The File Fabric has many features for safeguarding data and we have published articles describing some of them. The point of this brief post, however, is slightly different. Here I want to discuss how the philosophy behind the File Fabric is as important as any individual feature for protecting enterprise data access.by
Collaborating with external partners and clients in a secure way is a key issue for most companies at the moment. In the case of the company subject to our last case study, they needed fluid access to brand materials for planning, marketing, and sales purposes.
See how the Enterprise File Fabric solved the collaboration challenges of a Global Footwear Firm.by
Pandemic-driven increases in work from home initiatives along with incidents such as the recent Solar Winds data breach have increased the security imperative for data auditing.
Access to structured data is, for the most part, audited via database logs and application audit trails. On the other hand, for access to unstructured data, the fastest growing component of corporate data, there exists little to no unified access logging. This problem is compounded because organizations of even moderate size typically deploy storage across multiple data platforms – on premises NAS and windows filers, cloud applications such as MS OneDrive, Google Drive, SharePoint and, DropBox, to native cloud data stores as S3, Azure and GCP.by
The core focus of the Enterprise File Fabric is providing multi-cloud content collaboration with strong cybersecurity and compliance protection for a company’s entire date state, whether that is file or object storage; and whether that is stored on-premises or on-cloud.
Having employees outside the office working and accessing data from different locations, this year more than ever it was crucial for companies to feel their data was secured.
Remote Working, or working on the move can often be the weak point of document compliance, but the File Fabric Apps and best-of-breed integrations mean that end user workflows remain the same and policy and compliance enforcement is unchanged.
Here’s a recap of the remote cybersecurity features that were reinforced within the Enterprise File Fabric this year:by
We recently announced a new release of the Enterprise File Fabric. Probably one of the most exhaustive updates so far. Focusing on pandemic related feature enhancements on remote working and cybersecurity, and providing a powerful combination of privacy and collaboration that works with a company’s existing file and object data sets.by
In a recent post about authentication with the Enterprise File Fabric™ I briefly mentioned authorization and committed to a follow-up post on that topic. This post explains how the the File Fabric’s authorization features are used to manage user access to directories and their contents on the storage that is attached to the File Fabric. As we’ll see, the File Fabric can use the groups that are set up in authentication system to create a unified security structure that spans all storage. Additionally, for some resources, the File Fabric can import and use established user authorizations and also allow the storage’s native access controls to govern users read and write actions.by
The Enterprise File Fabric™ has a very good internal authentication system. It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords. If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.by
Ransomware is one of the most vexing issues confronting information security professionals. Prevention is difficult, recovery is challenging for legal, ethical and practical reasons and the potential negative impact, in terms of both operations and reputation, can be enormous. So far there is no silver bullet for ransomware but there are ways to facilitate quick and palatable recoveries. The File Fabric’s ForeverFile feature is one such way.by
With so many employees working from home, organizations are looking for ways to enhance the security of their data, often spread between on-premises and cloud data stores, without compromising employee productivity. For enterprises using the Enterprise File Fabric™ , activating Two Factor Authentication (2FA) is an easy way to improve information security with minimum disruption for end users.
Organizations are grappling with the exponential growth of unstructured data. They are managing every more data silos across desktops, mobile devices, in data centers and increasingly in third-party cloud storage and applications. Additionally, new storage technologies offer new options for hosting, backing up and archiving data.by
Across this year, we have announced the launch of some remarkable new features that confirm why the Enterprise File Fabric™ is becoming one of the most integrated multi-cloud, hybrid storage solutions.
Have a look at our top 5 features for 2019:by
Data breaches are, by now, part and parcel of daily life. This is especially true for businesses; cyber security protocol is now a must regardless of how big your company is or what industry you operate in.by