Syncplicity by Axway Blog 2017-07-18T19:30:33Z Copyright (c) 2017, kconner ExpressionEngine,2017:06:30 <![CDATA[Play ball with Syncplicity by Axway and win]]>,2017:blog/8.1252 2017-06-30T15:28:00Z 2017-07-18T19:30:33Z Kristie Conner Did you know Major League Baseball (MLB) uses Syncplicity by Axway to power their digital transformation? It’s a great story about how MLB is driving engagement, making it easier for users including baseball scouts to access and share data, securely. So we asked Dan Gainey of MLB to tell us all about it in a webinar to be held July 19. You should be there.

If you’ve never heard Dan speak – or even if you have – you’re in for a treat. Just ask anyone who attended IMAGINE SUMMIT 2017 in Atlanta, or who packed the house at Gartner IT Expo last year. The webinar happens soon after the MLB All-Star Game, so Dan will surely have stories to share about how Syncplicity by Axway helped the league streamline internal collaboration across one of their major events.

Dan Gainey weaves in key themes of digital transformation that impact the digital workplace.  If you’re in IT, or manage collaboration, mobility or security, this webinar will provide you with vital insight providing a 360-degree view of what digital transformation looks like across critical groups and the business impact.

To register click here

<![CDATA[Syncplicity by Axway delivers Privacy and Data Protection by Design]]>,2017:blog/8.1202 2017-02-13T17:52:00Z 2017-02-13T19:04:55Z Brian W Levine

By Brian W. Levine, Syncplicity by Axway Security and Compliance Officer

As RSA 2017 kicks off, it’s exciting to look out at today’s security and privacy horizon and see how Syncplicity by Axway is uniquely positioned to help enterprises meet the most critical challenges in data protection and digital workplace transformation.

It’s almost a cliché to state that we have seen tectonic shifts in global privacy and security over the last 18 months (but I’ll recap anyway). Consider the rise of IoT botnets crippling the internet, corporations held hostage by crypto-ransomware, and nation-state hacks targeting US elections. In the privacy realm, the US-EU Safe Harbor treaty for data transfer was thrown out and its upgrade, EU-US Privacy Shield, stands on trial to decide if it will face a similar dismissal. Further, the EU-GDPR go-live date looms, and companies slow to adapt will be sure to find themselves in a courtroom facing fines starting at the entry-price of 20 Million Euros per violation. Deep breath, yes these are interesting times.

While cyberattacks increase and data protection laws are in flux, one thing is certain; a proactive transformation strategy which places user privacy and the protection of company data at the foundation is the clear route through the shifting landscape. Leading with these principles, Syncplicity by Axway has developed innovative solutions to meet these challenges, while enabling digital transformation and empowering your mobile workforce. 

For our customers, the concepts of data protection by default and privacy by design mean that we place confidentiality and privacy of personal information and company data as primary requirements. Here are examples of how this design objective is embedded into our products and processes:  

  • While the physical location of data has become an increasing concern, Syncplicity by Axway’s hybrid cloud architecture offers multiple options to address data sovereignty. Customers choose where to host their file storage - on-premises, in a private cloud, or in one of Syncplicity by Axway’s regional public clouds. Policy-driven storage allows multiple storage locations to be defined within a single tenant account, meaning users have a seamless sharing experience while the back-end infrastructure complies with global data protection concerns.
  • In 2016, we launched Syncplicity by Axway PrivacyRegions, an innovative solution which ensures personal information and company meta-data is stored and processed only in the local PrivacyRegion, and is not subject to cross-border data transfer regulations. The additional protection comes at no cost to the user experience; users can still seamlessly share files with trusted recipients in any geographic region.
  • Fears of government action and potential ‘back doors’ in technology products have sparked a fever pitch of scrutiny and will continue to be debated topics in this environment. StorageVault Authentication is a patented security control that ensures it’s technically and physically impossible for Syncplicity by Axway to provide third-party access to customer data, as well as restricts insiders from any unauthorized access. This zero content knowledge approach ensures compliance with the most secure data processing and confidentiality requirements.
  • Visibility and transparency is critical and we provide compliance certifications and audit reports for all our systems, processes, and data-centers. We have partnered with TRUSTe to validate our privacy practices and certify our commitment to privacy protection, choice, and accountability.
  • Enterprises need to be proactive, not reactive, to ensure confidentiality and prevent data leakage before it becomes an issue. Our rich set of group-based policies and access controls allow companies to set the right level of data protection based on a user’s specific profile.
  • End-to-end security controls like Syncplicity by Axway’s Secure Shared Files applies an encrypted rights management container around documents, so that when files are sent externally, they remain protected and the enterprise maintains ownership of encryption keys.
  • Customers should not have to choose between security, privacy, and a great end-user experience. As we know, if you impede user productivity, users will find their own insecure alternatives. Syncplicity by Axway’s clients and Web apps are designed to enable frictionless productivity and collaboration without compromising on security and privacy.
  • On every project, our developers perform an impact analysis to evaluate potential security and privacy issues before writing a single line of code. We use multiple third-party security teams to penetration test our systems using a variety of attack vectors and techniques. 

Syncplicity by Axway has committed to delivering the highest levels of security, data governance, and privacy available in the file sync and share market, and we continually engage with our customers, R&D, and support teams to unlock new use cases for user productivity and enterprise transformation.

We welcome the challenges of 2017 and beyond and are passionate in our belief that we offer a unique value proposition to address today’s secure file sharing requirements. We look forward to engaging with you at the RSA Conference to demonstrate first-hand how we empower the digital workplace and modernize IT infrastructure while maintaining the highest levels of data protection and privacy.

P.S. Be sure to stop by our booth #N4243 to learn more and also receive a coffee mug with a #hashtag you will find interesting, and as always we welcome your thoughts and comments @Syncplicity by Axway @BrianLevinePM

<![CDATA[Why All Companies Should Have a Ransomware Recovery Plan]]>,2017:blog/8.1195 2017-01-26T19:28:00Z 2017-01-26T19:42:06Z Brian W Levine Cyber criminals are not only becoming more and more sophisticated but also bolder. The most insidious computer crime today doesn’t involve viruses or stealing credit card numbers. Instead, it comes in the form of ransomware – rogue programs that hold an entire organization’s data hostage with unbreakable encryption and demand a ransom for the decryption key.

These attacks are becoming increasingly common. In 2015, there were 2,453 reported ransomware incidents, in which victims paid about $24.1 million, according to the FBI. Security researchers found that the number of users who came across crypto ransomware in the last year increased by more than 500 percent from the previous year.

In the past few months alone, new and more powerful ransomware has appeared, with criminals targeting sensitive entities like healthcare facilities. For example, MedStar Health, a major healthcare provider in the Washington, D.C., region, was forced to disable its network for several days after a ransomware attack early this year, while Hollywood Presbyterian Medical Center in Los Angeles, California, paid $17,000 in response to an attack in February.

Ransomware is flourishing for two basic reasons.

First, it’s simple economics. Rather than dealing with the trouble and risk involved in stealing credit card files and peddling them on the black market, criminals using ransomware can simply sit back and wait for the victims to pay. Of course, the criminals don’t always send the decryption key in return – these are thieves, after all.

The second reason is that a ransomware attack is incredibly difficult to prevent. It only takes a single click within an email or on a website for an unsuspecting employee to activate the code that encrypts an entire system and triggers a ransom demand. Even if an enterprise has the most updated anti-virus software or access restrictions on sensitive files, it remains vulnerable to ransomware via just one unsuspecting user.

While it’s difficult for an enterprise to feel completely confident in preventing a ransomware attack, it can take steps to mitigate the effects of this new and destructive type of malware – and recover normal operations in minutes or hours – if the proper precautions and recovery plans are in place.

The most important recovery element is real-time protection of data, which means backup copies of all files and data are stored securely in the cloud rather than local desktops. To be most effective, this needs to be accomplished automatically, with a copy being synced up to the cloud every time a file is edited or saved. These backups let a business “roll back” to the moments before a ransomware attack and recover all its files – even in cases where the ransomware has affected large numbers of users within the organization.

It’s also important that the software or service you use to create these backups is capable of excluding the kinds of encryption files known to be associated with ransomware – so you don’t wind up restoring the very files that created the problem in the first place.

Finally, businesses must establish a retention policy. Whether you choose to retain deleted files forever or for a specified time period, a retention policy will allow your original files to be retrieved after they are deleted or encrypted by ransomware. This is a critical part of a recovery plan as it can allow files to be restored quickly and won’t hold you back with a time-consuming and expensive recovery process.

Cybercriminals are an unfortunate reality in today’s marketplace, and it’s easy to fall victim if you’re unprepared. By being aware and maintaining the right backup strategy, however, your company can minimize the damage from these attacks and turn the tables on this latest generation of attackers.

Brian Levine is Senior Director of Security and Compliance at Syncplicity.

<![CDATA[SyncDrive: Size Does Not Matter]]>,2016:blog/8.1186 2016-12-21T13:27:00Z 2016-12-21T17:55:49Z Kristie Conner

SyncDrive: Size Does Not Matter

The amount of unstructured data in home directories, group shares and network drives across the enterprise is staggering and the overall amount of information is growing exponentially as the world becomes more digital. The reality is that we are just at the beginning – the volume of data is exploding, more data has been created in the past two years than in the entire history of the human race. That is a lot of data – and it begs the question: what do we do with that data, and exactly how do knowledge workers access it?

Syncplicity by Axway has an answer – SyncDrive. While we might not be solving all your unstructured data needs (okay, 90% of them), if you choose Syncplicity by Axway we can help you untangle your home directories and group shares and at the same time modernize your file storage infrastructure – along with providing access to all your data via the desktop, laptop and mobile devices. Imagine, being able to give your enterprise users VPN-less access to all their enterprise content from any device, where data size does not matter. 

Now, imagine being a user and, never having to worry (again) about having enough space on your device or maneuvering and moving files so you have just the right ones when you need them. SyncDrive redefines how users work with large volumes of data across the enterprise. Users can selectively sync the files they need, and the intelligent cache feature ensures they never need to worry about running out of storage.

SyncDrive is a revolutionary feature that will have an immediate impact on the user and IT. What about the value to the overall enterprise? For a typical Fortune 1,000 company, just a 10 percent increase in data accessibility will result in more than $65 million additional net income. With SyncDrive, we make this possible.

This new SyncDrive feature is now available and extends our digital transformation lead by enabling enterprises to modernize their IT infrastructure and access petabytes of data stored in legacy file shares.”

Read ‘Syncplicity’s New SyncDrive Feature Unlocks Unprecedented Access to Data’ press release here.

<![CDATA[Syncplicity by Axway PrivacyRegions Answers Data Protection Requirements]]>,2016:blog/8.1188 2016-12-19T13:43:00Z 2016-12-19T22:55:08Z Kristie Conner

Syncplicity by Axway PrivacyRegions Answers Data Protection Requirements

Syncplicity by Axway is raising the technology architecture bar with a new EFSS innovation that ensures corporate compliance without getting in the way of user productivity. Syncplicity by Axway PrivacyRegions allows companies to remain compliant with region-specific data protection and residency regulations while still allowing their users to seamlessly share folders and files with users and companies based in other regions. Personal information (PII) and corporate meta-data is never processed or stored in other regions.

Syncplicity by Axway PrivacyRegions uniquely combines regional cloud services, policy-driven hybrid cloud storage and a new privacy driven architecture. Today, we’re pleased to announce that Syncplicity by Axway European Union (EU) PrivacyRegion is generally available. This design enables EU-based enterprises to confine the storage and processing of all their files, meta-data, and personal information to the EU region. 

Seamless User Experience

Syncplicity by Axway is the only EFSS provider to offer regional cloud services that do not restrict user sharing. We allow users to seamlessly collaborate across regions with a single account, while maintaining all the information—including meta-data—within a designated region. For example, with Syncplicity by Axway, an enterprise’s storage and control plane can be in Europe. Other EFSS vendors allow customers to choose a geographic zone for file storage, but they process and store all meta-data, such as filenames, PII, and significant indexing of regional files’ content in U.S.-based cloud services. By contrast, Syncplicity by Axway PrivacyRegions segregates a company’s meta-data, PII and file storage to its chosen region. For example, customers who choose Syncplicity by Axway EU PrivacyRegion are assured all of their information is kept within Europe.

Syncplicity by Axway is the first vendor to provide regional cloud services allowing users to seamlessly collaborate across regions without requiring multiple user accounts for each region. Syncplicity by Axway’s solution is unique in segregating all data to specific regions, while still providing users ‘a single-pane-of-glass’ experience and seamless collaboration across regions.

Syncplicity’s release of PrivacyRegions builds upon a long-standing posture of data privacy compliance. Our ‘data protection by default’ strategy provides a flexible architecture with the necessary granular privacy, confidentially and data sovereignty controls built-in, giving our customers the right tools to adapt to evolving regional legislation and business requirements across the enterprise.

To learn more about how Syncplicity by Axway ensures compliance with global privacy and security regulations, please click here.

<![CDATA[Hybride Speicher und Datenschutz: So sorgen Sie für Compliance]]>,2016:blog/8.1185 2016-12-06T15:54:00Z 2016-12-06T16:06:15Z Mit Big Data und dem Internet of Things kommen auf klassische Storage-Architekturen neue Aufgaben zu, denen sie immer weniger gerecht werden können – sie sind oft zu starr und unflexibel. Ein Ausweg könnte Enterprise File Sync & Share (EFSS) sein, das vorhandene und neue Speicher zu hybriden Strukturen zusammenführt. Wo liegen die Stärken eines EFSS-Systems und welche Faktoren insbesondere im Datenschutz spielen eine besondere Rolle? Lesen Sie dazu mehr in diesem Artikel.

Nicht alle Daten müssen in die Cloud. Bei einigen ergibt dies jedoch durchaus Sinn. EFSS hilft bei der Umsetzung.

Weltweit nehmen die Datenmengen durch Big Data oder Internet of Things zu. Bisherige Ansätze wie die exklusive Speicherung von Daten auf eigene Storage-Strukturen bedienen oftmals die neuen Anforderungen nur noch unzureichend. Besonderer Flaschenhals kann dabei das klassische Storage-Management werden. Ein Ende dieser Entwicklung ist bei einem globalen Gesamtdatenvolumen von 8,5 Zettabyte kaum absehbar – bis zum Jahr 2020 erwarten Marktforscher eine Steigerung auf 40 Zettabyte.

In Deutschland kommen zu dieser Entwicklung darüber hinaus auch noch verschiedene Auflagen des Datenschutzes hinzu. Wegen dieser besonderen Ausgangslage können Unternehmen nicht einfach den günstigsten Cloud-Storage-Anbieter wählen, sondern müssen explizit die Vereinbarkeit der einzelnen Lösungen mit den jeweils geltenden Vorschriften abgleichen.

Weltweit nehmen die Datenmengen durch Big Data oder Internet of Things zu. Bisherige Ansätze wie die exklusive Speicherung von Daten auf eigene Storage-Strukturen bedienen oftmals die neuen Anforderungen nur noch unzureichend. Besonderer Flaschenhals kann dabei das klassische Storage-Management werden. Ein Ende dieser Entwicklung ist bei einem globalen Gesamtdatenvolumen von 8,5 Zettabyte kaum absehbar – bis zum Jahr 2020 erwarten Marktforscher eine Steigerung auf 40 Zettabyte.

In Deutschland kommen zu dieser Entwicklung darüber hinaus auch noch verschiedene Auflagen des Datenschutzes hinzu. Wegen dieser besonderen Ausgangslage können Unternehmen nicht einfach den günstigsten Cloud-Storage-Anbieter wählen, sondern müssen explizit die Vereinbarkeit der einzelnen Lösungen mit den jeweils geltenden Vorschriften abgleichen.

Bei der Wahl zwischen Cloud- und On-Premise-Storage stehen Entscheider vor einem Dilemma. Während lokale Strukturen rasch an die Grenzen der eigenen Kapazität stoßen können, fehlt bei Cloud-Angeboten die Nachvollziehbarkeit des konkreten Speicherorts der manchmal unternehmenskritischen Daten. Die Nachvollziehbarkeit der Ablage ist allerdings je nach Branche und Art der Daten aufgrund von staatlichen oder unternehmensinternen Regularien erforderlich. Deswegen kommen hier Cloud-Anbieter mit Speicherorten außerhalb der Europäischen Union, beispielsweise US-Provider, nicht in Frage.

Flexibilität und Sicherheit
Die Frage, ob bei der Datenspeicherung mehr Flexibilität oder mehr Sicherheit gewünscht wird, lässt sich auf einfache Weise beantworten: beides, denn beides ist für die Unternehmen von zentraler Bedeutung. Der Ansatz, um hier die Bedürfnisse der Kunden erfolgreich zu adressieren, heißt Enterprise File Sync & Share (EFSS). Mit EFSS sind die Vorteile beider Welten verfügbar. Hier können weniger sensible Daten in die Cloud wandern, die automatisch mit den Anforderungen mitwächst. Unternehmenskritische Daten hingegen sind auf lokalen Strukturen besser aufgehoben. Mit einer Policy Engine, wie sie beispielsweise Syncplicity by Axway anbietet, können Administratoren Richtlinien zur Behandlung verschiedener Datentypen festlegen.

Bei global agierenden Unternehmen lassen sich Daten so automatisch auf den Servern oder Cloud-Diensten der einzelnen Regionen speichern, während sie den länderübergreifenden Arbeitsgruppen zur Verfügung stehen. Der Unterschied zum klassischen Administrationsansatz, bei dem dies prinzipiell auch zu bewerkstelligen ist, ist die Automation sowie der bessere Überblick über die vorhandenen Daten. Nebenbei umgehen Unternehmen so auch überflüssige Redundanzen. Ein Aspekt der bei der gesetzeskonformen Speicherung gerne übersehen wird, sind die Meta-Daten. Falls die originären Daten gesetzeskonform zwar in der EU liegen, ist in vielen Fällen ausländischen Behörden ein Rückschluss auf die Unternehmensaktivitäten durch die Auswertung der Metadaten möglich. Im Idealfall regelt eine Policy Engine mittels der PrivacyRegions die korrekte Distribution dieser speziellen Daten gleich mit.

Seite 2 - Hybride Speicher und Datenschutz: So sorgen Sie für Compliance

Daneben können Unternehmen mit einem EFSS-System flexibler auf veränderte Datenvolumen reagieren. Hier lassen sich weniger kritische Daten temporär von On-Premise auf die Cloud auslagern, ohne dass versehentlich kritische Informationen mitwandern. Eine EFSS-Lösung weist dabei den Speicherort gemäß den vorab definierten Policies automatisch zu. Damit bietet EFSS eine skalierbarere Umgebung als klassische Speicherlösungen.

Alleine schon aus rechtlichen Gründen ist die Nutzung eines EFSS-Systems bei komplexeren Problemstellungen ratsam, denn die gleichzeitige Nutzung von Cloud-Storage und lokalen Speichern könnte ohne eine gemeinsame Einbettung in ein Managementsystem dazu führen, dass klassifizierte Daten an einem ungeeigneten Standort gesichert werden. So haben beispielsweise Personal- und Gehaltsdaten nichts auf einem Cloud-Speicher zu suchen, dessen Sicherheitsmaßnahmen durch den Provider nicht abschließend geklärt werden konnten.

Organisatorische Erleichterung durch EFSS
Jedoch hilft eine EFSS-Lösung auch dabei, die Organisation in der IT zu vereinfachen. So fällt bereits einiges an Aufwand alleine dadurch weg, dass nicht jede Speicherplattform für sich organisiert werden muss. Speicher- und Synchronisationszugriffe erfolgen unter einem Dach. Dadurch werden auch mehrere in verschiedenen Versionen gespeicherten Daten vereint. Ein konsolidierter Datenstand steht auf diese Weise zur Verfügung.

Nicht zuletzt ergeben sich Einsparpotentiale, denn die dynamische und Policy-gestützte Datenverteilung hilft, die Strukturen schlank zu halten und die Bereitstellung überflüssiger Ressourcen zu vermeiden. Dies ist bei der Nutzung von Cloud-Storage auch möglich, doch nur zu dem Preis der mangelnden Einflussnahme auf die Verteilung der Daten. Dies gilt natürlich auch für einen Filialbetrieb, bei dem die Vorhaltung lokaler IT vollkommen reduziert werden kann.

Arbeitswelt im Wandel
Mit der zunehmenden Nutzung eigener Endgeräte oder flexibleren Arbeitsmodellen wie dem Home Office stellt sich für die Unternehmens-IT die Frage, wie mit Daten auch in Hinblick auf eine unternehmensferne oder dezentrale Nutzung zu verfahren ist. Informationen stehen hier in nicht kontrollierten Raum zur Verfügung und die Gefahr eines Datendiebstahls steht permanent im Raum. Aus diesem Grund sollte ein ausgeklügeltes Synchronisationsmanagement die Dateien zur Verfügung stellen, die für die Bearbeitung von Geschäftsprozessen unbedingt erforderlich sind. Auch hier stellt ein EFSS-System sicher, dass der Zugriff entweder zeitlich oder auf Geräteebene begrenzt gewährt wird, damit unternehmenskritische Informationen an ihrem vorgeschriebenen Ort verbleiben.

Mehr Schutz vor Ransomware
Der Albtraum eines jeden Administrators ist es, wenn sich die Rechner der Nutzer mit einer Verschlüsselungs-Schadware infizieren. Selbst nach der Zahlung eines Lösegelds an den Cyberkriminellen, der die Ransomware entwickelt hat, ist der Zugriff auf die Daten keinesfalls garantiert. Die EFSS-Lösung von Syncplicity by Axway etwa bietet hier einen guten Schutz. Durch das Storage-Management werden Daten permanent in verschiedenen Generationen gesichert, sodass eine Restaurierung wichtiger Informationen jederzeit möglich ist.

Im Gegensatz zu herkömmlichen Cloud-Synchronisationen kommt hier nicht nur ein "magischer Ordner" zum Einsatz, bei dem die Verschlüsselung durchsynchronisiert wird, sondern mehrere. Diese lassen sich dann voneinander isoliert behandeln. Damit minimiert sich das Risiko, dass alle Datenbereiche unbrauchbar werden. Außerdem stellt EFSS sicher, dass riskante Dateitypen von der Synchronisation ausgenommen werden. Ferner können bei Nutzung der Share-Funktion Mailanhänge seltener verwendet werden, was auch hier du einer Verringerung des Risikos führt. Sollte der Worst Case allerdings eingetreten sein, erstellt EFSS einen Recovery Plan, nach dem sich die befallenen Dateien sukzessive rasch wiederherstellen lassen.

Herkömmliche Storage-Architekturen sie sind oft zu starr und unflexibel. Ein Ausweg könnte Enterprise File Sync & Share bieten, das vor allem beim Datenschutz seine Stärken ausspielt und es vermag, vorhandene und neue Speicher zu hybriden Strukturen zusammenzuführen.

Read original article here.

<![CDATA[Ransomware is on the rise prepare your business for the worst]]>,2016:blog/8.1182 2016-12-01T17:27:00Z 2016-12-01T17:39:40Z Brian W Levine Cyber criminals are increasingly turning to ransomware as a form of blackmail to exploit public and private enterprises. It’s estimated that the cost of ransomware attacks will total over $1bn this year – and researchers warn that the problem is only going to grow. Hackers are not only increasingly sophisticated, but also getting bolder in their approach and so the most insidious computer crime today doesn’t involve viruses or stealing credit card numbers but comes in the form of ransomware. These rogue programs have the ability to hold an entire organisation’s data hostage with unbreakable encryption, while the cybercriminals demand a ransom for the decryption key.

These attacks are becoming increasingly common. In the past few months alone, new and more powerful ransomware has appeared, with criminals targeting sensitive entities such as NHS hospitals and local councils. In fact, almost 30 NHS trusts admit that they have been the victims of ransomware attacks in the past 12 months, while 30% of UK councils were victims of ransomware in 2015.

The reasons for ransomware flourishing are two-fold.

Firstly, basic economics. Stealing credit card details and selling them on the black market can be time-consuming with a potential payoff of less than a dollar per card, so cybercriminals are turning to ransomware to sit back and wait for victims to pay up. Less work for greater returns!

Secondly, ransomware is very difficult to avoid. A single click within an email or website is all it takes for an unsuspecting employee to activate the code that encrypts an entire system and triggers a ransom demand. Even if an enterprise has the most updated anti-virus software or access restrictions on sensitive files, it remains vulnerable to ransomware via just one unsuspecting user.

However, all is not lost. Organisations can take steps to mitigate the effects of attacks and recover normal operations in minutes or hours – if the proper precautions and recovery plans are in place. The most important recovery element is real-time protection of data, which means backup copies of all files and data are stored securely off-site rather than on local servers. In order for this to be effective, it needs to be accomplished automatically, whereby a copy is made every time a file is edited or saved. Backups like this let a business “roll back” to the moments before a ransomware attack and recover all its files – even in cases where the ransomware has migrated across the local network and servers.

To do this, the software or service a business uses to create the backup must be capable of excluding all encryption files known to be associated with ransomware. Businesses need to avoid restoring the files that delivered the ransomware in the first place.

Last but not least, businesses need an effective retention policy – whether that is to retain deleted files forever or for a specified time period. Establishing a retention policy will allow the business to retrieve the original files after the ransomware attack. This is an integral part of any recovery plan as it removes the need for costly recovery processes, which are often time-consuming, meaning the business can be up and running again with the least disruption to the operation.

In today’s technological age cybercriminals are an unfortunate reality. Businesses therefore should think ‘not if, but when we are attacked’ and take all the necessary precautions to ensure that the attack causes the least amount of damage to the business. By being aware and maintaining the right backup strategy, your company can minimise the damage from these attacks and turn the tables on this latest generation of attacks.

Read original article written by Brian W. Levine, Syncplicity Security Officer here.

<![CDATA[Thank you, CIOReview!]]>,2016:blog/8.1180 2016-11-30T21:22:00Z 2016-12-01T00:51:22Z Kristie Conner

If you have not opened the latest issue of CIOReview Magazine, then let us tell you first!  We were recognized by CIOReview as one of the “20 Most Promising Compliance Solution Providers of 2016”.  It’s an annual listing by CIOReview of 20 companies that are on the forefront of providing compliance solutions and impacting the marketplace.

“Syncplicity’s role in modernizing legacy infrastructure to keep data safe and compliant is noteworthy.  The company offers users an easy to use file sharing and collaboration solution with complete control of their data while fully adhering to compliance requirements.”

To read the full article on Syncplicity by Axway “Bolstering Secure Frameworks for File Sharing” click here

To learn how we can help your organization kickstart IT infrastructure modernization to reduce costs and empower your digital workplace, please email us at

<![CDATA[A Different Kind of Sharing]]>,2016:blog/8.1173 2016-11-03T15:58:00Z 2016-11-09T15:10:34Z Kristie Conner

Most of us have been to tradeshows and fallen for the free giveaways.  Those little trinkets look so alluring under the lights and in the excitement of the show.  One year I recall bartering with another vendor for one of their selfie sticks, thinking that is kind of cool, but in reality I don’t take selfies – so it sits around in its unused glory taking up space.  And, it’s cheaply made. How many times have I brought stuff home just to be thrown away or collect dust?

The #truthis I don’t pick up any stuff anymore, or almost never.  

For our upcoming show Gartner ITExpo in Barcelona the marketing team came up with a new idea. We decided to select a charity and for every person who gets scanned at our booth we will donate 2 Euros to an important cause.  The cause chosen for the Gartner ITExpo in Barcelona is Solar Aid, an International charity that combats poverty and climate change by providing access to solar lights in some of the most remote regions of Africa.

If you are headed to Barcelona stop by our booth to get scanned, get a “I donated to Solar Aid through Syncplicity by Axway” sticker and support an organization that is doing great work #ADifferentKindofSharing!

Just Five Scans

Just 5 Scans at our booth will result in 3 Solar Lights, 13 People Reached, £435 Saved by Families, 3018 Extra hours of child study time, 3.2 tonnes of CO2 emissions everted and 6 people experiencing better health.

Visit the Syncplicity by Axway Booth (#403) and participate in a Different Kind of Sharing.

<![CDATA[Affiliate Sharing: Helping Enterprises Build their Digital Ecosystem of Trust]]>,2016:blog/8.1152 2016-10-03T19:18:00Z 2016-10-04T17:46:27Z Kristie Conner

In a recent Enterprise Strategy Group (ESG) research study, they found that 98% of IT and security professionals were extremely concerned with having technologies in place to ensure policies are applied to the sharing of sensitive data. Our newest product enhancement, affiliate sharing, does just that.  Affiliate sharing extends sharing and collaboration capabilities to include a trusted network of specific partners and customers, in essence helping enterprises build their digital ecosystem of trust.

IT often blocks external sharing due to the perceived security risks, but their digital workers are looking for ways to share large files and folders with partners and customers, even if that means using consumer (shadow IT) file sharing tools.  Our latest product enhancement gives digital workers a secure and seamless way to share files and folders within their digital ecosystem, building a ‘trusted network’, while maintain the level of security control required by IT.

“External sharing is critical to Texas A&M University, and Syncplicity by Axway’s new controls give me confidence that my teams can share files and folders securely among our trusted group of organizations,” said Danny Miller, CISO System Chief Information Security Officer at Texas A&M University. “In today’s digital world, the firewall is no longer the boundary for data and information sharing. These new Syncplicity by Axway enhancements enable us to lock down sharing within a trusted group of affiliated organizations, helping us stay compliant and secure – maintaining central control while enabling easy end-user collaboration.”

Affiliate Sharing offers a comprehensive set of controls that allow you to:

  • Build a trusted digital environment for extending file sharing with partners and customers by assigning specific groups of users the domains with whom external sharing is approved.
  • Extend security controls and sharing policies to both outbound and inbound folder sharing separately, based on Active Directory group membership.
  • Leverage new folder re-sharing rights controls to override company wide and group-based external sharing policies to ensure that users who are approved to share externally cannot expose specific confidential information.
  • Shut down data leakage by optionally setting inbound folder sharing for specific groups of users to be read-only.

To start building your digital ecosystem of trust, checkout the new additions to Syncplicity by Axway’s group-based policies and security controls, or to learn more about these and other security features contact your Syncplicity by Axway Customer Success Manager.

<![CDATA[Collaborate in Microsoft Office with the Syncplicity by Axway App Tab]]>,2016:blog/8.1135 2016-08-17T15:06:00Z 2016-08-17T17:32:36Z

The pace of today’s collaborative work often requires editing files that are shared among multiple people. But collaborating with others in real-time can create problems. Does someone else have the document open right now? Will my changes get overwritten? Am I looking at the latest version?

There have been several approaches to this problem, including real-time editing within a browser. But the vast majority of Enterprise documents are created and edited in desktop versions of Microsoft Office applications. These applications are the gold standard, and present in nearly every office environment worldwide. So Syncplicity by Axway set out to address the real-time viewing and editing problem directly at the source.

The Syncplicity by Axway App Tab is a collaboration feature that works with desktop versions of Microsoft Word, Excel and PowerPoint, from Office 2007 through Office 2016 (included with Office 365). The App Tab was introduced in the Syncplicity by Axway desktop client version 4.1.0 for Windows. In future releases we will bring the feature to Mac and mobile clients as well.

When you use Microsoft Word, Excel or PowerPoint to open a file inside a shared folder, the Syncplicity by Axway App Tab displays. The App Tab helps you avoid accidental file conflicts when collaborating on shared files, with visible notifications when a file’s status changes. Popup notifications display directly inside Microsoft Office when other people view a file that you are also viewing, when someone else starts editing that file, or when a newer version of that file becomes available.

Learn More

Get an entertaining and in-depth tour of the new App Tab in just over 7 minutes by watching our Syncplicity by Axway App Tab Video Guide. Amaze your friends! We also created a written guide to Using the Syncplicity by Axway App Tab, if reading is more your thing.

Enjoy collaborating with the Syncplicity by Axway App Tab, and send us feedback!

<![CDATA[Ransomware Prevention & Recovery with Syncplicity by Axway]]>,2016:blog/8.1130 2016-08-01T14:36:00Z 2016-08-03T13:56:31Z Brian W Levine

To say ransomware is a growing threat is an understatement.  With multiple public warnings from US and European law enforcement, a growing tally of high-profile incidents, and new guidance on HIPAA breach notifications, business leaders across industries are justifiably nervous.  While there is no foolproof way to prevent an attack, there are measures you can put in place today to better defend against this new and very destructive type of malware. Additionally, when an attack does slip through the defenses, a quick recovery is possible if you have a solid remediation plan in place.

As the saying goes, ‘an ounce of prevention is worth a pound of cure’. With that adage in mind, here are a few practical guidelines you and your organization should implement today, to get the maximum ransomware prevention and recovery mileage from Syncplicity by Axway. Be sure to check out the links below for detailed instructions to implement these tips.

Back-Up Files in Real-Time

While there is no single solution for preventing ransomware attacks, a consistent recommendation from experts across the industry is ‘Backup, Backup, Backup’. For most enterprise users (and consumers), that’s easier said than done.  It’s a behavior that often requires extra manual steps and backup jobs that usually never complete.  However, with Syncplicity by Axway, continuous backup is easy and seamless. Files and folders are backed up automatically in real-time, meaning you start syncing all your folders just once and move on, eliminating worries about data loss.

Utilize Multi-Folder Sync

Our unique EFSS feature, Multi-Folder Sync, allows users to back up every folder on their desktop automatically.  The design of this features allows users and admins to sync all files and folders in place without moving them to a “magic folder.”  In the unfortunate event your company or a user is breached by ransomware, they have back-ups of every file in every folder on Syncplicity by Axway, not just the few files they remembered to copy to the single “magic” sync folder of other EFSS solutions. 

We recommend that you educate your users to sync all their critical files and folders, including Desktop and My Documents. As an administrator, you also have the ability to proactively specify the sync of any desktop folders to ensure that your corporate users are safe. 

Establish an Enterprise Retention Policy

The most common ransomware variants attack by deleting files and replacing them with renamed encrypted versions, or by retaining filenames and encrypting the contents in place. In both cases, Syncplicity by Axway retention policies will enable you to ensure the files can be recovered.

The Syncplicity by Axway deleted files retention policy allows you to retain deleted files forever or for a specified time period, so that your original files can be retrieved after they are deleted by ransomware. Administrators should also review your file versions retention policy which controls how long prior versions of a file are saved after they have been edited or overwritten.

Exclude Risky File Types

To contain and stop the spread of an attack, administrators can block problem file types from syncing.  Syncplicity by Axway File Type Exclusion Policy gives you the ability to preemptively block known crypto document types, for example those with the .locky and .crypt filename extension, and also block potentially malicious executables such as .vbs, .scr, and .exe.

Eliminate or Reduce Email Attachments

Ransomware often enters a system via email when a user unknowingly sets it loose within the organization by opening an infected attachment. One way to reduce your organization’s risk is to train employees to use Syncplicity by Axway to share links to files rather than opening documents directly from their email clients. The Syncplicity by Axway Outlook Add-In automatically transforms email attachments to links or users can copy a Syncplicity by Axway shared link into the body of an email message.

Establish a Recovery Plan

The restoration process after a ransomware attack can be time consuming and costly resulting in significant business impact.  The attackers are betting that you’ll pay the ransom to get business moving again. However, with Syncplicity by Axway, the most critical component of your remediation strategy, recovery of the locked files, is covered.

With your retention policies and multi-folder sync now in place, users can restore files to prior unlocked versions and restore deleted files using the Syncplicity by Axway interface.

Enterprises that have been hit with system-wide breaches impacting multiple users and thousands of files should contact Syncplicity by Axway for assistance.

As the ROI continues to be attractive for attackers, it will likely be some-time before the current wave of ransomware attacks subsides. By following industry guidance and the strategies outlined above you can avoid being the next victim in the headlines.

Knowledge Articles

<![CDATA[Syncplicity by Axway Releases European Cloud Storage]]>,2016:blog/8.1081 2016-04-28T16:23:00Z 2016-04-28T23:18:43Z Brian W Levine

April 2016 has been an exciting month for the privacy community! Legislators in Europe up-voted the General Data Protection Regulation (GDPR), down-voted EU-US Privacy Shield and wait for it… Syncplicity by Axway quietly launched European Cloud Storage!

Syncplicity by Axway is excited to announce the general availability of European (EU) Cloud Storage. This enables Syncplicity by Axway users to choose the physical location of their cloud file storage to meet regional privacy and data sovereignty concerns. With a single-click, customers define their preferred cloud storage region and enterprise admins can configure multiple storage locations for their global user-base.

Data Sovereignty has become increasingly important amidst the wake of Safe Harbor, and companies need cloud solutions that enable them to maintain the highest levels of visibility and control over their data. While data regulators have rejected the EU-US Privacy Shield agreement, global enterprises must ensure they remain in compliance with regional privacy laws, protect employee personal information, and preserve the confidentiality of valuable corporate intellectual property.

Syncplicity by Axway enterprise customers have always had a choice for their storage region with hybrid cloud StorageVaults, and our new EU Cloud Storage option provides additional capability to scale quickly and meet global information governance requirements.

A First for the EFSS Market

Syncplicity’s model is unique in providing a ‘single pane of glass’ end-user experience, while providing maximum visibility and control for IT to choose the right storage location, based on national sovereignty, data sensitivity, and other business logic.

Within a single enterprise account, admins can define multiple storage policies for their global deployments, leveraging on-premises storage, private cloud, and Syncplicity by Axway’s cloud storage within a single seamless user experience. Folders and files can be securely shared globally, while maintaining control of where the data is stored and who owns the content.

End-users are able to access data in multiple storage locations and access shares from multiple companies, with a single log-in. Similar offerings in the market require end-users to create multiple unique accounts for each storage location, which results in account sprawl, a broken user-experience, and a nightmare for IT governance. 

In contrast to Syncplicity by Axway, cloud-only EFSS providers do not offer the flexibility to use private cloud, public cloud, and on-premises storage within a single account - with popular cloud-only solutions, enterprises are forced to move all of their data to a multi-tenant public cloud for storage and processing, which opens potential for data leakage and breach of confidentiality. 

Enabling Global and Mid-size enterprises to adopt the cloud

Syncplicity’s data governance model is especially appealing to large enterprises with business operations and employees located around the globe. Mid-sized enterprises that do not have the resources to manage a hybrid cloud are excited to have a regional cloud storage layer that allows them to rapidly deploy and scale.

While model clauses and binding corporate rules provide the legal framework for meeting European Data Privacy Regulations, Syncplicity by Axway’s Hybrid Cloud and EU Cloud Storage provides customers the highest level of control over the physical and logical security of their data.

More information

The feature is generally available and included with Personal, Business, and Enterprise Edition. Additional details on how to configure EU Cloud Storage for your account are available here.

Looking forward

While we have consistently led the EFSS market in offering true security and privacy controls, we are excited to add EU Cloud Storage as the latest component in our architecture. Combined with our policy driven hybrid cloud, group-based security policies, integrated rights management, and zero-content-knowledge StorageVault Authentication, EU Cloud Storage is an integral part of a multi-layered approach to data governance, privacy, and security. 

In the coming months we have many more exciting enhancements on our security roadmap and I look forward to keeping you updated!

<![CDATA[EMC World Las Vegas 2016]]>,2016:blog/8.1074 2016-04-22T16:36:00Z 2016-04-25T18:19:41Z

Visit Syncplicity by Axway in Booth #159, Hall C

  • Gain anytime, anywhere access to all of your data from any device
  • Replace file shares to modernize infrastructure and reduce costs
  • Maximize your EMC investment with Syncplicity by Axway + ECS and Syncplicity by Axway + Isilon 

We invite you to attend our EMC World speaking sessions:

ECS - What’s New & Strategic Roadmap
Breakout Session, with featured customer Siemens
When: Monday, May 2nd, 1:30pm – 2:30pm
Location: Murano 3201a
Add to my calendar

The Future of Enterprise File Sync and Share
Jon Huberman, Syncplicity by Axway CEO, and Virtustream
When: Tuesday, May 3rd, 2:00pm – 2:20pm
Location: Virtustream Booth #656
Add to my calendar

Improve data access and stakeholder engagement while dramatically lowering storage costs
Jon Huberman, Syncplicity by Axway CEO
When: Wednesday, May 4th, 12:00pm – 12:20pm
Location: Fireside Chat Booth #1128
Add to my calendar

ECS — What’s New & Strategic Roadmap
Breakout Session, with featured customer Siemens
When: Wednesday, May 4th, 3:00pm – 4:00pm
Location: Palazzo L
Add to my calendar

<![CDATA[Synpclicity’s Got Your Back #WorldBackupDay]]>,2016:blog/8.1061 2016-03-30T19:33:00Z 2016-03-31T07:03:48Z

Let’s celebrate – because today is a reminder that you have one less thing to worry about! 

With Syncplicity by Axway your sync’d folders are backed up in real-time no matter where they are located and that means your files are available on any device – so if your computer or mobile device crashes, or is lost or stolen – you can still access your files from any device and you can sync them onto a new computer.

If you want to learn more about how to ensure your teams are backed-up contact your Customer Success Manager.