CISO Bulletin: The Added Value of a Unified Storage Security Management Interface.

The File Fabric has many features for safeguarding data and we have published articles describing some of them. The point of this brief post, however, is slightly different.  Here I want to discuss how the philosophy behind the File Fabric is as important as any individual feature for protecting enterprise data access.

Continue reading “CISO Bulletin: The Added Value of a Unified Storage Security Management Interface.”

Facebooktwitterredditpinterestlinkedinmailby feather

Case Study | Collaborating with partners and clients for access to proprietary material in Amazon S3.

Collaborating with external partners and clients in a secure way is a key issue for most companies at the moment. In the case of the company subject to our last case study, they needed fluid access to brand materials for planning, marketing, and sales purposes.

See how the Enterprise File Fabric solved the collaboration challenges of a Global Footwear Firm.

Continue reading “Case Study | Collaborating with partners and clients for access to proprietary material in Amazon S3.”

Facebooktwitterredditpinterestlinkedinmailby feather

How to Secure and Simplify End User Access to Amazon S3 Object Storage for Remote Workers

AmazonS3As remote working settles into becoming more and more of a reality for many companies our experience is that many companies wish to facilitate direct end user access to Amazon’s Simple Object Storage, Amazon S3.

The reasons they want to do this are:

    1. Continue reading “How to Secure and Simplify End User Access to Amazon S3 Object Storage for Remote Workers”
Facebooktwitterredditpinterestlinkedinmailby feather

Unified Multi-Cloud Audit Logging for Unstructured File and Object Data

multi-cloud audit logPandemic-driven increases in work from home initiatives along with incidents such as the recent Solar Winds data breach have increased the security imperative for  data auditing.

Access to structured data is, for the most part, audited via database logs and application audit trails. On the other hand, for access to unstructured data, the fastest growing component of corporate data, there exists little to no unified access logging. This problem is compounded because organizations of even moderate size typically deploy storage across multiple data platforms – on premises NAS and windows filers, cloud applications such as MS OneDrive, Google Drive, SharePoint and, DropBox, to native cloud data stores as S3, Azure and GCP.

Continue reading “Unified Multi-Cloud Audit Logging for Unstructured File and Object Data”

Facebooktwitterredditpinterestlinkedinmailby feather

New Update of the Enterprise File Fabric: Strengthening Remote Working and Cybersecurity Features for a Company’s Existing File and Object Data

We recently announced a new release of the Enterprise File Fabric. Probably one of the most exhaustive updates so far. Focusing on pandemic related feature enhancements on remote working and cybersecurity, and providing a powerful combination of privacy and collaboration that works with a company’s existing file and object data sets.

Continue reading “New Update of the Enterprise File Fabric: Strengthening Remote Working and Cybersecurity Features for a Company’s Existing File and Object Data”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™

The Enterprise File Fabric™ has a very good internal authentication system.  It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords.  If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.

Continue reading “CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Ransomware Recovery With the Enterprise File Fabric™

Ransomware is one of the most vexing issues confronting information security professionals.  Prevention is difficult, recovery is challenging for legal, ethical and practical reasons and the potential negative impact, in terms of both operations and reputation, can be enormous.  So far there is no silver bullet for ransomware but there are ways to facilitate quick and palatable recoveries.  The File Fabric’s ForeverFile feature is one such way.

Continue reading “CISO Bulletin: Ransomware Recovery With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather