CISO Bulletin: Two Factor Authentication for any Storage using the Enterprise File Fabric™

With so many employees working from home, organizations are looking for ways to enhance the security of their data, often spread between on-premises and cloud data stores, without compromising employee productivity and to comply with cyber insurance policies that may be, being added or renewed.

For enterprises using the Enterprise File Fabric™ , activating Two Factor Authentication (2FA) is an easy way to enhance access security on resources such as remote SMB/file and Object Storage with minimum disruption for end users.

 

Continue reading “CISO Bulletin: Two Factor Authentication for any Storage using the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

Integrating with ADFS for secure document sharing and external partner collaboration

The Enterprise File Fabric’s Secure Data Management solution is a powerful way to enable sharing and collaboration on company documents with other company team members using existing company storage resources, whether that is on -cloud or on-premises. Additionally, secure link sharing provides an audited compliant way  for users to provide password protected links to people outside of a company. However, what about when users want to easily invite people external to a company to securely share and collaborate on documents?

Continue reading “Integrating with ADFS for secure document sharing and external partner collaboration”

Facebooktwitterredditpinterestlinkedinmailby feather

CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™

The Enterprise File Fabric™ has a very good internal authentication system.  It uses a strong one way hash function, salts the passwords before it hashes them, and stores the hash values and not the passwords.  If the File Fabric was the only asset for which an enterprise required access control, then there would be no need for additional authentication options.

Continue reading “CISO Bulletin: Using Strategic Authentication Solutions With the Enterprise File Fabric™”

Facebooktwitterredditpinterestlinkedinmailby feather

CloudEdit – Frictionless File Editing for Remote Workers with the File Fabric

Covid-19 has shattered the normality we are all used to. Governments and health organisations are scrambling to try and control the virus at present. To prevent the spread of infection, different countries have been restricting movement to cope with the pandemic. The main rule, work from home where you can. Only travel if absolutely necessary. Now more than ever, the importance of remote working is crucial, not only to keep your business from staying afloat, but also to protect your staff, as well as others.

One difficult challenge for companies is enabling employees to have the same experience no matter where they are, whether they are working from home, in the office, or working whilst on-the-go, and irrespective of the operating system they are using, be this Windows or Mac OSX. CloudEdit is one feature of the File Fabric than can enable employees to achieve just this.

Continue reading “CloudEdit – Frictionless File Editing for Remote Workers with the File Fabric”

Facebooktwitterredditpinterestlinkedinmailby feather

Securely working with multi-cloud data in Slack using the File Fabric

Slack Multi-CloudAs more people are forced to work remotely due to Covid-19 we felt it was worth doing a blog refresh on the ways to work with the File Fabric and the chat collaboration app,  Slack.

The File Fabric has a specific integration with Slack that promotes securely sharing files, from just about any storage repository, directly from Slack. To add the File Fabric to a Slack account simply add it from the Slack marketplace.

Continue reading “Securely working with multi-cloud data in Slack using the File Fabric”

Facebooktwitterredditpinterestlinkedinmailby feather

2018 was they year of the data breach so what can be done ?

 

Third party data breaches continue at a pace even at 2018 closes, with the latest being the healthcare provider Atrium Health.

The move to Cloud is for many companies is both a blessing and a curse as it creates a potentially larger attack vector surface areas for would be hackers coupled with an increased reliance on external providers who may themselves be attacked.

Continue reading “2018 was they year of the data breach so what can be done ?”

Facebooktwitterredditpinterestlinkedinmailby feather