Access to Amazon S3 Object Storage for Remote Workers

AmazonS3As remote working settles into becoming more and more of a reality for many companies our experience is that many companies wish to facilitate direct end user access to Amazon’s Simple Object Storage, Amazon S3.

The reasons they want to do this are:

    1. Continue reading “How to Secure and Simplify End User Access to Amazon S3 Object Storage for Remote Workers”
Facebooktwitterredditpinterestlinkedinmailby feather

Unified Multi-Cloud Audit Logging for Unstructured File and Object Data

multi-cloud audit logPandemic-driven increases in work from home initiatives along with incidents such as the recent Solar Winds data breach have increased the security imperative for  data auditing.

Access to structured data is, for the most part, audited via database logs and application audit trails. On the other hand, for access to unstructured data, the fastest growing component of corporate data, there exists little to no unified access logging. This problem is compounded because organizations of even moderate size typically deploy storage across multiple data platforms – on premises NAS and windows filers, cloud applications such as MS OneDrive, Google Drive, SharePoint and, DropBox, to native cloud data stores as S3, Azure and GCP.

Continue reading “Unified Multi-Cloud Audit Logging for Unstructured File and Object Data”

Facebooktwitterredditpinterestlinkedinmailby feather

Customer Case Study – Data Management and Collaboration for Ceph and File Based Data Storage

ITRI (Taiwan Industrial Technology Research Institute), is a world-leading applied technology research institute which is also a key player in autonomous vehicle development.

Its technology combines real-time positioning, mapping technology, machine learning, and a range of sensors to simulate driving and capture test data in real world situations. This process generates massive amounts of data that need to be analyzed quickly and precisely, and here is where the the Storage Made Easy (SME) Enterprise File Fabric comes into play.

Continue reading “Customer Case Study – Data Management and Collaboration for Ceph and File Based Data Storage”

Facebooktwitterredditpinterestlinkedinmailby feather

5 Tips for enhancing Cloud Data Security and Privacy in 2020

With employees working increasingly from home corporate IT and CISO’s are increasingly focused on how they can improve upon data security and privacy for end users. The below tips are not new but they should server as a means to focus on what may be required for organizational change in the new hybrid work culture:
Continue reading “5 Tips for enhancing Cloud Data Security and Privacy in 2020”

Facebooktwitterredditpinterestlinkedinmailby feather

Using the File Fabric to Enable the Life Science Community to Easily Work with Genomic Information

Probably one of the least known use cases of the Enterprise File Fabric is its implementation within the Healthcare and Genomics industry. The File Fabric is used as part of a healthcare workflow for secure, audited, end user access to genomic information.

Continue reading “Using the File Fabric to Enable the Life Science Community to Easily Work with Genomic Information”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Using the Enterprise File Fabric to Understand Who is Accessing Your Data

Initiatives to deploy the Enterprise File Fabric™ are often driven by infrastructure managers who need a way to give WFH workers frictionless access to the organisation’s on-premises and on-cloud data.  This is great use case for the File Fabric and we endorse it wholeheartedly.  At the same time we think it is also important for the enterprise’s information security professionals to understand the File Fabric’s security features, both so they can ensure that the File Fabric’s configuration aligns with the organisations information risk management standards and also so they can realise operational benefits provided by the File Fabric’s rich security oriented feature set as they go about their work of managing information security risk.

Continue reading “CISO Bulletin: Using the Enterprise File Fabric to Understand Who is Accessing Your Data”

Facebooktwitterredditpinterestlinkedinmailby feather