April 11, 2018 | by Kristie Conner
The changing face of Enterprise File Sync and Share
The content collaboration platform (CCP) market, formerly enterprise file sync and share, is going through a period of rapid transformation. CCP is a key building block for digital transformation as enterprises look to modernize their infrastructure to power a modern, digital workplace. Some, CCP solutions are providing enterprises with a path to modernize their infrastructure and realize the productivity benefits of a secure mobile, digital workforce while ensuring data is stored securely and in line with changing data protection regulations. True digital transformation requires unlocking unstructured data from within legacy infrastructure – home directories, group shares and making it easily accessible to enterprise users from any device, anywhere while offering security and a feature rich CCP solution.
For CCP solutions to truly enable digital transformation – businesses need to understand their infrastructure and security requirements and then map to the right CCP solution. Whether from an application or infrastructure perspective, CCP solutions will need to adapt to ensure their place as strategic and competitive tool for today’s businesses.
The Digital Workplace
As businesses look to capitalise on the productivity benefits of modern technologies a key trend has been mobility and BYOD. CCP vendors continues to prioritise the “anytime anywhere” working model, enabling the digital workplace while giving senior-level executives peace of mind around security and governance. CCP providers that specialise in hybrid options allow businesses to easily align their data storage with their business needs – whether on premises, in the cloud, a private cloud or a combination of the three.
The digital worker requires seamless access to content “anytime anywhere” on any device regardless of where it resides in the enterprise, but they also require integration with popular user productivity tools like Microsoft Office 365. Modern EFSS providers are not only providing the infrastructure for secure mobile access, but collaboration functionality that improves productivity.
Additionally, as cloud solutions play an increasingly large role, a progressive CCP solution will need to ensure that enterprises maintain flexibility, something that can be achieved through hybrid cloud solutions. Not all data is created equal and large, global corporations need the flexibility that comes with a hybrid cloud offering, allowing them to customize their environment, combining public or private cloud and on premise, without sacrificing usability.
An Infrastructure for Tomorrow – Security, Compliance and Data Protection
With uncertainty still surrounding data protection and compliance enterprises are operating in an increasingly complex environment. One such example is Privacy Shield that was recently approved to replace Safe Harbour. The one certainty is that businesses operating within Europe need to have a fine-grained understanding of what data they are collecting and the geographical regulations that apply to that data. To achieve this -- business are changing the way they evaluate new technology such as cloud, and how which their data is accessed and shared.
CCP can provide an answer. By providing a consolidated modern storage platform, CCP addresses the issues of distributed, costly and insecure legacy storage solutions, delivering a secure and compliant way to manage and store data. CCP solutions which enable infrastructure modernisation will also support enterprises in meeting the most stringent security, governance and IT administration requirements and avoiding costly fines for non-compliance.
And it’s not just being compliant that companies need to worry about. As more global enterprises become victims to ransomware attacks and business leaders become increasingly nervous, EFSS providers can support organisations with real-time backup, multi-folder sync features, retention policies and recovery plans.
The CCP market is evolving to address an increasing number of business requirements to improve collaboration across the digital ecosystem and infrastructure modernization, while ensuring data is secure. Organizations are looking for vendors who integrate with office productivity solutions, like Microsoft Office 365 and connect to back-end content repositories to provide access to content that was previously not available unless you were behind the fire wall. Though integration, whether with applications or infrastructure, CCP can support the modernization of the workplace as a critical component to digital transformation in the modern business.
To learn more read: Gartner Magic Quadrant for Content Collaboration Platforms.
April 8, 2018
How to Reduce the Impact of Ransomware & Shadow IT
With a growing tally of high-profile incidents, multiple warnings from European and US agencies on increased cyber-threats, and employees tempted to use collaborative tools to share information, causing Shadow IT, leaders across industries are under pressure to reduce risk from data attacks and prevent data leakage.
Register for the Axway Syncplicity webinar and learn how to reduce damages due to ransomware attack and gain control of Shadow IT using a secure content collaboration platform.
Let's Face It -- There is No Solution that Prevents Ransomware Attacks
Some surveys unveil ransomware losses for businesses can average $2,500 for each incident, with businesses willing to shell out upwards of $50,000 to decrypt their data.
Ransomware appears between 6 key cyber threats most dangerous for organizations this year. Last year, was a plague of ransomware attacks, with targets including Britain’s National Health Service, San Francisco’s light-rail network, and big companies such as FedEx. Ransomware is a relatively simple form of malware that breaches defenses and locks down computer files using strong encryption. Hackers then request money in exchange for digital keys to unlock the data. Usually, victims have no choice and often pay, especially if the material encrypted hasn’t been backed up.
Read 8 Tips for How to Prevent & Recover from Ransomware
Shadow IT is a real problem for IT Teams
The growth of cloud-based software, along with the continued outsourcing of enterprise data services, has led to an explosion of shadow IT problems for large enterprise. Now while Shadow IT sounds very malicious, it usually is innocently deployed. Most of the time, it is born within an organization simply because employees are trying to be productive. Hosting and moving files using an open consumer file sharing platform, for example, can lead to serious security risks. When employees and departments start ‘piece-milling’ enterprise software solutions together that are not approved by IT, sensitive client and internal data can be made susceptible to breach.
Learn more about why shadow IT is a problem
A Secure Content Collaboration and File Sharing Solution Can Help
Axway Syncplicity is an innovative and robust cloud-based solution built on a hyrid-cloud archieecture that provides seamless and automatic access to files,shared folders with strong security features that make IT very happy.
Register for our webinar and learn all about Ransomware & Shadow IT prevention.
November 20, 2017
Time to bridge MFT and Content Collaboration Platform
BY SCOTT LEWIS, SENIOR DIRECTOR, PRODUCT & SOLUTION MARKETING, AXWAY
Gartner has stated in its recent Magic Quadrant for Content Collaboration Platforms (read the full report here) that 80% of large and midsize organizations in mature regions will have deployed one or more content collaboration platform (CCP) products. Gartner defines CCP as a range of content-centric platforms enabling secure file productivity and content collaboration for individuals and teams as well as supporting the creation of a modern digital workplace. It is the evolution of the EFSS (Enterprise File Sharing and Synchronization) products.
Now this is not meant to be lesson on CCP and MFT but let’s step back and look at both and why there is a value in bridging the two.
CCP solutions address the use cases of people sharing and collaborating very well with other people be it within an organization and with customers, partners and suppliers.
The focused is placed on ease of use and universal access from any device, anytime, anywhere to optimize collaboration with other individuals.
On the other hand, with Managed File Transfer (MFT) solutions the use cases are driven by business processes typically between systems of record which are event and scheduled driven. Premiums are places on automation, monitoring and security. Think “locked down back office processes”.
There is definitely a “better together” scenario if we can bridge MFT with CCP we could open up many new use cases that we have not been able to support before.
Been there, done that but failed
In particular, MFT vendors tried to include file sharing and human based file transfer use cases into their offer. They delivered Frankenstein like products that end users basically refused to use as they were not finding the simplicity they desired. Also, patterns and use cases are so different that it was also creating performance issues on the MFT side. But the intention is still valid, to achieve maximum efficiency and to address hybrid patterns within the organization, IT need to deliver MFT and CCP and expose them as consumer like services to end-users.
Solution is not replacing one with the other
Whatever solution that tried to replace other - MFT by EFSS or EFSS by MFT was just doomed to fail. Both serve a vital purpose and bridging the two properly opens the door to many new possibilities. This is the approach we have taken here at Axway. We have created a bridge between our leading Axway Syncplicity CCP solution and our leading Axway SecureTransport MFT Gateway solution. The two solutions are governed solutions and managed and controlled by IT. Doing so permits new use cases such as an application delivering files to a person or a team, and a person or team sending a file to an application. All while providing the familiar user interface the end users are already using with the benefits of secure anytime, anywhere, any device access.
Take advantage of bridging CCP and MFT
Axway SecureTransport and Syncplicity customers can download the Syncplicity Connector for SecureTransport for free from the Axway AMPLIFY marketplace and start transforming the way their organization collaborates and innovates.
November 16, 2017
Content Collaboration Platforms: Friend or foe in protecting your content?
Syncplicity is an important ally for enterprises determined to protect their content. It can be highly sensitive content like PII – personally identifiable information. Or perhaps something less sensitive, such as public data on a website. Either way, if there’s a breach, it’s not good.
If you want your business to remain viable and competitive, security matters. But to maintain a high level of content security, experience matters. That’s where Syncplicity comes in. As a company with experience managing millions of files for our customers using our content collaboration platform, we take data protection very seriously. It’s probably why we’ve become such a valued ally to so many.
Fact is, Axway Syncplicity recently received one of the highest scores for security capability in Gartner’s Critical Capabilities Research for Content Collaboration Platforms – especially in use cases involving Centralized Content Protection. And this comes just as regulatory compliance is heating up. With Europe’s General Data Protection Regulation (GDPR) taking effect in May 2018, and directives such as PrivacyShield in the U.S., data security and content protection are top of mind for enterprises around the globe. And they’re looking to the cloud for answers.
Securing sensitive content
Keeping sensitive content secure is a big part of a company’s overall data protection strategy. With Syncplicity’s DLP integration capability, organizations are moving sensitive and confidential content to the cloud to enforce security policies. And they’re doing it by leveraging their existing DLP solution. Syncplicity integrates with top DLP solution providers, including leaders in the 2017 Gartner Magic Quadrant for Enterprise Data Loss Prevention (DLP), to give customers a seamless, reliable way to manage sensitive content – including files stored in Syncplicity. Symantec Data Loss Prevention, Digital Guardian and McAfee DLP Prevent, are some of the trusted brands Syncplicity integrates with.
How does this work? Well, organizations can now leverage their existing DLP infrastructure to detect when sensitive content is added to Syncplicity. Access to files and sharing is restricted based on DLP classification. Classification is done in the DLP engine, which identifies what is considered sensitive whether it’s personally identifiable data (PII), health records, intellectual property, or customer or partner information.
Through this integration, companies can enforce file and folder sharing restrictions based on corporate policies, allowing them to adhere to strict security and compliance regulations and requirements. For example, Sara in HR can see PII of employees in, say, the U.S., but other U.S. employees can’t. At the same time, Sara is unable to view PII associated with employees in Europe. Companies can customize policies based on region, employee type and department. And these policies are easily adjusted by approved teams using an administrative console.
Insider threats and cyber crimes
Regulatory compliance is a key reason for DLP solutions and strategies, but there are other business drivers. Insider threats and cyber crimes such as those involving ransomware jeopardize business operations and may put your organization out of compliance with regional or industry regulations. Exposure to ransomware is particularly costly because it not only affects business operations, but will also carry a stiff, 4 percent fine for breaking GDPR mandates starting in May 2018.
Syncplicity lets you track user behavior and recover files. Combine this with your existing DLP capability, and you’ll have a much more comprehensive solution – one that secures sensitive data, applies policies to that data, tracks user behavior (digital footprint) and lets you recover from internal or external content breaches.
Learn more about how we can help you protect your sensitive content with advanced data protection solutions that combine your existing DLP capabilities with Syncplicity.
To learn more about DLP, click here and to learn more about how Syncplicity provides customers with Advanced Data Protection, click here.
October 26, 2017
What’s missing from those “Millennials Are Killing dot dot dot” lists? Home Directories.
Written by Frank Murphy, Director of Strategic Sales Engineering, Syncplicity
A trend in popular culture today that you may have missed is to catalog the growing list of industries, services, and other business-as-usual practices that are being disrupted or even killed off at the hands of Millennials. Everything from family restaurants, doorbells to napkins are being looked at differently by an entire generation who is unafraid to challenge accepted practices. Although the targets of the disruption vary -- the common factor driving the disruption is the need for convenience, avoiding friction, and living life on the go. What happens when that same approach finds its way into your corporate file storage environment? You guessed it, even more disruption.
As out-dated as the door bell: The Home Directory
Just as the doorbell has been a business-as-usual standard fixture on any flat, apartment or house, it's been standard practice for corporate users for decades to be provisioned a small repository of space. This space is typically carved out on a file server somewhere, that is their ‘home’. This directory comes with a logical organizing structure. Just like the buttons assigned to each occupant of an apartment building and when people arrive -- they push the buzzer.As an end user you have data you need to store, but you don’t need to share it with anyone else you put that in your home directory. That is, it’s specific function – the home of your files. It’s what you do. And you automatically get connected to that home directory through some mapping function when you first login. And just like the doorbell, you get one assigned to you whether you actually use it or not.
That's what happened to me when I first showed up as a new hire at EMC 17 years ago. Access to that home directory assumes that I was tethered to the network and able to reach it over network-based storage protocols. In 2001, it was unthinkable to get access to data remotely - "remote access" meant hopping in your car and driving to the office to get to your files.
A new normal: always-on connectedness
Fast forward to today, and it’s a different world. Remote access means I have to always connect to VPN to get map a drive letter. Who needs that? A mobile tablet or phone or similar device doesn't know what a mapped drive leter is. Syncplicity users have access to all their files all the time. In my case, that access is spread out across five or six different devices. My data is tethered to me, not me tethered to the network to get to my data.
Disrupting the home directory: not just for Millenneals
Although the gray hair in my current badge photo disqualifies me as a millenneal, the same benefit of convenience and reduction of friction is where Syncplicity excels. Plus, not being able to connect to the network, or to any wifi signal brings on feelings of anxiety and FOMO (fear of missing out). In my case the fear isn't missing out on someone's Instagram post or Snap Chat -- it’s the fear of missing a customer request, a sales order or anything else I collaborate on throughout the day. The millennial thinking is: why surprise your host with a loud and disturbing buzzing sound when you can send them a text before you arrive? Avoids the hassle. That hassle avoidance motivation also drives users to keep their data as close as the phone in their pocket. That drive for convenience drives users to take matters into their own hands, or their own pockets, and causes a major challenge for data security and governance through Shadow IT Syncplicity can help avoid that friction and hassle of being tethered to the network when we live in a fundamentally untethered and wireless world. For those rare moments you find yourself off-line, you're still not completely disconnected with the ability your favorite files on your mobile device, or use favoriting on SyncDrive if your users only have a laptop and still need a mapped drive letter experience.
Ding Dong: Distupt or be distupted
Migrating legacy home directories into Syncplicity using DataHub, decomissioning or repurposing that NAS capacity while also replacing the home directory with SyncDrive, is the best of both worlds. It It marries the convenience of.... of access anywhere, with the ability to store data in the Syncplicity Cloud, in the cloud of your choice like AWS or Azure, and/or in an on premises StorageVault.
Learn more about SyncDrive and DataHub here.
September 28, 2017
GDPR overexposes shadow IT
By Jean-Claude Bellando
Cloud computing paves the way for shadow IT
Shadow IT is described as IT solutions used within a company without organizational approval. It’s the IT activity that takes place in the shadows without the usual security and control requirements on data placed under the responsibility of the company.
Shadow IT predates the cloud when many employees downloaded and installed their own software to achieve tasks. Since cloud solutions come with an easy-to-consume (starting with freemium account) and easy-to-use paradigm, the potential lack of control is astounding. Symantec states that "organizations use 20 times more cloud apps than they think."1 Corporate IT security professionals estimate they have 30 to 40 apps in the cloud, when the reality is a staggering 928 apps.
Shadow IT does not meet security requirements
The main reason shadow IT emerged was usability and price. Security is still not considered by end users and is often seen as a constraint. As a consequence, "only 8.1% of cloud services meet enterprise security and compliance requirements,"2 states a recent Skyhigh networks report.
Shadow IT: the digital workplace and CCPs
In addition to a focus on the digital workplace, shadow IT also relies on Content Collaboration Platforms (CCP) as defined by Gartner in a recent Magic Quadrant report. “Of the 1,427 cloud services used by the average company, 342 are related to collaboration, file sharing, content sharing”2 (Skyhigh networks report). In addition, “25% of all files shared in the cloud are broadly shared” 1 (Symantec). According to Symantec, this shared data contains personal data for “3% of those shared files contains current compliance related data (PCI, PII, PHI)”1.
The digital workplace in a GDPR perspective
The European Union’s new GDPR (General Data Protection Regulation) is a game-changing regulation that will bring a new focus to shadow IT for any company doing business in Europe. When the rules take effect in May 2018, the GDPR will require:
- A focus on shared data, not only broadly shared data
- A focus on all personal data (anything that identifies someone), not just PCI, PII, or PHI
- Reports of personal data leaks within 72 hours
- A stronger assessment and monitoring of the conditions of data transfer between entities and across boundaries
- More rigorous sanctions that can impact a company’s reputation and bottom-line:
- A GDPR violation can generate a penalty up to 4% of the global revenue of the companies involved in the data processing
- This is on top of any damages done to individuals
- A company’s image or brand can be severely damaged
What to do now?
No one can stop the move to GDPR. It’s time to standardize existing EFSS solutions into one that:
- Offers GDPR-aware features (privacy by design)
- Provides the company DPO (Data Protection Officer) with the necessary control of all data, including location of data
- Provides the user’s expected features and usability, securely, protecting them and their organization
- Delivers expected IT security features, like granular-group based policies, remove wipe and others that protect the user, while also giving the freedom they require to do their jobs
Besides GDPR compliance, there are other immediate rewards to standardizing on an industry leading, secure solution such as reduced costs and easier collaboration for all employees. GDPR is coming, and it’s coming fast. If your organization is guilty of a lot of shadow IT, take the time to get your IT business in order. Your company’s image, revenue, and data will thank you.
To learn more about Axway Syncplicity and how we help you compose a secure digital workplace: Modernize Your IT Infrastructure or Innovative User Experiences.
 Symantec: 2H 2016 Shadow Data Report
 Skyhigh networks report: Cloud adoption risk report Q4 2016
June 30, 2017 | by Kristie Conner
Play ball with Syncplicity by Axway and win
Did you know Major League Baseball (MLB) uses Syncplicity by Axway to power their digital transformation? It’s a great story about how MLB is driving engagement, making it easier for users including baseball scouts to access and share data, securely. So we asked Dan Gainey of MLB to tell us all about it in a webinar to be held July 19. You should be there.
If you’ve never heard Dan speak – or even if you have – you’re in for a treat. Just ask anyone who attended IMAGINE SUMMIT 2017 in Atlanta, or who packed the house at Gartner IT Expo last year. The webinar happens soon after the MLB All-Star Game, so Dan will surely have stories to share about how Syncplicity by Axway helped the league streamline internal collaboration across one of their major events.
Dan Gainey weaves in key themes of digital transformation that impact the digital workplace. If you’re in IT, or manage collaboration, mobility or security, this webinar will provide you with vital insight providing a 360-degree view of what digital transformation looks like across critical groups and the business impact.
To register click here.
Learn how Axway Syncplicity can help you Modernize Your IT Infrastructure or create Innovative User Experiences.
February 13, 2017 | by Brian W Levine
Axway Syncplicity delivers Privacy and Data Protection by Design
By Brian W. Levine, Security and Compliance Officer
As RSA 2017 kicks off, it’s exciting to look out at today’s security and privacy horizon and see how Syncplicity by Axway is uniquely positioned to help enterprises meet the most critical challenges in data protection and digital workplace transformation.
It’s almost a cliché to state that we have seen tectonic shifts in global privacy and security over the last 18 months (but I’ll recap anyway). Consider the rise of IoT botnets crippling the internet, corporations held hostage by crypto-ransomware, and nation-state hacks targeting US elections. In the privacy realm, the US-EU Safe Harbor treaty for data transfer was thrown out and its upgrade, EU-US Privacy Shield, stands on trial to decide if it will face a similar dismissal. Further, the EU-GDPR go-live date looms, and companies slow to adapt will be sure to find themselves in a courtroom facing fines starting at the entry-price of 20 Million Euros per violation. Deep breath, yes these are interesting times.
While cyberattacks increase and data protection laws are in flux, one thing is certain; a proactive transformation strategy which places user privacy and the protection of company data at the foundation is the clear route through the shifting landscape. Leading with these principles, Syncplicity by Axway has developed innovative solutions to meet these challenges, while enabling digital transformation and empowering your mobile workforce.
For our customers, the concepts of data protection by default and privacy by design mean that we place confidentiality and privacy of personal information and company data as primary requirements. Here are examples of how this design objective is embedded into our products and processes:
- While the physical location of data has become an increasing concern, Axway Syncplicity hybrid cloud architecture offers multiple options to address data sovereignty. Customers choose where to host their file storage - on-premises, in a private cloud, or in one of Axway Syncplicity's regional public clouds. Policy-driven storage allows multiple storage locations to be defined within a single tenant account, meaning users have a seamless sharing experience while the back-end infrastructure complies with global data protection concerns.
- In 2016, we launched Axway Syncplicity PrivacyRegions, an innovative solution which ensures personal information and company meta-data is stored and processed only in the local PrivacyRegion, and is not subject to cross-border data transfer regulations. The additional protection comes at no cost to the user experience; users can still seamlessly share files with trusted recipients in any geographic region.
- Fears of government action and potential ‘back doors’ in technology products have sparked a fever pitch of scrutiny and will continue to be debated topics in this environment. StorageVault Authentication is a patented security control that ensures it’s technically and physically impossible for Axway Syncplicity to provide third-party access to customer data, as well as restricts insiders from any unauthorized access. This zero content knowledge approach ensures compliance with the most secure data processing and confidentiality requirements.
- Visibility and transparency is critical and we provide compliance certifications and audit reports for all our systems, processes, and data-centers. We have partnered with TRUSTe to validate our privacy practices and certify our commitment to privacy protection, choice, and accountability.
- Enterprises need to be proactive, not reactive, to ensure confidentiality and prevent data leakage before it becomes an issue. Our rich set of group-based policies and access controls allow companies to set the right level of data protection based on a user’s specific profile.
- End-to-end security controls like Axway Syncplicity's Secure Shared Files applies an encrypted rights management container around documents, so that when files are sent externally, they remain protected and the enterprise maintains ownership of encryption keys.
- Customers should not have to choose between security, privacy, and a great end-user experience. As we know, if you impede user productivity, users will find their own insecure alternatives. Axway Syncplicity's clients and Web apps are designed to enable frictionless productivity and collaboration without compromising on security and privacy.
- On every project, our developers perform an impact analysis to evaluate potential security and privacy issues before writing a single line of code. We use multiple third-party security teams to penetration test our systems using a variety of attack vectors and techniques.
Axway Syncplicity has committed to delivering the highest levels of security, data governance, and privacy available in the file sync and share market, and we continually engage with our customers, R&D, and support teams to unlock new use cases for user productivity and enterprise transformation.
We welcome the challenges of 2017 and beyond and are passionate in our belief that we offer a unique value proposition to address today’s secure file sharing requirements. We look forward to engaging with you at the RSA Conference to demonstrate first-hand how we empower the digital workplace and modernize IT infrastructure while maintaining the highest levels of data protection and privacy.
P.S. Be sure to stop by our booth #N4243 to learn more and also receive a coffee mug with a #hashtag you will find interesting, and as always we welcome your thoughts and comments @Syncplicity by Axway @BrianLevinePM
Find out how we can help you Modernize Your IT Infrastructure or view our solution brief outlining how we can help you protect your data.
January 26, 2017 | by Brian W Levine
Why All Companies Should Have a Ransomware Recovery Plan
Cyber criminals are not only becoming more and more sophisticated but also bolder. The most insidious computer crime today doesn’t involve viruses or stealing credit card numbers. Instead, it comes in the form of ransomware – rogue programs that hold an entire organization’s data hostage with unbreakable encryption and demand a ransom for the decryption key.
These attacks are becoming increasingly common. In 2015, there were 2,453 reported ransomware incidents, in which victims paid about $24.1 million, according to the FBI. Security researchers found that the number of users who came across crypto ransomware in the last year increased by more than 500 percent from the previous year.
In the past few months alone, new and more powerful ransomware has appeared, with criminals targeting sensitive entities like healthcare facilities. For example, MedStar Health, a major healthcare provider in the Washington, D.C., region, was forced to disable its network for several days after a ransomware attack early this year, while Hollywood Presbyterian Medical Center in Los Angeles, California, paid $17,000 in response to an attack in February.
Ransomware is flourishing for two basic reasons.
First, it’s simple economics. Rather than dealing with the trouble and risk involved in stealing credit card files and peddling them on the black market, criminals using ransomware can simply sit back and wait for the victims to pay. Of course, the criminals don’t always send the decryption key in return – these are thieves, after all.
The second reason is that a ransomware attack is incredibly difficult to prevent. It only takes a single click within an email or on a website for an unsuspecting employee to activate the code that encrypts an entire system and triggers a ransom demand. Even if an enterprise has the most updated anti-virus software or access restrictions on sensitive files, it remains vulnerable to ransomware via just one unsuspecting user.
While it’s difficult for an enterprise to feel completely confident in preventing a ransomware attack, it can take steps to mitigate the effects of this new and destructive type of malware – and recover normal operations in minutes or hours – if the proper precautions and recovery plans are in place.
The most important recovery element is real-time protection of data, which means backup copies of all files and data are stored securely in the cloud rather than local desktops. To be most effective, this needs to be accomplished automatically, with a copy being synced up to the cloud every time a file is edited or saved. These backups let a business “roll back” to the moments before a ransomware attack and recover all its files – even in cases where the ransomware has affected large numbers of users within the organization.
It’s also important that the software or service you use to create these backups is capable of excluding the kinds of encryption files known to be associated with ransomware – so you don’t wind up restoring the very files that created the problem in the first place.
Finally, businesses must establish a retention policy. Whether you choose to retain deleted files forever or for a specified time period, a retention policy will allow your original files to be retrieved after they are deleted or encrypted by ransomware. This is a critical part of a recovery plan as it can allow files to be restored quickly and won’t hold you back with a time-consuming and expensive recovery process.
Cybercriminals are an unfortunate reality in today’s marketplace, and it’s easy to fall victim if you’re unprepared. By being aware and maintaining the right backup strategy, however, your company can minimize the damage from these attacks and turn the tables on this latest generation of attackers.
Read our 8 Tips for Ransomware Recovery & Prevention, click here.
Brian Levine is Senior Director of Security of Cloudr Security
December 21, 2016 | by Kristie Conner
SyncDrive: Size Does Not Matter
SyncDrive: Size Does Not Matter
The amount of unstructured data in home directories, group shares and network drives across the enterprise is staggering and the overall amount of information is growing exponentially as the world becomes more digital. The reality is that we are just at the beginning – the volume of data is exploding, more data has been created in the past two years than in the entire history of the human race. That is a lot of data – and it begs the question: what do we do with that data, and exactly how do knowledge workers access it?
Syncplicity by Axwayhas an answer – SyncDrive. While we might not be solving all your unstructured data needs (okay, 90% of them), if you choose Axway Syncplicity we can help you untangle your home directories and group shares and at the same time modernize your file storage infrastructure – along with providing access to all your data via the desktop, laptop and mobile devices. Imagine, being able to give your enterprise users VPN-less access to all their enterprise content from any device, where data size does not matter.
Now, imagine being a user and, never having to worry (again) about having enough space on your device or maneuvering and moving files so you have just the right ones when you need them. SyncDrive redefines how users work with large volumes of data across the enterprise. Users can selectively sync the files they need, and the intelligent cache feature ensures they never need to worry about running out of storage.
SyncDrive is a revolutionary feature that will have an immediate impact on the user and IT. What about the value to the overall enterprise? For a typical Fortune 1,000 company, just a 10 percent increase in data accessibility will result in more than $65 million additional net income. With SyncDrive, we make this possible.
This new SyncDrive feature is now available and extends our digital transformation lead by enabling enterprises to modernize their IT infrastructure and access petabytes of data stored in legacy file shares.”
Find out how SyncDrive can improve your business agility, click here.