Case Study – A Global Financial Services

Posted by Jim Mongillo on June 29 2016

Continuing our penetration into security conscious and regulated verticals, we recently won a global contract from a leading financial services company with offices worldwide. After having evaluated many enterprise file security and digital rights management solutions over many months, the company selected Vaultize.


Read More

Topics: Mobile Content Management (MCM), Digital Rights Management (DRM), Compliance, BYOD, enterprise file sharing, Enterprise File Sync & Share, FTP Replacement, Vault KNOX, Dropbox Alternative, endpoint data protection, Outlook Plugin, data governance, Lotus Notes

Introducing Multi Factor Authentication in Enterprise File Sync & Share (EFSS)

Posted by Aboli Aradhye on March 16 2016

Why Multi Factor Authentication (MFA)?

Traditional security systems rely on passwords to authenticate and authorize access to protected data. But such password-only systems are, in general, more vulnerable to security breaches as there is only one layer of security. To protect against such breaches, multi-factor authentication (MFA) or two-factor authentication (2FA) is used, which offers extra layer of security. This extra layer of security makes use of information that is accessible only to the user being authenticated.

Read More

Topics: Compliance, enterprise file sharing, Enterprise File Sync & Share, enterprise file security, enterprise digital rights management, data breach, data governance, Multi-Factor Authentication (MFA), Authentication, One Time Password (OTP), Shared-Link Access, RADIUS

WhatsApp Adds File Sharing – Another Reason for CIO to Look for Mobile-friendly Secure Enterprise File Sharing

Posted by Sayali Kekre on March 4 2016

Facebook-owned WhatsApp messaging service (one of the most popular consumer applications) has introduced file sharing (currently only PDF). For consumers this is a moment to cheer. But given that corporate employees are increasingly using WhatsApp for communication, the addition of document sharing is another data leakage channel that every CIO needs to pay attention to.

Read More

Topics: Mobile Content Management (MCM), Compliance, file security, enterprise file sharing, Secure FIle Sharing, enterprise digital rights management, Shadow-IT, Access Control, encryption, data governance, Mobile File Sharing, data leakage

Launching Vaultize Russian Website

Posted by Sameer Vitkar on October 28 2015

We are today launching Vaultize Website (www.vaultize.ru) in Russian language. This is one more step to offer localized information to the prospects, customers and partners in CIS region. In the coming months we will be releasing Vaultize platform with Russian language localization support.

As part of our global expansion strategy, we had recently signed Master Reseller Agreement with Mitra Soft (http://www.mitrasoft.ru), a Value Added Distributor (VAD) headquartered in Moscow for Russia and CIS region. Mitra Soft is an established IT marketing and value-added distribution company with deep experience in SaaS, IT solutions for virtualization and enterprise mobility.

Read More

Topics: Mobile Content Management (MCM), Digital Rights Management (DRM), BYOD, enterprise file sharing, Enterprise File Sync & Share, enterprise file security, endpoint data protection, Vaultize Partner Program, Russia, data governance

Will Safe Harbor Ruling Increase On-premise and Private Cloud Deployments?

Posted by Anand Kekre on October 27 2015

What is Safe Harbor? It is the policy agreement established between the United States Department of Commerce and the European Union (E.U.) in November 2000 to regulate the way that U.S. companies export and handle the personal data (such as names and addresses) of European citizens.

Earlier this month, Court of Justice of the European Union declared that the US Safe Harbor is invalid, directly affecting the European companies that use services of public cloud vendors. It was an eye opener for other geographies as well.

Read More

Topics: enterprise file sharing, enterprise digital rights management, encryption, safe harbor, Data Soverignity, Data Privacy, private cloud, on-premise cloud, regulatory compliance, data breach, data leakage

Safe Harbor, Privacy and Sovereignty Elements in Enterprise File Sharing

Posted by Anand Kekre on October 20 2015

Consumerization of information technology and enterprise mobility have given rise to end-users’ demand for anywhere, anytime access to corporate data. While ignoring such requests is turning out to be risky for enterprise IT because of Shadow-IT, many businesses have implemented enterprise file sharing (Enterprise File Sync and Share – EFSS) solutions as an alternative to Dropbox.


But just implementing a secure enterprise file sharing solution is not the end to the IT decision makers’ woes. Recently the Court of Justice of the European Union declared that the US Safe Harbor is invalid, directly affecting the companies in European countries that use public cloud file sharing vendors. It was an eye opener for other geographies as well.

Read More

Topics: Mobile Content Management (MCM), file security, enterprise file sharing, Enterprise File Sync & Share, Dropbox Alternative, endpoint encryption, enterprise digital rights management, Data Privacy Option (DPO), Access Control, encryption, safe harbor, Data Soverignity, Data Privacy, Deployment Flexibility, Key Management

Large Attachment Problem – Resorting to Consumer File Sharing Can Be eDiscovery and Compliance Risk

Posted by Gary Cooke on October 8 2015

Data size is growing day by day. Large attachments have been a problem for corporate users and enterprise IT both. IT restricts the size of attachments to control the growth of (costly) storage and to keep the Exchange/Domino servers efficient. Bloated mailboxes affect the efficiency of mail clients like Outlook and Lotus Notes.

Read More

Topics: Compliance, enterprise file sharing, Enterprise File Sync & Share, Dropbox Alternative, Shadow-IT, Dropbox Replacement, Enterprise Dropbox, eDiscovery, Outlook Plugin, data governance

10 Necessary Data Governance Capabilities in Enterprise File Sharing

Posted by Anand Kekre on October 5 2015

With the increase in consumerization of information technology, enterprise mobility and demand from end-users for anywhere, anytime access to corporate data – enterprise IT is facing challenges in balancing the need of end-users and business requirements of security, data governance and compliance.

With the explosive growth of freely available consumer file sharing services enterprise IT is finding out the hard way that their employees have been sharing valuable data with external parties with little or no security measures in place. 

Read More

Topics: Mobile Content Management (MCM), Compliance, BYOD, enterprise file sharing, Enterprise File Sync & Share, enterprise digital rights management, Data Loss Prevention, Data Privacy Option (DPO), Online Document Viewer, Digital Watermarking, eDiscovery, encryption, Enterprise Rights Management, data retention, meta-data retention, data governance

Watch Vaultize Rights Management with Secure File Sharing in Action

Posted by Gary Cooke on October 1 2015

“Vaultize delivers industry’s only Enterprise File Sharing with Enterprise Digital Rights Management (DRM) and Mobile Content Management (MCM) to help enterprises meet compliance and data governance objectives”

With the explosive growth of freely available consumer file sharing cloud services like Dropbox, many enterprises are finding out the hard way that their employees have been sharing sensitive and confidential company information, with external individuals with little or no security measures in place.  Being able to identify what information was shared and to whom it was shared may prove difficult to meet compliance, data governance objectives in times of legal or internal investigations - when such Shadow-IT exists.

Read More

Topics: Mobile Content Management (MCM), enterprise file sharing, Enterprise File Sync & Share, Dropbox Alternative, Secure FIle Sharing, enterprise digital rights management, data governance

Do You Have Substantial Evidence of Data Breaches Through File Sharing?

Posted by Gary Cooke on September 29 2015

With the explosive growth of freely available consumer file sharing services like Dropbox many companies are finding out the hard way that their employees have been sharing valuable, and often times confidential company information, with external individuals with little or no security measures in place.  Being able to identify what information was shared and to whom it was shared may prove difficult in times of legal or internal investigations when Shadow-IT exists.

Even those companies who have implemented an enterprise file sharing (Enterprise File Sync & Share – EFSS) as Dropbox alternative may find that their ability to audit and report on what information was shared with whom and when may find that these capabilities are severely lacking in their current product.

Read More

Topics: Compliance, File Sharing, enterprise file sharing, Enterprise File Sync & Share, Dropbox Alternative, endpoint data protection, Secure FIle Sharing, Shadow-IT, data retention, data governance

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics