Don't Sit On Your Security Problem - Do Something About It

Posted by Ankur Panchbudhe on October 6 2016

I meet a lot of managers and executives at organizations around the world who aren’t sure if their organization’s data is really secure or not. Many of them know their employees are using consumer-grade file sharing platforms every single day and sending unencrypted email attachments, but they often assume that the developers of the consumer-grade products – Dropbox, Google, etc. – are somehow protecting their data from breaches and leaks. They’re in essence setting their organization up for a big, expensive mess.

It’s easy to believe that as we work in today’s always on, always connected world, we are for the most part safe from cybersecurity threats that we read about in the news. But the truth is that we and the companies that we work at are not. Data leaks, breaches and thefts are, frankly, inevitable if proper precautions are not taken. And they often come as results not of malicious hackers bypassing network security but of mistakes made by employees in dispersing or sharing sensitive information or of intentional leakage and theft by disgruntled workers.

Read More

Topics: File Sharing, Information Security, file security, vDRM, DRM

How to Solve Shadow-IT for File Sharing Without Compromising Compliance and Governance Objectives

Posted by Anand Kekre on November 3 2015

Shadow IT is becoming a serious risk for businesses and a pervasive problem for IT leaders resulting in not only huge cost endurances for the company but also in serious threats of security, data leakage and (most importantly) compliance risks. The shadow IT in enterprises has significantly increased over last few years because of proliferation of freely available cloud services (like Dropbox) and mobile applications.

If you ever discover Shadow-IT in your organization, the best way to handle it is not by giving a knee-jerk reaction and banning it outright, but understanding the end-user needs and provide them an alternative.

Read More

Topics: Mobile Content Management (MCM), Compliance, File Sharing, BYOD, Enterprise File Sync & Share, FTP Replacement, Dropbox Alternative, endpoint data protection, Secure FIle Sharing, enterprise digital rights management, Shadow-IT, VPN-free access, Outlook Plugin, IBM lotus notes, data governance, data leakage

Do You Have Substantial Evidence of Data Breaches Through File Sharing?

Posted by Gary Cooke on September 29 2015

With the explosive growth of freely available consumer file sharing services like Dropbox many companies are finding out the hard way that their employees have been sharing valuable, and often times confidential company information, with external individuals with little or no security measures in place.  Being able to identify what information was shared and to whom it was shared may prove difficult in times of legal or internal investigations when Shadow-IT exists.

Even those companies who have implemented an enterprise file sharing (Enterprise File Sync & Share – EFSS) as Dropbox alternative may find that their ability to audit and report on what information was shared with whom and when may find that these capabilities are severely lacking in their current product.

Read More

Topics: Compliance, File Sharing, enterprise file sharing, Enterprise File Sync & Share, Dropbox Alternative, endpoint data protection, Secure FIle Sharing, Shadow-IT, data retention, data governance

Vaultize File Sharing for Distributing Premier League Coverage

Posted by Sameer Vitkar on August 24 2015

The second season of premier league of indigenous Indian sport of Kabaddi, just finished. It gathered over 22 million eyeballs on the opening night of the inaugural season, and ultimately credited with an all India cumulative viewership reach of 435 million, making it the second most watched sporting event in India after Cricket. With millions of viewers watching at home and thousands of supporters jamming the stadia, the league witnessed the emergence of new sporting heroes of India.

Read More

Topics: Customer Success, File Sharing, Enterprise File Sync & Share, FTP Replacement, enterprise file security

5 Ways to Prevent Accidental Data Leakage and Ensure Enterprise File Security

Posted by Anand Kekre on August 4 2015

Data leakage poses a serious problem for organizations as the number of incidents and associated financial loss continue to grow significantly. Over the last few years, companies across industry verticals around the world have experienced their sensitive data being lost, stolen or leaked to the outside world. Many of the high-profile incidents have even caused direct or indirect damage to the tune of millions of dollars, while others have ended up in loss of reputation and brand-image.

Some of the incidents were caused by external threats (hackers) while others were because of internal users. Out of those that resulted because of internal users or trusted third parties, vast majority were inadvertent. Unintentional leakage of data by internal users who have access to critical, restricted or confidential information can put companies at huge risk, and could have been avoided if precautions were taken proactively.

Read More

Topics: File Sharing, file security, data leakage prevenation

Vaultize Granted a US Patent for its Vault KNOX File Security

Posted by Sameer Vitkar on July 28 2015

The US Patent and Trademark Office (USPTO) formally granted a patent (No. 9,086,819) to Vaultize. This patent is about System and Method for combining encryption and de-duplication of data and is core to Vault KNOX Security built into Vaultize’s enterprise file security platform. The patent grant endorses our claim that Vaultize is the most secure and most efficient enterprise file sync and share (EFSS) and mobile collaboration solution in the world.


Read More

Topics: Announcements, File Sharing, file security, BYOD, Patent

No Need to Worry About Growing Exchange Storage Cost

Posted by Anand Kekre on July 21 2015

Exchange storage cost has been a hot topic of discussion over last many years in IT community. Often times, IT administrators report the size of Exchange storage growing abnormally. Microsoft introduced Single Instance Storage (SIS) in version 4.0 to de-duplicate data and reduce the storage requirement, but later dropped it in version 2010. This in effect increased the storage by 20% to 50% when enterprises migrated to Exchange 2010.

Read More

Topics: Digital Rights Management (DRM), Outlook, File Sharing, file security

Security Mistakes to Avoid in Virtual Desktop (VDI) Implementation

Posted by Anand Kekre on July 13 2015

Virtual Desktop Infrastructure, or VDI, is a technology that presents desktops or individually entitled applications from a central management server to remote users’ browser-enabled devices over the Internet, so that people have secure access to corporate data on individual’s own devices – enabling Bring-Your-Own-Device (BYOD). Virtualization technologies of VMware, Citrix and Microsoft are the leading solutions in this space.

VDI comes with advantages of virtualizations - flexibility, productivity, ease of use and the ability to support multiple platforms. It, to certain extent ensures security, end-user privacy, monitoring (knowing who is accessing what and from where) and auditing of virtualized resources (desktops and applications). But what happens to file security of corporate data being used by end-users on these virtualized resources. Is it protected from security risks and data loss events? Without a file security mechanism in place, people would still adopt the traditional means (like email and FTP) for sharing the most important corporate asset – files. Also, the use of consumer services like Dropbox cannot be ruled out as your end-users may be running what is called shadow-IT. Hence, though you think that the environment is protected, there are communication channels that may pose serious risks to corporate data.

Read More

Topics: Digital Rights Management (DRM), Compliance, File Sharing, Citrix, file security, BYOD

7 Secrets of Successful Enterprise File Security Every CIO Should Know

Posted by Anand Kekre on July 7 2015

A few years back corporate files were restricted only to laptops and desktops for end-user consumption. Today mobile devices are multiplying at a rate five times than humans. And, mobile devices - company-provided as well as personally-owned (Bring-your-own-device – BYOD) - are increasingly being used by employees for office work. As a result, information security dynamics in enterprises have changed significantly.

Read More

Topics: Mobile Content Management (MCM), Digital Rights Management (DRM), Compliance, File Sharing, file security, BYOD

5 Most Common File Security Mistakes

Posted by Anand Kekre on May 28 2015

With the rise in workforce mobility, rapid advance of consumerization, BYOD trends and the increasing need to satisfy regulatory, privacy and confidentiality requirements, companies are realizing the need for investing in file security.

Many IT managers/CIO/CISO think that just deploying enterprise digital rights management (DRM aka Information Rights Management or IRM), Data Loss Prevention (DLP), Mobile Device Management (MDM) or Data Protection solutions are enough and their responsibility ends there. Although standalone DRM, DLP and MDM have been of immense value, they just remain as check-boxes on paper - without widespread corporate adoption and acceptance. A well-thought approach to file security makes a big difference in the way that organizations do business, meet compliance requirements, ensure privacy, and protect the digital assets of the company – and, in the era of consumerization, allow end-users to be more productive and efficient.

Read More

Topics: Data Protection, Mobile Content Management (MCM), Digital Rights Management (DRM), File Sharing, Information Security, Mobility (EMM), Thought Leadership, file security

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics