CISO Bulletin: The Added Value of a Unified Storage Security Management Interface.

The File Fabric has many features for safeguarding data and we have published articles describing some of them. The point of this brief post, however, is slightly different.  Here I want to discuss how the philosophy behind the File Fabric is as important as any individual feature for protecting enterprise data access.

Continue reading “CISO Bulletin: The Added Value of a Unified Storage Security Management Interface.”

Facebooktwitterredditpinterestlinkedinmailby feather

Case Study | Collaborating with partners and clients for access to proprietary material in Amazon S3.

Collaborating with external partners and clients in a secure way is a key issue for most companies at the moment. In the case of the company subject to our last case study, they needed fluid access to brand materials for planning, marketing, and sales purposes.

See how the Enterprise File Fabric solved the collaboration challenges of a Global Footwear Firm.

Continue reading “Case Study | Collaborating with partners and clients for access to proprietary material in Amazon S3.”

Facebooktwitterredditpinterestlinkedinmailby feather

Unified Multi-Cloud Audit Logging for Unstructured File and Object Data

multi-cloud audit logPandemic-driven increases in work from home initiatives along with incidents such as the recent Solar Winds data breach have increased the security imperative for  data auditing.

Access to structured data is, for the most part, audited via database logs and application audit trails. On the other hand, for access to unstructured data, the fastest growing component of corporate data, there exists little to no unified access logging. This problem is compounded because organizations of even moderate size typically deploy storage across multiple data platforms – on premises NAS and windows filers, cloud applications such as MS OneDrive, Google Drive, SharePoint and, DropBox, to native cloud data stores as S3, Azure and GCP.

Continue reading “Unified Multi-Cloud Audit Logging for Unstructured File and Object Data”

Facebooktwitterredditpinterestlinkedinmailby feather

New Update of the Enterprise File Fabric: Strengthening Remote Working and Cybersecurity Features for a Company’s Existing File and Object Data

We recently announced a new release of the Enterprise File Fabric. Probably one of the most exhaustive updates so far. Focusing on pandemic related feature enhancements on remote working and cybersecurity, and providing a powerful combination of privacy and collaboration that works with a company’s existing file and object data sets.

Continue reading “New Update of the Enterprise File Fabric: Strengthening Remote Working and Cybersecurity Features for a Company’s Existing File and Object Data”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™

In a recent post about authentication with the Enterprise File Fabric™  I briefly mentioned authorization and committed to a follow-up post on that topic.  This post explains how the the File Fabric’s authorization features are used to manage user access to directories and their contents on the storage that is attached to the File Fabric.  As we’ll see, the File Fabric can use the groups that are set up in  authentication system to create a unified security structure that spans all storage.  Additionally, for some resources,  the File Fabric can import and use established  user authorizations  and also allow the storage’s native access controls to govern users read and write actions.

Continue reading “CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™

The Enterprise File Fabric™ has a very good internal authentication system.  It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords.  If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.

Continue reading “CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Ransomware Recovery With the Enterprise File Fabric™

Ransomware is one of the most vexing issues confronting information security professionals.  Prevention is difficult, recovery is challenging for legal, ethical and practical reasons and the potential negative impact, in terms of both operations and reputation, can be enormous.  So far there is no silver bullet for ransomware but there are ways to facilitate quick and palatable recoveries.  The File Fabric’s ForeverFile feature is one such way.

Continue reading “CISO Bulletin: Ransomware Recovery With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Two Factor Authentication for any Storage using the Enterprise File Fabric™

With so many employees working from home, organizations are looking for ways to enhance the security of their data, often spread between on-premises and cloud data stores, without compromising employee productivity.  For enterprises using the Enterprise File Fabric™ , activating Two Factor Authentication (2FA) is an easy way to improve information security with minimum disruption for end users.

 

Continue reading “CISO Bulletin: Two Factor Authentication for any Storage using the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

Disaster and Ransomware Protection Feature – ForeverFile™

Organizations are grappling with the exponential growth of unstructured data. They are managing every more data silos across desktops, mobile devices, in data centers and increasingly in third-party cloud storage and applications. Additionally, new storage technologies offer new options for hosting, backing up and archiving data.

Continue reading “Disaster and Ransomware Protection Feature – ForeverFile™”

Facebooktwitterredditpinterestlinkedinmailby feather