In an age where Cyber attacks are occurring daily, where even security focused companies are not immune, and in which third party embedded components can cause huge disruption we thought where we thought it would be worthwhile to focus a blog post on what we do to protect the File Fabric from third party software vulnerabilities.by
Once again the team behind the Storage Made Easy Blog have published articles covering the hottest data and storage management trends of 2021.
Here is our top 5 pick:by
With so many employees working from home, organizations are looking for ways to enhance the security of their data, often spread between on-premises and cloud data stores, without compromising employee productivity and to comply with cyber insurance policies that may be, being added or renewed.
For enterprises using the Enterprise File Fabric™ , activating Two Factor Authentication (2FA) is an easy way to enhance access security on resources such as remote SMB/file and Object Storage with minimum disruption for end users.
A global financial services firm was facing two critical challenges. First, a portfolio risk management application was working off a local server, which was a single point of failure. Secondly, the permission structure implemented was inadequate given the sensitivity of the data.
In our latest case study we show how the adoption of the Enterprise File Fabric provided secure end user File access to Cloudian Hyperstore ObjectStorage whilst maintaining Data Governance and Data Compliance.by
Today, almost every aspect of our lives revolves around and is influenced by data. Various entities collect, analyse, and, more importantly, store our personal data, such as our names, home and IP addresses, and credit card numbers. This phenomenon was further confirmed by the 2020 UK Business Data Survey, which showed that 81% of businesses handle digitised personal and non-personal data from employees and customers alike. As these businesses expand, the use of data increases as well.by
The File Fabric has many features for safeguarding data and we have published articles describing some of them. The point of this brief post, however, is slightly different. Here I want to discuss how the philosophy behind the File Fabric is as important as any individual feature for protecting enterprise data access.by
Collaborating with external partners and clients in a secure way is a key issue for most companies at the moment. In the case of the company subject to our last case study, they needed fluid access to brand materials for planning, marketing, and sales purposes.
See how the Enterprise File Fabric solved the collaboration challenges of a Global Footwear Firm.by
Pandemic-driven increases in work from home initiatives along with incidents such as the recent Solar Winds data breach have increased the security imperative for data auditing.
Access to structured data is, for the most part, audited via database logs and application audit trails. On the other hand, for access to unstructured data, the fastest growing component of corporate data, there exists little to no unified access logging. This problem is compounded because organizations of even moderate size typically deploy storage across multiple data platforms – on premises NAS and windows filers, cloud applications such as MS OneDrive, Google Drive, SharePoint and, DropBox, to native cloud data stores as S3, Azure and GCP.by
The core focus of the Enterprise File Fabric is providing multi-cloud content collaboration with strong cybersecurity and compliance protection for a company’s entire date state, whether that is file or object storage; and whether that is stored on-premises or on-cloud.
Having employees outside the office working and accessing data from different locations, this year more than ever it was crucial for companies to feel their data was secured.
Remote Working, or working on the move can often be the weak point of document compliance, but the File Fabric Apps and best-of-breed integrations mean that end user workflows remain the same and policy and compliance enforcement is unchanged.
Here’s a recap of the remote cybersecurity features that were reinforced within the Enterprise File Fabric this year:by
We recently announced a new release of the Enterprise File Fabric. Probably one of the most exhaustive updates so far. Focusing on pandemic related feature enhancements on remote working and cybersecurity, and providing a powerful combination of privacy and collaboration that works with a company’s existing file and object data sets.by
In a recent post about authentication with the Enterprise File Fabric™ I briefly mentioned authorization and committed to a follow-up post on that topic. This post explains how the the File Fabric’s authorization features are used to manage user access to directories and their contents on the storage that is attached to the File Fabric. As we’ll see, the File Fabric can use the groups that are set up in authentication system to create a unified security structure that spans all storage. Additionally, for some resources, the File Fabric can import and use established user authorizations and also allow the storage’s native access controls to govern users read and write actions.by
The Enterprise File Fabric™ has a very good internal authentication system. It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords. If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.by