Join us for this “how to” webinar which will demonstrate the ability of the Enterprise File Fabric for enabling a secure, audited way for end users to access their native file data including web, mobile and desktop Apps.by
As, post Covid-19, more companies evaluate a ‘cloud first’ strategy and open up Object Storage access to end users, in addition to other strategic use cases, there are five things that Companies should check when assessing their access vendor of choice:by
Metadata is in basic terms, data about other data. We can think of Metadata is similar to an iceberg, on the surface is what is visible ie. the file with basic information such as time, date etc, but beneath the surface is a wealth of valuable data which can make finding and working with certain types of data easier.by
In a recent post about authentication with the Enterprise File Fabric™ I briefly mentioned authorization and committed to a follow-up post on that topic. This post explains how the the File Fabric’s authorization features are used to manage user access to directories and their contents on the storage that is attached to the File Fabric. As we’ll see, the File Fabric can use the groups that are set up in authentication system to create a unified security structure that spans all storage. Additionally, for some resources, the File Fabric can import and use established user authorizations and also allow the storage’s native access controls to govern users read and write actions.by
The Enterprise File Fabric’s Secure Data Management solution is a powerful way to enable sharing and collaboration on company documents with other company team members using existing company storage resources, whether that is on -cloud or on-premises. Additionally, secure link sharing provides an audited compliant way for users to provide password protected links to people outside of a company. However, what about when users want to easily invite people external to a company to securely share and collaborate on documents?by
The Enterprise File Fabric™ has a very good internal authentication system. It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords. If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.by
Join Storage Made Easy and Cloudian for a demonstration of a remote media workflow utilizing industry tools.
Skip the boring webinars and opt for a slide-free interactive learning experience.by
Probably one of the least known use cases of the Enterprise File Fabric is its implementation within the Healthcare and Genomics industry. The File Fabric is used as part of a healthcare workflow for secure, audited, end user access to genomic information.by
Is it difficult or impossible for all your users to search and access content stored in different locations on different technologies? In our next webinar aimed to creatives within the Media and Entertainment industry, together with Backblaze we will show you how to:by
The File Fabric is deployed in a company’s office or data centre.
Remote working has never been more prevalent than it is now in our society due to Covid-19, and even post pandemic it is clear that some companies will continue with policies for remote working and consolidate real estates and offices.
This post is part of a series of short videos related to the topic of remote working.by