CISO Bulletin: Protecting the Enterprise File Fabric™ Against Third Party Software Vulnerabilities

In an  age where Cyber attacks are occurring daily, where even security focused companies are not immune, and in which third party embedded components can cause huge disruption we thought where  we thought it would be worthwhile to focus a blog post on what we do to protect the File Fabric from third party software vulnerabilities.

Continue reading “CISO Bulletin: Protecting the Enterprise File Fabric™ Against Third Party Software Vulnerabilities”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Two Factor Authentication for any Storage using the Enterprise File Fabric™

With so many employees working from home, organizations are looking for ways to enhance the security of their data, often spread between on-premises and cloud data stores, without compromising employee productivity and to comply with cyber insurance policies that may be, being added or renewed.

For enterprises using the Enterprise File Fabric™ , activating Two Factor Authentication (2FA) is an easy way to enhance access security on resources such as remote SMB/file and Object Storage with minimum disruption for end users.

 

Continue reading “CISO Bulletin: Two Factor Authentication for any Storage using the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

Customer Case Study: Providing Secure End User Access, Object Storage File Services, Governance and Compliance for a Top Tier Financial Services Firm

A global financial services firm was facing two critical challenges. First, a portfolio risk management application was working off a local server, which was a single point of failure. Secondly, the permission structure implemented was inadequate given the sensitivity of the data.

In our latest case study we show how the adoption of the Enterprise File Fabric provided secure end user File access to Cloudian Hyperstore ObjectStorage whilst maintaining Data Governance and Data Compliance.

Continue reading “Customer Case Study: Providing Secure End User Access, Object Storage File Services, Governance and Compliance for a Top Tier Financial Services Firm”

Facebooktwitterredditpinterestlinkedinmailby feather

GDPR Checklist for 2021

Today, almost every aspect of our lives revolves around and is influenced by data. Various entities collect, analyse, and, more importantly, store our personal data, such as our names, home and IP addresses, and credit card numbers. This phenomenon was further confirmed by the 2020 UK Business Data Survey, which showed that 81% of businesses handle digitised personal and non-personal data from employees and customers alike. As these businesses expand, the use of data increases as well.

Continue reading “GDPR Checklist for 2021”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: The Added Value of a Unified Storage Security Management Interface.

The File Fabric has many features for safeguarding data and we have published articles describing some of them. The point of this brief post, however, is slightly different.  Here I want to discuss how the philosophy behind the File Fabric is as important as any individual feature for protecting enterprise data access.

Continue reading “CISO Bulletin: The Added Value of a Unified Storage Security Management Interface.”

Facebooktwitterredditpinterestlinkedinmailby feather

Customer Case Study | Collaborating with partners and clients for access to proprietary material in Amazon S3.

Collaborating with external partners and clients in a secure way is a key issue for most companies at the moment. In the case of the company subject to our last case study, they needed fluid access to brand materials for planning, marketing, and sales purposes.

See how the Enterprise File Fabric solved the collaboration challenges of a Global Footwear Firm.

Continue reading “Customer Case Study | Collaborating with partners and clients for access to proprietary material in Amazon S3.”

Facebooktwitterredditpinterestlinkedinmailby feather

Unified Multi-Cloud Audit Logging for Unstructured File and Object Data

multi-cloud audit logPandemic-driven increases in work from home initiatives along with incidents such as the recent Solar Winds data breach have increased the security imperative for  data auditing.

Access to structured data is, for the most part, audited via database logs and application audit trails. On the other hand, for access to unstructured data, the fastest growing component of corporate data, there exists little to no unified access logging. This problem is compounded because organizations of even moderate size typically deploy storage across multiple data platforms – on premises NAS and windows filers, cloud applications such as MS OneDrive, Google Drive, SharePoint and, DropBox, to native cloud data stores as S3, Azure and GCP.

Continue reading “Unified Multi-Cloud Audit Logging for Unstructured File and Object Data”

Facebooktwitterredditpinterestlinkedinmailby feather

New Update of the Enterprise File Fabric: Strengthening Remote Working and Cybersecurity Features for a Company’s Existing File and Object Data

We recently announced a new release of the Enterprise File Fabric. Probably one of the most exhaustive updates so far. Focusing on pandemic related feature enhancements on remote working and cybersecurity, and providing a powerful combination of privacy and collaboration that works with a company’s existing file and object data sets.

Continue reading “New Update of the Enterprise File Fabric: Strengthening Remote Working and Cybersecurity Features for a Company’s Existing File and Object Data”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™

In a recent post about authentication with the Enterprise File Fabric™  I briefly mentioned authorization and committed to a follow-up post on that topic.  This post explains how the the File Fabric’s authorization features are used to manage user access to directories and their contents on the storage that is attached to the File Fabric.  As we’ll see, the File Fabric can use the groups that are set up in  authentication system to create a unified security structure that spans all storage.  Additionally, for some resources,  the File Fabric can import and use established  user authorizations  and also allow the storage’s native access controls to govern users read and write actions.

Continue reading “CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™

The Enterprise File Fabric™ has a very good internal authentication system.  It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords.  If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.

Continue reading “CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather