The Enterprise File Fabric™ has a very good internal authentication system. It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords. If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.by
Covid-19 has shattered the normality we are all used to. Governments and health organisations are scrambling to try and control the virus at present. To prevent the spread of infection, different countries have been restricting movement to cope with the pandemic. The main rule, work from home where you can. Only travel if absolutely necessary. Now more than ever, the importance of remote working is crucial, not only to keep your business from staying afloat, but also to protect your staff, as well as others.
One difficult challenge for companies is enabling employees to have the same experience no matter where they are, whether they are working from home, in the office, or working whilst on-the-go, and irrespective of the operating system they are using, be this Windows or Mac OSX. CloudEdit is one feature of the File Fabric than can enable employees to achieve just this.by
With so many employees working from home, organizations are looking for ways to enhance the security of their data, often spread between on-premises and cloud data stores, without compromising employee productivity. For enterprises using the Enterprise File Fabric™ , activating Two Factor Authentication (2FA) is an easy way to improve information security with minimum disruption for end users.
The File Fabric has a specific integration with Slack that promotes securely sharing files, from just about any storage repository, directly from Slack. To add the File Fabric to a Slack account simply add it from the Slack marketplace.by
Third party data breaches continue at a pace even at 2018 closes, with the latest being the healthcare provider Atrium Health.
The move to Cloud is for many companies is both a blessing and a curse as it creates a potentially larger attack vector surface areas for would be hackers coupled with an increased reliance on external providers who may themselves be attacked.by
Identity Management is an important piece of the GDPR governance process, particularly ‘who’ has access to ‘what’ data and ‘how’ that access is granted.by
In part 1, we set up the SME appliance with a Microsoft DFS Storage Provider. Today we will continue the setup, enabling AD user authentication, corporate shares, department shares, and home directories for each user.
This article assumes you followed along in Part 1 and met the prerequisites there, in addition you’ll need a few more shares configured on your fileserver, and a few users and groups configured in Active Directory.by