Below are the slides and the video presentation of the Storage Made Easy OpenStack Vancouver Summit presentation.
We also announced an open source rules repository for PII information. It is available on Github here.by
To satisfy the GDPR companies will need to track who had access to personal data, when, and why.
Access is controlled by Identity Management authorisations and access control, but the actual access to the data should be logged. Automatic Audit logging tracks user activities for any and all file events and enables extranal audit and/or subject access requests to be satisfied easily and effectively.by
Data, data everywhere….and then……what?
That is the issue with digital data. As digital data doubles very year it leads to vast quantities of unstructured data as employees create office documents, PDF’s, videos etc. Searching and classifying this data however presents a challenge particularly as the data within companies is spread across a multitude of on-cloud and on-premises systems and is simply not joined up.by
Identity Management is an important piece of the GDPR governance process, particularly ‘who’ has access to ‘what’ data and ‘how’ that access is granted.by
This post is the first in a new series of posts focusing on the forthcoming General Data Protection Regulations (GDPR) and specifically focuses on data encryption.by
A number of compliance standards hinge on identifying and protecting Personal Information. This Personal Information can take many forms including Personal Health Information (PHI), Personally Identifiable Information (PII), and Sensitive Personal Information (SPI).
The General Data Protection Regulation (GDPR) is the newest compliance standard sweeping the industry. However existing compliance standards such as HIPPA , GLBA and FERPA all require strict controls of personal data. Fines for violating compliance skyrocket with GDPR, so how should Enterprises find and classify existing PII data?
Introducing the PII Scanning and Detection engine for the Enterprise File Fabric…by
While the current technology news cycles are being dominated with Meltdown and Spectre, a security flaw in TLS-SNI has invalidated a simple way of securing free certificates from Let’s Encrypt.
Storage Made Easy recommends all traffic to be secured with encryption. This post will help new customers obtain a trusted certificate from the Let’s Encrypt Certificate Authority and instruct existing customers how to switch verification method from TLS-SNI to HTTP based validation.by