The File Fabric has many features for safeguarding data and we have published articles describing some of them. The point of this brief post, however, is slightly different. Here I want to discuss how the philosophy behind the File Fabric is as important as any individual feature for protecting enterprise data access.
As a starting point we assume that information security departments are not immune to the pressures faced by every other area in a modern business. Skills shortages, budgetary constraints, project deadlines, business imperatives and regulatory requirements work together to make efficiency as important to the Information Security team as it is to engineering, sales or any other functional area in the enterprise.
For that reason when InfoSec teams evaluate a new software solution they need to ask themselves not just how effective the solution is in isolation, but also how will it impact the efficiency of the team and thus the organization’s overall cybersecurity posture.
The File Fabric was conceived, designed and built to support multi-cloud use. By this we mean that the File Fabric expects a customer organisation to be using not just one kind of storage such as a traditional on-premises file server or newer cloud-based storage, but to be using many kinds of storage side-by-side.
The File Fabric’s guiding design principle is that all of these types of storage can be accessed and managed using a “single pane of glass” approach. Importantly, that approach allows security related policies to be set across all of the enterprise’s storage using a single set of policies administered from a single management interface.
This approach delivers significant operational benefits to information security managers.
First, it saves them the time it would take to develop and apply policies across their heterogenous storage systems. Second, it ensures consistency in the policies themselves regardless of the the storage type. Finally, it provides audit-ability in a single place of all actions taken against all of the files on the various storage systems.
Given that the range of information security threats grows almost daily and that information security teams face an endless challenge to stay ahead of those threats, the efficiencies provided by the File Fabric’s centralised management model can materially aid the effectiveness of the enterprise’s information security program.
Here are a few examples of previous CISO Bulletin posts with specific cybersecurity features of the Enterprise File Fabric:
CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™
CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™
CISO Bulletin: Ransomware Recovery With the Enterprise File Fabric™
See more of our cybersecurity features here.