November 20, 2017

Time to bridge MFT and Content Collaboration Platform


Gartner has stated in its recent Magic Quadrant for Content Collaboration Platforms (read the full report here) that 80% of large and midsize organizations in mature regions will have deployed one or more content collaboration platform (CCP) products.  Gartner defines CCP as a range of content-centric platforms enabling secure file productivity and content collaboration for individuals and teams as well as supporting the creation of a modern digital workplace. It is the evolution of the EFSS (Enterprise File Sharing and Synchronization) products.

Now this is not meant to be lesson on CCP and MFT but let’s step back and look at both and why there is a value in bridging the two.

CCP solutions address the use cases of people sharing and collaborating very well with other people be it within an organization and with customers, partners and suppliers.

The focused is placed on ease of use and universal access from any device, anytime, anywhere to optimize collaboration with other individuals.

On the other hand, with Managed File Transfer (MFT) solutions the use cases are driven by business processes typically between systems of record which are event and scheduled driven. Premiums are places on automation, monitoring and security. Think “locked down back office processes”. 

There is definitely a “better together” scenario if we can bridge MFT with CCP we could open up many new use cases that we have not been able to support before.

Been there, done that but failed
In particular, MFT vendors tried to include file sharing and human based file transfer use cases into their offer. They delivered Frankenstein like products that end users basically refused to use as they were not finding the simplicity they desired. Also, patterns and use cases are so different that it was also creating performance issues on the MFT side. But the intention is still valid, to achieve maximum efficiency and to address hybrid patterns within the organization, IT need to deliver MFT and CCP and expose them as consumer like services to end-users.

Solution is not replacing one with the other
Whatever solution that tried to replace other - MFT by EFSS or EFSS by MFT was just doomed to fail. Both serve a vital purpose and bridging the two properly opens the door to many new possibilities. This is the approach we have taken here at Axway. We have created a bridge between our leading Axway Syncplicity CCP solution and our leading Axway SecureTransport MFT Gateway solution. The two solutions are governed solutions and managed and controlled by IT. Doing so permits new use cases such as an application delivering files to a person or a team, and a person or team sending a file to an application. All while providing the familiar user interface the end users are already using with the benefits of secure anytime, anywhere, any device access.

Take advantage of bridging CCP and MFT 

Axway SecureTransport and Syncplicity customers can download the Syncplicity Connector for SecureTransport for free from the Axway AMPLIFY marketplace and start transforming the way their organization collaborates and innovates.

November 16, 2017

Content Collaboration Platforms: Friend or foe in protecting your content?

Syncplicity is an important ally for enterprises determined to protect their content. It can be highly sensitive content like PII – personally identifiable information. Or perhaps something less sensitive, such as public data on a website. Either way, if there’s a breach, it’s not good.

If you want your business to remain viable and competitive, security matters. But to maintain a high level of content security, experience matters. That’s where Syncplicity comes in. As a company with experience managing millions of files for our customers using our content collaboration platform, we take data protection very seriously. It’s probably why we’ve become such a valued ally to so many.

Fact is, Axway Syncplicity recently received one of the highest scores for security capability in Gartner’s Critical Capabilities Research for Content Collaboration Platforms – especially in use cases involving Centralized Content Protection. And this comes just as regulatory compliance is heating up. With Europe’s General Data Protection Regulation (GDPR) taking effect in May 2018, and directives such as PrivacyShield in the U.S., data security and content protection are top of mind for enterprises around the globe. And they’re looking to the cloud for answers.

Securing sensitive content

Keeping sensitive content secure is a big part of a company’s overall data protection strategy. With Syncplicity’s DLP integration capability, organizations are moving sensitive and confidential content to the cloud to enforce security policies. And they’re doing it by leveraging their existing DLP solution. Syncplicity integrates with top DLP solution providers, including leaders in the 2017 Gartner Magic Quadrant for Enterprise Data Loss Prevention (DLP), to give customers a seamless, reliable way to manage sensitive content – including files stored in Syncplicity. Symantec Data Loss Prevention, Digital Guardian and McAfee DLP Prevent, are some of the trusted brands Syncplicity integrates with.

How does this work? Well, organizations can now leverage their existing DLP infrastructure to detect when sensitive content is added to Syncplicity. Access to files and sharing is restricted based on DLP classification. Classification is done in the DLP engine, which identifies what is considered sensitive whether it’s personally identifiable data (PII), health records, intellectual property, or customer or partner information.

Through this integration, companies can enforce file and folder sharing restrictions based on corporate policies, allowing them to adhere to strict security and compliance regulations and requirements. For example, Sara in HR can see PII of employees in, say, the U.S., but other U.S. employees can’t. At the same time, Sara is unable to view PII associated with employees in Europe. Companies can customize policies based on region, employee type and department. And these policies are easily adjusted by approved teams using an administrative console.

Insider threats and cyber crimes

Regulatory compliance is a key reason for DLP solutions and strategies, but there are other business drivers. Insider threats and cyber crimes such as those involving ransomware jeopardize business operations and may put your organization out of compliance with regional or industry regulations. Exposure to ransomware is particularly costly because it not only affects business operations, but will also carry a stiff, 4 percent fine for breaking GDPR mandates starting in May 2018.

Syncplicity lets you track user behavior and recover files. Combine this with your existing DLP capability, and you’ll have a much more comprehensive solution – one that secures sensitive data, applies policies to that data, tracks user behavior (digital footprint) and lets you recover from internal or external content breaches.

Learn more about how we can help you protect your sensitive content with advanced data protection solutions that combine your existing DLP capabilities with Syncplicity.

To learn more about DLP, click here and to learn more about how Syncplicity provides customers with Advanced Data Protection, click here.

October 26, 2017

What’s missing from those “Millennials Are Killing dot dot dot” lists? Home Directories.

Written by Frank Murphy, Director of Strategic Sales Engineering, Syncplicity
LinkedIn Profile

A trend in popular culture today that you may have missed is to catalog the growing list of industries, services, and other business-as-usual practices that are being disrupted or even killed off at the hands of Millennials. Everything from family restaurants, doorbells to napkins are being looked at differently by an entire generation who is unafraid to challenge accepted practices. Although the targets of the disruption vary -- the common factor driving the disruption is the need for convenience, avoiding friction, and living life on the go. What happens when that same approach finds its way into your corporate file storage environment? You guessed it, even more disruption. 

As out-dated as the door bell: The Home Directory
Just as the doorbell has been a business-as-usual standard fixture on any flat, apartment or house, it's been standard practice for corporate users for decades to be provisioned a small repository of space. This space is typically carved out on a file server somewhere, that is their ‘home’. This directory comes with a logical organizing structure. Just like the buttons assigned to each occupant of an apartment building and when people arrive -- they push the buzzer.As an end user you have data you need to store, but you don’t need to share it with anyone else you put that in your home directory. That is, it’s specific function – the home of your files. It’s what you do. And you automatically get connected to that home directory through some mapping function when you first login. And just like the doorbell, you get one assigned to you whether you actually use it or not.

That's what happened to me when I first showed up as a new hire at EMC 17 years ago. Access to that home directory assumes that I was tethered to the network and able to reach it over network-based storage protocols. In 2001, it was unthinkable to get access to data remotely - "remote access" meant hopping in your car and driving to the office to get to your files.

A new normal: always-on connectedness
Fast forward to today, and it’s a different world. Remote access means I have to always connect to VPN to get map a drive letter.  Who needs that? A mobile tablet or phone or similar device doesn't know what a mapped drive leter is. Syncplicity users have access to all their files all the time. In my case, that access is spread out across five or six different devices. My data is tethered to me, not me tethered to the network to get to my data.

Disrupting the home directory: not just for Millenneals
Although the gray hair in my current badge photo disqualifies me as a millenneal, the same benefit of convenience and reduction of friction is where Syncplicity excels. Plus, not being able to connect to the network, or to any wifi signal brings on feelings of anxiety and FOMO (fear of missing out). In my case the fear isn't missing out on someone's Instagram post or Snap Chat -- it’s the fear of missing a customer request, a sales order or anything else I collaborate on throughout the day. The millennial thinking is: why surprise your host with a loud and disturbing buzzing sound when you can send them a text before you arrive? Avoids the hassle. That hassle avoidance motivation also drives users to keep their data as close as the phone in their pocket. That drive for convenience drives users to take matters into their own hands, or their own pockets, and causes a major challenge for data security and governance through Shadow IT Syncplicity can help avoid that friction and hassle of being tethered to the network when we live in a fundamentally untethered and wireless world. For those rare moments you find yourself off-line, you're still not completely disconnected with the ability your favorite files on your mobile device, or use favoriting on SyncDrive if your users only have a laptop and still need a mapped drive letter experience.

Ding Dong: Distupt or be distupted
Migrating legacy home directories into Syncplicity using DataHub, decomissioning or repurposing that NAS capacity while also replacing the home directory with SyncDrive, is the best of both worlds. It It marries the convenience of.... of access anywhere, with the ability to store data in the Syncplicity Cloud, in the cloud of your choice like AWS or Azure, and/or in an on premises StorageVault.

Learn more about SyncDrive and DataHub here.

September 28, 2017

GDPR overexposes shadow IT

By Jean-Claude Bellando

Cloud computing paves the way for shadow IT
Shadow IT is described as IT solutions used within a company without organizational approval. It’s the IT activity that takes place in the shadows without the usual security and control requirements on data placed under the responsibility of the company.

Shadow IT predates the cloud when many employees downloaded and installed their own software to achieve tasks. Since cloud solutions come with an easy-to-consume (starting with freemium account) and easy-to-use paradigm, the potential lack of control is astounding. Symantec states that "organizations use 20 times more cloud apps than they think."1 Corporate IT security professionals estimate they have 30 to 40 apps in the cloud, when the reality is a staggering 928 apps.

Shadow IT does not meet security requirements
The main reason shadow IT emerged was usability and price. Security is still not considered by end users and is often seen as a constraint. As a consequence, "only 8.1% of cloud services meet enterprise security and compliance requirements,"2 states a recent Skyhigh networks report.

Shadow IT: the digital workplace and CCPs
In addition to a focus on the digital workplace, shadow IT also relies on Content Collaboration Platforms (CCP) as defined by Gartner in a recent Magic Quadrant report. “Of the 1,427 cloud services used by the average company, 342 are related to collaboration, file sharing, content sharing”2 (Skyhigh networks report). In addition, “25% of all files shared in the cloud are broadly shared” 1 (Symantec). According to Symantec, this shared data contains personal data for “3% of those shared files contains current compliance related data (PCI, PII, PHI)”1.

The digital workplace in a GDPR perspective
The European Union’s new GDPR (General Data Protection Regulation) is a game-changing regulation that will bring a new focus to shadow IT for any company doing business in Europe. When the rules take effect in May 2018, the GDPR will require:

  • A focus on shared data, not only broadly shared data
  • A focus on all personal data (anything that identifies someone), not just PCI, PII, or PHI
  • Reports of personal data leaks within 72 hours
  • A stronger assessment and monitoring of the conditions of data transfer between entities and across boundaries
  • More rigorous sanctions that can impact a company’s reputation and bottom-line:
    • A GDPR violation can generate a penalty up to 4% of the global revenue of the companies involved in the data processing
    • This is on top of any damages done to individuals
    • A company’s image or brand can be severely damaged

What to do now?
No one can stop the move to GDPR. It’s time to standardize existing EFSS solutions into one that:

  • Offers GDPR-aware features (privacy by design)
  • Provides the company DPO (Data Protection Officer) with the necessary control of all data, including location of data
  • Provides the user’s expected features and usability, securely, protecting them and their organization
  • Delivers expected IT security features, like granular-group based policies, remove wipe and others that protect the user, while also giving the freedom they require to do their jobs

Besides GDPR compliance, there are other immediate rewards to standardizing on an industry leading, secure solution such as reduced costs and easier collaboration for all employees. GDPR is coming, and it’s coming fast. If your organization is guilty of a lot of shadow IT, take the time to get your IT business in order. Your company’s image, revenue, and data will thank you.

To learn more about Axway Syncplicity and how we help you compose a secure digital workplace:  Modernize Your IT Infrastructure or Innovative User Experiences.

[1] Symantec: 2H 2016 Shadow Data Report
[2] Skyhigh networks report: Cloud adoption risk report Q4 2016 

June 30, 2017   |   by Kristie Conner

Play ball with Syncplicity by Axway and win

Did you know Major League Baseball (MLB) uses Syncplicity by Axway to power their digital transformation? It’s a great story about how MLB is driving engagement, making it easier for users including baseball scouts to access and share data, securely. So we asked Dan Gainey of MLB to tell us all about it in a webinar to be held July 19. You should be there.

If you’ve never heard Dan speak – or even if you have – you’re in for a treat. Just ask anyone who attended IMAGINE SUMMIT 2017 in Atlanta, or who packed the house at Gartner IT Expo last year. The webinar happens soon after the MLB All-Star Game, so Dan will surely have stories to share about how Syncplicity by Axway helped the league streamline internal collaboration across one of their major events.

Dan Gainey weaves in key themes of digital transformation that impact the digital workplace.  If you’re in IT, or manage collaboration, mobility or security, this webinar will provide you with vital insight providing a 360-degree view of what digital transformation looks like across critical groups and the business impact.

To register click here.

Learn how Axway Syncplicity can help you Modernize Your IT Infrastructure or create Innovative User Experiences.

February 13, 2017   |   by Brian W Levine

Axway Syncplicity delivers Privacy and Data Protection by Design

By Brian W. Levine, Security and Compliance Officer

As RSA 2017 kicks off, it’s exciting to look out at today’s security and privacy horizon and see how Syncplicity by Axway is uniquely positioned to help enterprises meet the most critical challenges in data protection and digital workplace transformation.

It’s almost a cliché to state that we have seen tectonic shifts in global privacy and security over the last 18 months (but I’ll recap anyway). Consider the rise of IoT botnets crippling the internet, corporations held hostage by crypto-ransomware, and nation-state hacks targeting US elections. In the privacy realm, the US-EU Safe Harbor treaty for data transfer was thrown out and its upgrade, EU-US Privacy Shield, stands on trial to decide if it will face a similar dismissal. Further, the EU-GDPR go-live date looms, and companies slow to adapt will be sure to find themselves in a courtroom facing fines starting at the entry-price of 20 Million Euros per violation. Deep breath, yes these are interesting times.

While cyberattacks increase and data protection laws are in flux, one thing is certain; a proactive transformation strategy which places user privacy and the protection of company data at the foundation is the clear route through the shifting landscape. Leading with these principles, Syncplicity by Axway has developed innovative solutions to meet these challenges, while enabling digital transformation and empowering your mobile workforce. 

For our customers, the concepts of data protection by default and privacy by design mean that we place confidentiality and privacy of personal information and company data as primary requirements. Here are examples of how this design objective is embedded into our products and processes:  

  • While the physical location of data has become an increasing concern, Axway Syncplicity hybrid cloud architecture offers multiple options to address data sovereignty. Customers choose where to host their file storage - on-premises, in a private cloud, or in one of  Axway Syncplicity's regional public clouds. Policy-driven storage allows multiple storage locations to be defined within a single tenant account, meaning users have a seamless sharing experience while the back-end infrastructure complies with global data protection concerns.
  • In 2016, we launched  Axway Syncplicity PrivacyRegions, an innovative solution which ensures personal information and company meta-data is stored and processed only in the local PrivacyRegion, and is not subject to cross-border data transfer regulations. The additional protection comes at no cost to the user experience; users can still seamlessly share files with trusted recipients in any geographic region.
  • Fears of government action and potential ‘back doors’ in technology products have sparked a fever pitch of scrutiny and will continue to be debated topics in this environment. StorageVault Authentication is a patented security control that ensures it’s technically and physically impossible for  Axway Syncplicity to provide third-party access to customer data, as well as restricts insiders from any unauthorized access. This zero content knowledge approach ensures compliance with the most secure data processing and confidentiality requirements.
  • Visibility and transparency is critical and we provide compliance certifications and audit reports for all our systems, processes, and data-centers. We have partnered with TRUSTe to validate our privacy practices and certify our commitment to privacy protection, choice, and accountability.
  • Enterprises need to be proactive, not reactive, to ensure confidentiality and prevent data leakage before it becomes an issue. Our rich set of group-based policies and access controls allow companies to set the right level of data protection based on a user’s specific profile.
  • End-to-end security controls like  Axway Syncplicity's Secure Shared Files applies an encrypted rights management container around documents, so that when files are sent externally, they remain protected and the enterprise maintains ownership of encryption keys.
  • Customers should not have to choose between security, privacy, and a great end-user experience. As we know, if you impede user productivity, users will find their own insecure alternatives.  Axway Syncplicity's clients and Web apps are designed to enable frictionless productivity and collaboration without compromising on security and privacy.
  • On every project, our developers perform an impact analysis to evaluate potential security and privacy issues before writing a single line of code. We use multiple third-party security teams to penetration test our systems using a variety of attack vectors and techniques. 

 Axway Syncplicity has committed to delivering the highest levels of security, data governance, and privacy available in the file sync and share market, and we continually engage with our customers, R&D, and support teams to unlock new use cases for user productivity and enterprise transformation.

We welcome the challenges of 2017 and beyond and are passionate in our belief that we offer a unique value proposition to address today’s secure file sharing requirements. We look forward to engaging with you at the RSA Conference to demonstrate first-hand how we empower the digital workplace and modernize IT infrastructure while maintaining the highest levels of data protection and privacy.

P.S. Be sure to stop by our booth #N4243 to learn more and also receive a coffee mug with a #hashtag you will find interesting, and as always we welcome your thoughts and comments @Syncplicity by Axway @BrianLevinePM

Find out how we can help you Modernize Your IT Infrastructure or view our solution brief outlining how we can help you protect your data.

January 26, 2017   |   by Brian W Levine

Why All Companies Should Have a Ransomware Recovery Plan

Cyber criminals are not only becoming more and more sophisticated but also bolder. The most insidious computer crime today doesn’t involve viruses or stealing credit card numbers. Instead, it comes in the form of ransomware – rogue programs that hold an entire organization’s data hostage with unbreakable encryption and demand a ransom for the decryption key.

These attacks are becoming increasingly common. In 2015, there were 2,453 reported ransomware incidents, in which victims paid about $24.1 million, according to the FBI. Security researchers found that the number of users who came across crypto ransomware in the last year increased by more than 500 percent from the previous year.

In the past few months alone, new and more powerful ransomware has appeared, with criminals targeting sensitive entities like healthcare facilities. For example, MedStar Health, a major healthcare provider in the Washington, D.C., region, was forced to disable its network for several days after a ransomware attack early this year, while Hollywood Presbyterian Medical Center in Los Angeles, California, paid $17,000 in response to an attack in February.

Ransomware is flourishing for two basic reasons.

First, it’s simple economics. Rather than dealing with the trouble and risk involved in stealing credit card files and peddling them on the black market, criminals using ransomware can simply sit back and wait for the victims to pay. Of course, the criminals don’t always send the decryption key in return – these are thieves, after all.

The second reason is that a ransomware attack is incredibly difficult to prevent. It only takes a single click within an email or on a website for an unsuspecting employee to activate the code that encrypts an entire system and triggers a ransom demand. Even if an enterprise has the most updated anti-virus software or access restrictions on sensitive files, it remains vulnerable to ransomware via just one unsuspecting user.

While it’s difficult for an enterprise to feel completely confident in preventing a ransomware attack, it can take steps to mitigate the effects of this new and destructive type of malware – and recover normal operations in minutes or hours – if the proper precautions and recovery plans are in place.

The most important recovery element is real-time protection of data, which means backup copies of all files and data are stored securely in the cloud rather than local desktops. To be most effective, this needs to be accomplished automatically, with a copy being synced up to the cloud every time a file is edited or saved. These backups let a business “roll back” to the moments before a ransomware attack and recover all its files – even in cases where the ransomware has affected large numbers of users within the organization.

It’s also important that the software or service you use to create these backups is capable of excluding the kinds of encryption files known to be associated with ransomware – so you don’t wind up restoring the very files that created the problem in the first place.

Finally, businesses must establish a retention policy. Whether you choose to retain deleted files forever or for a specified time period, a retention policy will allow your original files to be retrieved after they are deleted or encrypted by ransomware. This is a critical part of a recovery plan as it can allow files to be restored quickly and won’t hold you back with a time-consuming and expensive recovery process.

Cybercriminals are an unfortunate reality in today’s marketplace, and it’s easy to fall victim if you’re unprepared. By being aware and maintaining the right backup strategy, however, your company can minimize the damage from these attacks and turn the tables on this latest generation of attackers.

Read our 8 Tips for Ransomware Recovery & Prevention, click here

Brian Levine is Senior Director of Security of Cloudr Security

December 21, 2016   |   by Kristie Conner

SyncDrive: Size Does Not Matter

SyncDrive: Size Does Not Matter

The amount of unstructured data in home directories, group shares and network drives across the enterprise is staggering and the overall amount of information is growing exponentially as the world becomes more digital. The reality is that we are just at the beginning – the volume of data is exploding, more data has been created in the past two years than in the entire history of the human race. That is a lot of data – and it begs the question: what do we do with that data, and exactly how do knowledge workers access it?

Syncplicity by Axwayhas an answer – SyncDrive. While we might not be solving all your unstructured data needs (okay, 90% of them), if you choose Axway Syncplicity we can help you untangle your home directories and group shares and at the same time modernize your file storage infrastructure – along with providing access to all your data via the desktop, laptop and mobile devices. Imagine, being able to give your enterprise users VPN-less access to all their enterprise content from any device, where data size does not matter. 

Now, imagine being a user and, never having to worry (again) about having enough space on your device or maneuvering and moving files so you have just the right ones when you need them. SyncDrive redefines how users work with large volumes of data across the enterprise. Users can selectively sync the files they need, and the intelligent cache feature ensures they never need to worry about running out of storage.

SyncDrive is a revolutionary feature that will have an immediate impact on the user and IT. What about the value to the overall enterprise? For a typical Fortune 1,000 company, just a 10 percent increase in data accessibility will result in more than $65 million additional net income. With SyncDrive, we make this possible.

This new SyncDrive feature is now available and extends our digital transformation lead by enabling enterprises to modernize their IT infrastructure and access petabytes of data stored in legacy file shares.”

Find out how SyncDrive can improve your business agility, click here.

December 19, 2016   |   by Kristie Conner

Axway Syncplicity PrivacyRegions Answers Data Protection Requirements

Axway Syncplicity PrivacyRegions Answers Data Protection Requirements

Syncplicity by Axway is raising the technology architecture bar with a new EFSS innovation that ensures corporate compliance without getting in the way of user productivity. Axway Syncplicity PrivacyRegions allows companies to remain compliant with region-specific data protection and residency regulations while still allowing their users to seamlessly share folders and files with users and companies based in other regions. Personal information (PII) and corporate meta-data is never processed or stored in other regions.

Axway Syncplicity PrivacyRegions uniquely combines regional cloud services, policy-driven hybrid cloud storage and a new privacy driven architecture. Today, we’re pleased to announce that Syncplicity by Axway European Union (EU) PrivacyRegion is generally available. This design enables EU-based enterprises to confine the storage and processing of all their files, meta-data, and personal information to the EU region. 

Seamless User Experience

Syncplicity by Axway is the only EFSS provider to offer regional cloud services that do not restrict user sharing. We allow users to seamlessly collaborate across regions with a single account, while maintaining all the information—including meta-data—within a designated region. For example, with Syncplicity by Axway, an enterprise’s storage and control plane can be in Europe. Other EFSS vendors allow customers to choose a geographic zone for file storage, but they process and store all meta-data, such as filenames, PII, and significant indexing of regional files’ content in U.S.-based cloud services. By contrast, Syncplicity by Axway PrivacyRegions segregates a company’s meta-data, PII and file storage to its chosen region. For example, customers who choose Syncplicity by Axway EU PrivacyRegion are assured all of their information is kept within Europe.

Syncplicity by Axway is the first vendor to provide regional cloud services allowing users to seamlessly collaborate across regions without requiring multiple user accounts for each region. Syncplicity by Axway’s solution is unique in segregating all data to specific regions, while still providing users ‘a single-pane-of-glass’ experience and seamless collaboration across regions.

Syncplicity by Axway's release of PrivacyRegions builds upon a long-standing posture of data privacy compliance. Our ‘data protection by default’ strategy provides a flexible architecture with the necessary granular privacy, confidentially and data sovereignty controls built-in, giving our customers the right tools to adapt to evolving regional legislation and business requirements across the enterprise.

To learn more about how Syncplicity by Axway ensures compliance with global privacy and security regulations, please click here.  To learn how you can securely compose a digital workplace, click here.

December 6, 2016

Hybride Speicher und Datenschutz: So sorgen Sie für Compliance

Mit Big Data und dem Internet of Things kommen auf klassische Storage-Architekturen neue Aufgaben zu, denen sie immer weniger gerecht werden können – sie sind oft zu starr und unflexibel. Ein Ausweg könnte Enterprise File Sync & Share (EFSS) sein, das vorhandene und neue Speicher zu hybriden Strukturen zusammenführt. Wo liegen die Stärken eines EFSS-Systems und welche Faktoren insbesondere im Datenschutz spielen eine besondere Rolle? Lesen Sie dazu mehr in diesem Artikel.

Nicht alle Daten müssen in die Cloud. Bei einigen ergibt dies jedoch durchaus Sinn. EFSS hilft bei der Umsetzung.

Weltweit nehmen die Datenmengen durch Big Data oder Internet of Things zu. Bisherige Ansätze wie die exklusive Speicherung von Daten auf eigene Storage-Strukturen bedienen oftmals die neuen Anforderungen nur noch unzureichend. Besonderer Flaschenhals kann dabei das klassische Storage-Management werden. Ein Ende dieser Entwicklung ist bei einem globalen Gesamtdatenvolumen von 8,5 Zettabyte kaum absehbar – bis zum Jahr 2020 erwarten Marktforscher eine Steigerung auf 40 Zettabyte.

In Deutschland kommen zu dieser Entwicklung darüber hinaus auch noch verschiedene Auflagen des Datenschutzes hinzu. Wegen dieser besonderen Ausgangslage können Unternehmen nicht einfach den günstigsten Cloud-Storage-Anbieter wählen, sondern müssen explizit die Vereinbarkeit der einzelnen Lösungen mit den jeweils geltenden Vorschriften abgleichen.

Weltweit nehmen die Datenmengen durch Big Data oder Internet of Things zu. Bisherige Ansätze wie die exklusive Speicherung von Daten auf eigene Storage-Strukturen bedienen oftmals die neuen Anforderungen nur noch unzureichend. Besonderer Flaschenhals kann dabei das klassische Storage-Management werden. Ein Ende dieser Entwicklung ist bei einem globalen Gesamtdatenvolumen von 8,5 Zettabyte kaum absehbar – bis zum Jahr 2020 erwarten Marktforscher eine Steigerung auf 40 Zettabyte.

In Deutschland kommen zu dieser Entwicklung darüber hinaus auch noch verschiedene Auflagen des Datenschutzes hinzu. Wegen dieser besonderen Ausgangslage können Unternehmen nicht einfach den günstigsten Cloud-Storage-Anbieter wählen, sondern müssen explizit die Vereinbarkeit der einzelnen Lösungen mit den jeweils geltenden Vorschriften abgleichen.

Bei der Wahl zwischen Cloud- und On-Premise-Storage stehen Entscheider vor einem Dilemma. Während lokale Strukturen rasch an die Grenzen der eigenen Kapazität stoßen können, fehlt bei Cloud-Angeboten die Nachvollziehbarkeit des konkreten Speicherorts der manchmal unternehmenskritischen Daten. Die Nachvollziehbarkeit der Ablage ist allerdings je nach Branche und Art der Daten aufgrund von staatlichen oder unternehmensinternen Regularien erforderlich. Deswegen kommen hier Cloud-Anbieter mit Speicherorten außerhalb der Europäischen Union, beispielsweise US-Provider, nicht in Frage.

Flexibilität und Sicherheit
Die Frage, ob bei der Datenspeicherung mehr Flexibilität oder mehr Sicherheit gewünscht wird, lässt sich auf einfache Weise beantworten: beides, denn beides ist für die Unternehmen von zentraler Bedeutung. Der Ansatz, um hier die Bedürfnisse der Kunden erfolgreich zu adressieren, heißt Enterprise File Sync & Share (EFSS). Mit EFSS sind die Vorteile beider Welten verfügbar. Hier können weniger sensible Daten in die Cloud wandern, die automatisch mit den Anforderungen mitwächst. Unternehmenskritische Daten hingegen sind auf lokalen Strukturen besser aufgehoben. Mit einer Policy Engine, wie sie beispielsweise Syncplicity by Axway anbietet, können Administratoren Richtlinien zur Behandlung verschiedener Datentypen festlegen.

Bei global agierenden Unternehmen lassen sich Daten so automatisch auf den Servern oder Cloud-Diensten der einzelnen Regionen speichern, während sie den länderübergreifenden Arbeitsgruppen zur Verfügung stehen. Der Unterschied zum klassischen Administrationsansatz, bei dem dies prinzipiell auch zu bewerkstelligen ist, ist die Automation sowie der bessere Überblick über die vorhandenen Daten. Nebenbei umgehen Unternehmen so auch überflüssige Redundanzen. Ein Aspekt der bei der gesetzeskonformen Speicherung gerne übersehen wird, sind die Meta-Daten. Falls die originären Daten gesetzeskonform zwar in der EU liegen, ist in vielen Fällen ausländischen Behörden ein Rückschluss auf die Unternehmensaktivitäten durch die Auswertung der Metadaten möglich. Im Idealfall regelt eine Policy Engine mittels der PrivacyRegions die korrekte Distribution dieser speziellen Daten gleich mit.

Seite 2 - Hybride Speicher und Datenschutz: So sorgen Sie für Compliance

Daneben können Unternehmen mit einem EFSS-System flexibler auf veränderte Datenvolumen reagieren. Hier lassen sich weniger kritische Daten temporär von On-Premise auf die Cloud auslagern, ohne dass versehentlich kritische Informationen mitwandern. Eine EFSS-Lösung weist dabei den Speicherort gemäß den vorab definierten Policies automatisch zu. Damit bietet EFSS eine skalierbarere Umgebung als klassische Speicherlösungen.

Alleine schon aus rechtlichen Gründen ist die Nutzung eines EFSS-Systems bei komplexeren Problemstellungen ratsam, denn die gleichzeitige Nutzung von Cloud-Storage und lokalen Speichern könnte ohne eine gemeinsame Einbettung in ein Managementsystem dazu führen, dass klassifizierte Daten an einem ungeeigneten Standort gesichert werden. So haben beispielsweise Personal- und Gehaltsdaten nichts auf einem Cloud-Speicher zu suchen, dessen Sicherheitsmaßnahmen durch den Provider nicht abschließend geklärt werden konnten.

Organisatorische Erleichterung durch EFSS
Jedoch hilft eine EFSS-Lösung auch dabei, die Organisation in der IT zu vereinfachen. So fällt bereits einiges an Aufwand alleine dadurch weg, dass nicht jede Speicherplattform für sich organisiert werden muss. Speicher- und Synchronisationszugriffe erfolgen unter einem Dach. Dadurch werden auch mehrere in verschiedenen Versionen gespeicherten Daten vereint. Ein konsolidierter Datenstand steht auf diese Weise zur Verfügung.

Nicht zuletzt ergeben sich Einsparpotentiale, denn die dynamische und Policy-gestützte Datenverteilung hilft, die Strukturen schlank zu halten und die Bereitstellung überflüssiger Ressourcen zu vermeiden. Dies ist bei der Nutzung von Cloud-Storage auch möglich, doch nur zu dem Preis der mangelnden Einflussnahme auf die Verteilung der Daten. Dies gilt natürlich auch für einen Filialbetrieb, bei dem die Vorhaltung lokaler IT vollkommen reduziert werden kann.

Arbeitswelt im Wandel
Mit der zunehmenden Nutzung eigener Endgeräte oder flexibleren Arbeitsmodellen wie dem Home Office stellt sich für die Unternehmens-IT die Frage, wie mit Daten auch in Hinblick auf eine unternehmensferne oder dezentrale Nutzung zu verfahren ist. Informationen stehen hier in nicht kontrollierten Raum zur Verfügung und die Gefahr eines Datendiebstahls steht permanent im Raum. Aus diesem Grund sollte ein ausgeklügeltes Synchronisationsmanagement die Dateien zur Verfügung stellen, die für die Bearbeitung von Geschäftsprozessen unbedingt erforderlich sind. Auch hier stellt ein EFSS-System sicher, dass der Zugriff entweder zeitlich oder auf Geräteebene begrenzt gewährt wird, damit unternehmenskritische Informationen an ihrem vorgeschriebenen Ort verbleiben.

Mehr Schutz vor Ransomware
Der Albtraum eines jeden Administrators ist es, wenn sich die Rechner der Nutzer mit einer Verschlüsselungs-Schadware infizieren. Selbst nach der Zahlung eines Lösegelds an den Cyberkriminellen, der die Ransomware entwickelt hat, ist der Zugriff auf die Daten keinesfalls garantiert. Die EFSS-Lösung von Syncplicity by Axway etwa bietet hier einen guten Schutz. Durch das Storage-Management werden Daten permanent in verschiedenen Generationen gesichert, sodass eine Restaurierung wichtiger Informationen jederzeit möglich ist.

Im Gegensatz zu herkömmlichen Cloud-Synchronisationen kommt hier nicht nur ein "magischer Ordner" zum Einsatz, bei dem die Verschlüsselung durchsynchronisiert wird, sondern mehrere. Diese lassen sich dann voneinander isoliert behandeln. Damit minimiert sich das Risiko, dass alle Datenbereiche unbrauchbar werden. Außerdem stellt EFSS sicher, dass riskante Dateitypen von der Synchronisation ausgenommen werden. Ferner können bei Nutzung der Share-Funktion Mailanhänge seltener verwendet werden, was auch hier du einer Verringerung des Risikos führt. Sollte der Worst Case allerdings eingetreten sein, erstellt EFSS einen Recovery Plan, nach dem sich die befallenen Dateien sukzessive rasch wiederherstellen lassen.

Herkömmliche Storage-Architekturen sie sind oft zu starr und unflexibel. Ein Ausweg könnte Enterprise File Sync & Share bieten, das vor allem beim Datenschutz seine Stärken ausspielt und es vermag, vorhandene und neue Speicher zu hybriden Strukturen zusammenzuführen.

Read original article here.

< Older

The Syncplicity by Axway Team Authors

Brian W Levine

Sr. Director of Security and Compliance All by this author >

Kristie Conner

Principal Product Marketing Manager All by this author >

DemoSee How it Works

Call Sales1-888-908-4276
or We'll Call You

Live Chat

Thank you.
Our team will contact you soon!