One of the security and productivity features that the File Fabric ships with is secure link sharing. This feature works with any of the 60+ on-premises and on-cloud storage solutions that the File Fabric supports, including SMB file style storage and object storage solutions such as Amazon S3, Azure, Google, or other S3 compatible Object Storage such as Cloudian Hyperstore.
Firstly, why use links instead of file attachments?
1. Links can be controlled so they are more secure. For example links can require Identity Login, be password protected and they can be time expired or restricted to a set number of downloads ie. I am sending this to Joe, he must enter the password within the next 24 hours and he can only download the file once.
2. The link creation and subsequent access of file and/or object links are audited and logged satisfying data compliance regimes such as HIPPA, GDPR, CCPA etc and this information can be used in a Subject Access Report (SAR).
3. Large files can easily be sent using secure links, which often cannot be sent as email attachments. This is of course ideal for remote workers stuck on consumer broadband. Additionally the shared files, when accessed for download, are speedily transferred using the File Fabric’s acceleration features, M-Stream.
4. Secure shared links that auto expire can provide protection against providing temp url’s or opening up access to cloud storage infrastructures such as Amazon S3 which when inadvertently left open are often the main cause of data breaches.
For end users to want the use shared links they have to fit into their everyday productivity workflows which is why, aside from the File Fabric web and mobile apps, the File Fabric provides secure data sharing plugins to best of breed Email Apps:
As companies increasingly embrace hybrid work and are in danger of phishing and Ransomware attacks secure link sharing adds another line of cybersecurity defence:
If an email inadvertently finds it’s way to the wrong party it required password authentication to access links which can also be remotely expired.
If email is breached any attachments simply don’t exist as the links are expired.
Actors who access shared links can be required to authenticate and also have IP addresses logged for security / compliance.
Sending links to documents using email offers employees a familiar productive communication channel, while leveraging a more secure way of controlling the information flow and simultaneously satisfying compliance challenges.by