The Enterprise File Fabric™ has a very good internal authentication system. It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords. If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.by
Ransomware is one of the most vexing issues confronting information security professionals. Prevention is difficult, recovery is challenging for legal, ethical and practical reasons and the potential negative impact, in terms of both operations and reputation, can be enormous. So far there is no silver bullet for ransomware but there are ways to facilitate quick and palatable recoveries. The File Fabric’s ForeverFile feature is one such way.by
With so many employees working from home, organizations are looking for ways to enhance the security of their data, often spread between on-premises and cloud data stores, without compromising employee productivity. For enterprises using the Enterprise File Fabric™ , activating Two Factor Authentication (2FA) is an easy way to improve information security with minimum disruption for end users.
Organizations are grappling with the exponential growth of unstructured data. They are managing every more data silos across desktops, mobile devices, in data centers and increasingly in third-party cloud storage and applications. Additionally, new storage technologies offer new options for hosting, backing up and archiving data.by
Across this year, we have announced the launch of some remarkable new features that confirm why the Enterprise File Fabric™ is becoming one of the most integrated multi-cloud, hybrid storage solutions.
Have a look at our top 5 features for 2019:by
Data breaches are, by now, part and parcel of daily life. This is especially true for businesses; cyber security protocol is now a must regardless of how big your company is or what industry you operate in.by