Steps to ensure CCPA Compliance for Remote or Hybrid Workers

CCPAHow Organizations treat data privacy has never been under more scrutiny and there have been various legislation changes to protect data consumers including, initially, The General Data Protection Regulations (GDPR) and more recently the California Consumer Privacy Act (CCPA).

The CCPA became law on Jan 1st 2020 becoming the  first, but unlikely to be the last,  data privacy law to be enacted in the United States. It is a state rather than federal law but it requires any company that manages the data of California citizens to comply with the CCPA terms and definitions.

Continue reading “Steps to ensure CCPA Compliance for Remote or Hybrid Workers”

Facebooktwitterredditpinterestlinkedinmailby feather

Webinar: Enable your end users to get secure web, mobile and desktop access to Azure Files, Amazon FSx and other SMB File Services.

Join us for this “how to” webinar  which will demonstrate the ability of the Enterprise File Fabric for enabling a secure, audited way for end users to access their native file data including web, mobile and desktop Apps.

Continue reading “Webinar: Enable your end users to get secure web, mobile and desktop access to Azure Files, Amazon FSx and other SMB File Services.”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™

In a recent post about authentication with the Enterprise File Fabric™  I briefly mentioned authorization and committed to a follow-up post on that topic.  This post explains how the the File Fabric’s authorization features are used to manage user access to directories and their contents on the storage that is attached to the File Fabric.  As we’ll see, the File Fabric can use the groups that are set up in  authentication system to create a unified security structure that spans all storage.  Additionally, for some resources,  the File Fabric can import and use established  user authorizations  and also allow the storage’s native access controls to govern users read and write actions.

Continue reading “CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

Integrating with ADFS for secure document sharing and external partner collaboration

The Enterprise File Fabric’s Secure Data Management solution is a powerful way to enable sharing and collaboration on company documents with other company team members using existing company storage resources, whether that is on -cloud or on-premises. Additionally, secure link sharing provides an audited compliant way  for users to provide password protected links to people outside of a company. However, what about when users want to easily invite people external to a company to securely share and collaborate on documents?

Continue reading “Integrating with ADFS for secure document sharing and external partner collaboration”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™

The Enterprise File Fabric™ has a very good internal authentication system.  It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords.  If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.

Continue reading “CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

Using the File Fabric to Enable the Life Science Community to Easily Work with Genomic Information

Probably one of the least known use cases of the Enterprise File Fabric is its implementation within the Healthcare and Genomics industry. The File Fabric is used as part of a healthcare workflow for secure, audited, end user access to genomic information.

Continue reading “Using the File Fabric to Enable the Life Science Community to Easily Work with Genomic Information”

Facebooktwitterredditpinterestlinkedinmailby feather