Data Management and Collaboration for Ceph and File Based Data Storage – ITRI and the Enterprise File Fabric Case Study

ITRI (Taiwan Industrial Technology Research Institute), is a world-leading applied technology research institute which is also a key player in autonomous vehicle development.

Its technology combines real-time positioning, mapping technology, machine learning, and a range of sensors to simulate driving and capture test data in real world situations. This process generates massive amounts of data that need to be analyzed quickly and precisely, and here is where the the Storage Made Easy (SME) Enterprise File Fabric comes into play.

Continue reading “Data Management and Collaboration for Ceph and File Based Data Storage – ITRI and the Enterprise File Fabric Case Study”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™

In a recent post about authentication with the Enterprise File Fabric™  I briefly mentioned authorization and committed to a follow-up post on that topic.  This post explains how the the File Fabric’s authorization features are used to manage user access to directories and their contents on the storage that is attached to the File Fabric.  As we’ll see, the File Fabric can use the groups that are set up in  authentication system to create a unified security structure that spans all storage.  Additionally, for some resources,  the File Fabric can import and use established  user authorizations  and also allow the storage’s native access controls to govern users read and write actions.

Continue reading “CISO Bulletin: Multi-Cloud Authorization With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™

The Enterprise File Fabric™ has a very good internal authentication system.  It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords.  If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.

Continue reading “CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

Storage Made Easy Adds Support for Backblaze B2 Cloud Storage

The Storage Made Easy Enterprise File Fabric™ platform now supports Backblaze B2 Cloud Storage as a first-class storage provider. It’s been one of our most requested storage providers. Many organizations are already using Backblaze for cloud backup and want other data and workflows to take advantage of low cost cloud storage.

This blog walks through setting up a Backblaze B2 provider, highlighting some of the nifty features as well as nuances and recommended settings.

Continue reading “Storage Made Easy Adds Support for Backblaze B2 Cloud Storage”

Facebooktwitterredditpinterestlinkedinmailby feather

Using the File Fabric to Enable the Life Science Community to Easily Work with Genomic Information

Probably one of the least known use cases of the Enterprise File Fabric is its implementation within the Healthcare and Genomics industry. The File Fabric is used as part of a healthcare workflow for secure, audited, end user access to genomic information.

Continue reading “Using the File Fabric to Enable the Life Science Community to Easily Work with Genomic Information”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Ransomware Recovery With the Enterprise File Fabric™

Ransomware is one of the most vexing issues confronting information security professionals.  Prevention is difficult, recovery is challenging for legal, ethical and practical reasons and the potential negative impact, in terms of both operations and reputation, can be enormous.  So far there is no silver bullet for ransomware but there are ways to facilitate quick and palatable recoveries.  The File Fabric’s ForeverFile feature is one such way.

Continue reading “CISO Bulletin: Ransomware Recovery With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Using the Enterprise File Fabric to Understand Who is Accessing Your Data

Initiatives to deploy the Enterprise File Fabric™ are often driven by infrastructure managers who need a way to give WFH workers frictionless access to the organisation’s on-premises and on-cloud data.  This is great use case for the File Fabric and we endorse it wholeheartedly.  At the same time we think it is also important for the enterprise’s information security professionals to understand the File Fabric’s security features, both so they can ensure that the File Fabric’s configuration aligns with the organisations information risk management standards and also so they can realise operational benefits provided by the File Fabric’s rich security oriented feature set as they go about their work of managing information security risk.

Continue reading “CISO Bulletin: Using the Enterprise File Fabric to Understand Who is Accessing Your Data”

Facebooktwitterredditpinterestlinkedinmailby feather

Webinar: Secure Remote Working Part 2 – Maintaining Secure User Desktop Workflows

Join us for the second session of our Secure Remote Working webinar series. Jim Liddle, CEO of Storage Made Easy, will outline how companies can enable users to have similar remote desktop workflow to what they have in the office, including Home Drive access to office data whilst enforcing policies, maintaining Data Governance and Compliance and continuously protecting data.

Continue reading “Webinar: Secure Remote Working Part 2 – Maintaining Secure User Desktop Workflows”

Facebooktwitterredditpinterestlinkedinmailby feather