CISO Bulletin: The Added Value of a Unified Storage Security Management Interface.

The File Fabric has many features for safeguarding data and we have published articles describing some of them. The point of this brief post, however, is slightly different.  Here I want to discuss how the philosophy behind the File Fabric is as important as any individual feature for protecting enterprise data access.

Continue reading “CISO Bulletin: The Added Value of a Unified Storage Security Management Interface.”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Ransomware Recovery With the Enterprise File Fabric™

Ransomware is one of the most vexing issues confronting information security professionals.  Prevention is difficult, recovery is challenging for legal, ethical and practical reasons and the potential negative impact, in terms of both operations and reputation, can be enormous.  So far there is no silver bullet for ransomware but there are ways to facilitate quick and palatable recoveries.  The File Fabric’s ForeverFile feature is one such way.

Continue reading “CISO Bulletin: Ransomware Recovery With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Using the Enterprise File Fabric to Understand Who is Accessing Your Data

Initiatives to deploy the Enterprise File Fabric™ are often driven by infrastructure managers who need a way to give WFH workers frictionless access to the organisation’s on-premises and on-cloud data.  This is great use case for the File Fabric and we endorse it wholeheartedly.  At the same time we think it is also important for the enterprise’s information security professionals to understand the File Fabric’s security features, both so they can ensure that the File Fabric’s configuration aligns with the organisations information risk management standards and also so they can realise operational benefits provided by the File Fabric’s rich security oriented feature set as they go about their work of managing information security risk.

Continue reading “CISO Bulletin: Using the Enterprise File Fabric to Understand Who is Accessing Your Data”

Facebooktwitterredditpinterestlinkedinmailby feather