Webinar: Secure Remote Working Part 2 – Maintaining Secure User Desktop Workflows

Join us for the second session of our Secure Remote Working webinar series. Jim Liddle, CEO of Storage Made Easy, will outline how companies can enable users to have similar remote desktop workflow to what they have in the office, including Home Drive access to office data whilst enforcing policies, maintaining Data Governance and Compliance and continuously protecting data.

Continue reading “Webinar: Secure Remote Working Part 2 – Maintaining Secure User Desktop Workflows”

Facebooktwitterredditpinterestlinkedinmailby feather

Multi-Cloud Document Collaboration with Secure Shared Links

While the Enterprise File Fabric’s shared team folders are great for organizations collaborating on files within their company, what happens when users want to be able to quickly share documents in a secure manner with people from other organizations?

That’s where the File Fabric Secure File and Folder link sharing comes in. No longer do companies need to leverage other services outside of their own environment for sharing, nor do you need to open up access directly to your storage.

Continue reading “Multi-Cloud Document Collaboration with Secure Shared Links”

Facebooktwitterredditpinterestlinkedinmailby feather

Webinar: Military Grade Cloud Storage Security for Enterprises and Service Providers

Join us for a webinar and live demonstration of a highly secure low-cost storage solution from Leonovus with file collaboration and end to end governance powered by Storage Made Easy.

First, we’ll see how Leonovus 3.0 software-defined object storage uses military grade tactics for securing highly distributed systems along with home-grown patented algorithms that virtualize and slice data across a network of on-premises, hybrid or multi-cloud storage nodes. Then we’ll look at how File Fabric™ from Storage Made Easy™ complements this secure storage infrastructure.

Continue reading “Webinar: Military Grade Cloud Storage Security for Enterprises and Service Providers”

Facebooktwitterredditpinterestlinkedinmailby feather

Webinar: Providing Next-Generation Enterprise File Services through Software Defined Storage

Join Enrico Signoretti (Head of Product Strategy, OpenIO) and Steven Sweeting (Product Management Director, SME) to learn about Storage Made Easy File Fabric and OpenIO, the open source object store supporting both storage and compute environments from embedded devices to multi-petabyte datacenters.

See how OpenIO and Storage Made Easy work together to help your organization control costs and compliance providing next-generation storage services.

Files can be accessed anywhere, using any device, with full audit, security, reliability, and lower TCO.

This webinar is offered several times: 10AM CET and 11AM PT.

Register today and book your spot for the webinar!

Can’t make it? Don’t let that stop you. All registrants can later access the webinar on demand, so be sure to register!

Continue reading “Webinar: Providing Next-Generation Enterprise File Services through Software Defined Storage”

Facebooktwitterredditpinterestlinkedinmailby feather

Webinar: An Introduction to the Storage Made Easy Enterprise File Fabric

Webinar_Banner

SME Webinar

With the world growing increasingly data-rich, customers are looking for tools to access data at any time, whilst also being as secure as possible.

Storage Made Easy provides a comprehensive control and management solution with the most enriched cloud computing features to enable secure cloud collaboration across data points for corporations.

Continue reading “Webinar: An Introduction to the Storage Made Easy Enterprise File Fabric”

Facebooktwitterredditpinterestlinkedinmailby feather

Turning your iOS or Android device into a wireless Flash Drive

This blog post title may seem a little strange given that Storage Made Easy promotes the use of secure cloud file share and sync but we understand that there are times when you simply want to bulk move files directly from a laptop or PC to be able to access them on the move.

A little know feature of the free SME iOS and Android Apps is that they have the ability to turn themselves into an FTP Server which can be wirelessly connected to from an FTP client on the same network.

iOS FTP Flash DriveAndroid Wireless Flash Drive

This allows files to be easily uploaded to the App in Bulk on each device.

From a security viewpoint you will still want to secure the files in the event you lost the device or the device is stolen.

On iOS the SME App can be protected by a pin, and the forthcoming release supplemented by fingerprint Touch ID for devices that support it. Also If you turn on the device password for the iOS device then the SME App takes advantage of the encryption features build into iOS and all files are encrypted when the device is ‘locked’ or “at rest”.

On Android the SME App can also be protected by a pin but for additional security users should consider encrypting their device storage. You can read an article now how to do that here.

 

 

Facebooktwitterredditpinterestlinkedinmailby feather

Document Management is more than just managing documents – it is also securing them

Enterprise file share and sync

Document control and management is of vital importance to any organization. If sensitive information is sent outside of your company, once the documents have been sent electronically, control is lost and this can put files you shared at risk. They can be copied or forwarded anywhere in the world, in seconds.

For most businesses, the focus of their attention is on document management and on the organizational workflow and the storage of documents. Companies want to be able to integrate documents into a workflow and store documents in an organized and secure way that still allows documents to be found easily . Where the document is stored can frequently change. It could be SharePoint, it could be FTP, it could be on some external repository etc. Where the security process can fall down is when documents are shared externally or how they are available to be collaborated on.

The proliferation of employees bringing there own devices to work (BYOD and BYOC) and using preferred SaaS applications of their own choosing has led to corporate governance becoming even more of a challenge for those tasked with its enforcement as an increasing number of end users bypass corporate protocol.

Such ‘Shadow IT‘ can pose a significant security risk, as unapproved hardware and software that are used do not undergo the necessary security checks and the storage and dissemination of such documents is outside of corporate control.

solving shadow it problem

Storage Made Easy provides a unified Enterprise File Share and Sync solution, which works with a companies existing private and public data, presenting these files in a unified view.. It enables enterprises to not only securely sync, but also to securely share and work with files, wherever they need to go, even on devices that are beyond IT’s control.

IT benefits from a solution that gives them control, and users benefit as they have automatic access to documents and files from multiple data repositories, with robust security wherever behind the corporate firewall, or using any tablet, smartphone or PC.

Storage Made Easy uniquely provides:

• The ability to view, annotate, edit and sync almost any cloud or private file from almost any storage to any device.

• Internal and external collaboration features to work securely with anyone without losing control of enterprise data.

• Complete audit tracking to ascertain who accessed files, where form, and what action was taken.

• Provides a secure way for the organizations to collaborate with external partners using business workspaces.

• GEO Restrictions – restrict access to documents by IP address and by client. For example let an external sub office only have access to a folder from a specific IP address from the web browser (or any other client you nominate).

• Full Bring Your Own Device Support to restrict access to by employees by device type.

• Sophisticated permissions that unify permissions to different back end document storage and which can also be used with Active Directory or LDAP

• A way to solve the “DropBox” “bring your own cloud” problem be auditing such clouds even when documents are uploaded direct.

• A way to encrypt files stored on remote clouds which a key that is stored behind the corporate firewall this protecting remote sensitive data.

Secure document file sharing

In summary you do not have to choose between a homogenous and restrictive system or a lawless fenzy of different unapproved systems. The Storage Made Easy Enterprise file share and sync solution is storage agnostic. It is compatible with most private or public file sharing cloud data stores allowing users to continue using their preferred cloud storage provider while at the same time converging off-site and on–site private and public data. This allows a centralized point for corporate governance, thus providing a real solution to the Shadow IT and corporate governance problem.

Facebooktwitterredditpinterestlinkedinmailby feather

In a post PRISM world why your Company needs joined up File Sharing and Governance

The recent controversy with regards to Prism and data snooping has brought the security of corporate data to the fore however the biggest threat to corporate data lies not with the corporate nemesis that is Prism but with the number of data leaks that occur every day in companies.

These include new phenomena such as Bring Your Own Device (BYOD) and Bring your Own Cloud (BYOC) as well as the thorny issue of what files are shared over email.

Data is any companies biggest asset and not controlling how corporate data is disseminated is a ticking time bomb waiting to explode in your company. Why? Take your pick, Legislative reasons, fraudulent reason, competitive reasons. There are many reasons why not controlling data dissemination could trip your company up.

Companies need to consider how to build an Effective data governance serves ACROSS their enterprise data silos. Doing so will define a cohesive set of parameters for data management, data usage, as well as the ability to create governance processes for a companies internal use, and for their supply chain, which ultimately leads to information assets that are well managed.

SME Data Governance framework

In the world of Cloud it is key that Data Governance and data policies work not only with data behind the corporate firewall but also cloud data and cloud services.

So what should you consider as a company to manage your data assets ?

1. Understand what information is sensitive across all data silos, have a federate access control mechanism that works with your user across this private and cloud data silos. Storage Made Easy provides such a federate mechanism to assign and control user permissions and access at a very granular level that overlays one or more data stores.

SME federate permissions

2. Set policies for data access and enforce them through common tools. For employee sharing of data through tools such as email, make it easy but also set policies that can define expiry time and password protection. Storage Made Easy has plug in’s for Microsoft Outlook and Mac Mail that enables productive file sharing across all cloud / private data but which has built in support for policy enforcement.

Mac Mail large file sharing

These policies should also ripple through to the mobile Applications used in a company:

iOS secure file sharing

3. Use Cloud Encryption for sensitive data and ensure that you control the private key. See our previous post on encryption and securing data for further information.

Cloud File Encryption

4. Audit all your company data. Irrespective of the policies set you should get in the habit of auditing your company data. SME enables the setup of an automated email to a specified user of the previous day file events such as sharing, files updated etc.

Cloud Storage Audit Log

5. Set BYOD policies and device access policies that work like your company works. For example, have a contract firm that you gave access to a specific folder ? Then designate that they can only access the folder using a web browser and only from a specific IP address.

BYOD GEO Restrictions

Summary

Companies need to connect disconnected information to enable corporate governance.

Cloud Corporate Governance

Facebooktwitterredditpinterestlinkedinmailby feather