Syncplicity Blog 2016-12-21T17:55:49Z Copyright (c) 2016, Caitlin Grega ExpressionEngine tag:syncplicity.com,2016:12:21 <![CDATA[SyncDrive: Size Does Not Matter]]> tag:syncplicity.com,2016:blog/8.1186 2016-12-21T13:27:00Z 2016-12-21T17:55:49Z Kristie Conner

SyncDrive: Size Does Not Matter

The amount of unstructured data in home directories, group shares and network drives across the enterprise is staggering and the overall amount of information is growing exponentially as the world becomes more digital. The reality is that we are just at the beginning – the volume of data is exploding, more data has been created in the past two years than in the entire history of the human race. That is a lot of data – and it begs the question: what do we do with that data, and exactly how do knowledge workers access it?

Syncplicity has an answer – SyncDrive. While we might not be solving all your unstructured data needs (okay, 90% of them), if you choose Syncplicity we can help you untangle your home directories and group shares and at the same time modernize your file storage infrastructure – along with providing access to all your data via the desktop, laptop and mobile devices. Imagine, being able to give your enterprise users VPN-less access to all their enterprise content from any device, where data size does not matter. 

Now, imagine being a user and, never having to worry (again) about having enough space on your device or maneuvering and moving files so you have just the right ones when you need them. SyncDrive redefines how users work with large volumes of data across the enterprise. Users can selectively sync the files they need, and the intelligent cache feature ensures they never need to worry about running out of storage.

SyncDrive is a revolutionary feature that will have an immediate impact on the user and IT. What about the value to the overall enterprise? For a typical Fortune 1,000 company, just a 10 percent increase in data accessibility will result in more than $65 million additional net income. With SyncDrive, we make this possible.

This new SyncDrive feature is now available and extends our digital transformation lead by enabling enterprises to modernize their IT infrastructure and access petabytes of data stored in legacy file shares.”

Read ‘Syncplicity’s New SyncDrive Feature Unlocks Unprecedented Access to Data’ press release here.

]]>
<![CDATA[Syncplicity PrivacyRegions Answers Data Protection Requirements]]> tag:syncplicity.com,2016:blog/8.1188 2016-12-19T13:43:00Z 2016-12-19T22:55:08Z Kristie Conner

Syncplicity PrivacyRegions Answers Data Protection Requirements

Syncplicity is raising the technology architecture bar with a new EFSS innovation that ensures corporate compliance without getting in the way of user productivity. Syncplicity PrivacyRegions allows companies to remain compliant with region-specific data protection and residency regulations while still allowing their users to seamlessly share folders and files with users and companies based in other regions. Personal information (PII) and corporate meta-data is never processed or stored in other regions.

Syncplicity PrivacyRegions uniquely combines regional cloud services, policy-driven hybrid cloud storage and a new privacy driven architecture. Today, we’re pleased to announce that Syncplicity European Union (EU) PrivacyRegion is generally available. This design enables EU-based enterprises to confine the storage and processing of all their files, meta-data, and personal information to the EU region. 

Seamless User Experience

Syncplicity is the only EFSS provider to offer regional cloud services that do not restrict user sharing. We allow users to seamlessly collaborate across regions with a single account, while maintaining all the information—including meta-data—within a designated region. For example, with Syncplicity, an enterprise’s storage and control plane can be in Europe. Other EFSS vendors allow customers to choose a geographic zone for file storage, but they process and store all meta-data, such as filenames, PII, and significant indexing of regional files’ content in U.S.-based cloud services. By contrast, Syncplicity PrivacyRegions segregates a company’s meta-data, PII and file storage to its chosen region. For example, customers who choose Syncplicity EU PrivacyRegion are assured all of their information is kept within Europe.

Syncplicity is the first vendor to provide regional cloud services allowing users to seamlessly collaborate across regions without requiring multiple user accounts for each region. Syncplicity’s solution is unique in segregating all data to specific regions, while still providing users ‘a single-pane-of-glass’ experience and seamless collaboration across regions.

Syncplicity’s release of PrivacyRegions builds upon a long-standing posture of data privacy compliance. Our ‘data protection by default’ strategy provides a flexible architecture with the necessary granular privacy, confidentially and data sovereignty controls built-in, giving our customers the right tools to adapt to evolving regional legislation and business requirements across the enterprise.

To learn more about how Syncplicity ensures compliance with global privacy and security regulations, please click here.

]]>
<![CDATA[Hybride Speicher und Datenschutz: So sorgen Sie für Compliance]]> tag:syncplicity.com,2016:blog/8.1185 2016-12-06T15:54:00Z 2016-12-06T16:06:15Z Jon Huberman Mit Big Data und dem Internet of Things kommen auf klassische Storage-Architekturen neue Aufgaben zu, denen sie immer weniger gerecht werden können – sie sind oft zu starr und unflexibel. Ein Ausweg könnte Enterprise File Sync & Share (EFSS) sein, das vorhandene und neue Speicher zu hybriden Strukturen zusammenführt. Wo liegen die Stärken eines EFSS-Systems und welche Faktoren insbesondere im Datenschutz spielen eine besondere Rolle? Lesen Sie dazu mehr in diesem Artikel.

Nicht alle Daten müssen in die Cloud. Bei einigen ergibt dies jedoch durchaus Sinn. EFSS hilft bei der Umsetzung.

Weltweit nehmen die Datenmengen durch Big Data oder Internet of Things zu. Bisherige Ansätze wie die exklusive Speicherung von Daten auf eigene Storage-Strukturen bedienen oftmals die neuen Anforderungen nur noch unzureichend. Besonderer Flaschenhals kann dabei das klassische Storage-Management werden. Ein Ende dieser Entwicklung ist bei einem globalen Gesamtdatenvolumen von 8,5 Zettabyte kaum absehbar – bis zum Jahr 2020 erwarten Marktforscher eine Steigerung auf 40 Zettabyte.

In Deutschland kommen zu dieser Entwicklung darüber hinaus auch noch verschiedene Auflagen des Datenschutzes hinzu. Wegen dieser besonderen Ausgangslage können Unternehmen nicht einfach den günstigsten Cloud-Storage-Anbieter wählen, sondern müssen explizit die Vereinbarkeit der einzelnen Lösungen mit den jeweils geltenden Vorschriften abgleichen.

Weltweit nehmen die Datenmengen durch Big Data oder Internet of Things zu. Bisherige Ansätze wie die exklusive Speicherung von Daten auf eigene Storage-Strukturen bedienen oftmals die neuen Anforderungen nur noch unzureichend. Besonderer Flaschenhals kann dabei das klassische Storage-Management werden. Ein Ende dieser Entwicklung ist bei einem globalen Gesamtdatenvolumen von 8,5 Zettabyte kaum absehbar – bis zum Jahr 2020 erwarten Marktforscher eine Steigerung auf 40 Zettabyte.

In Deutschland kommen zu dieser Entwicklung darüber hinaus auch noch verschiedene Auflagen des Datenschutzes hinzu. Wegen dieser besonderen Ausgangslage können Unternehmen nicht einfach den günstigsten Cloud-Storage-Anbieter wählen, sondern müssen explizit die Vereinbarkeit der einzelnen Lösungen mit den jeweils geltenden Vorschriften abgleichen.

Bei der Wahl zwischen Cloud- und On-Premise-Storage stehen Entscheider vor einem Dilemma. Während lokale Strukturen rasch an die Grenzen der eigenen Kapazität stoßen können, fehlt bei Cloud-Angeboten die Nachvollziehbarkeit des konkreten Speicherorts der manchmal unternehmenskritischen Daten. Die Nachvollziehbarkeit der Ablage ist allerdings je nach Branche und Art der Daten aufgrund von staatlichen oder unternehmensinternen Regularien erforderlich. Deswegen kommen hier Cloud-Anbieter mit Speicherorten außerhalb der Europäischen Union, beispielsweise US-Provider, nicht in Frage.

Flexibilität und Sicherheit
Die Frage, ob bei der Datenspeicherung mehr Flexibilität oder mehr Sicherheit gewünscht wird, lässt sich auf einfache Weise beantworten: beides, denn beides ist für die Unternehmen von zentraler Bedeutung. Der Ansatz, um hier die Bedürfnisse der Kunden erfolgreich zu adressieren, heißt Enterprise File Sync & Share (EFSS). Mit EFSS sind die Vorteile beider Welten verfügbar. Hier können weniger sensible Daten in die Cloud wandern, die automatisch mit den Anforderungen mitwächst. Unternehmenskritische Daten hingegen sind auf lokalen Strukturen besser aufgehoben. Mit einer Policy Engine, wie sie beispielsweise Syncplicity anbietet, können Administratoren Richtlinien zur Behandlung verschiedener Datentypen festlegen.

Bei global agierenden Unternehmen lassen sich Daten so automatisch auf den Servern oder Cloud-Diensten der einzelnen Regionen speichern, während sie den länderübergreifenden Arbeitsgruppen zur Verfügung stehen. Der Unterschied zum klassischen Administrationsansatz, bei dem dies prinzipiell auch zu bewerkstelligen ist, ist die Automation sowie der bessere Überblick über die vorhandenen Daten. Nebenbei umgehen Unternehmen so auch überflüssige Redundanzen. Ein Aspekt der bei der gesetzeskonformen Speicherung gerne übersehen wird, sind die Meta-Daten. Falls die originären Daten gesetzeskonform zwar in der EU liegen, ist in vielen Fällen ausländischen Behörden ein Rückschluss auf die Unternehmensaktivitäten durch die Auswertung der Metadaten möglich. Im Idealfall regelt eine Policy Engine mittels der PrivacyRegions die korrekte Distribution dieser speziellen Daten gleich mit.

Seite 2 - Hybride Speicher und Datenschutz: So sorgen Sie für Compliance

Daneben können Unternehmen mit einem EFSS-System flexibler auf veränderte Datenvolumen reagieren. Hier lassen sich weniger kritische Daten temporär von On-Premise auf die Cloud auslagern, ohne dass versehentlich kritische Informationen mitwandern. Eine EFSS-Lösung weist dabei den Speicherort gemäß den vorab definierten Policies automatisch zu. Damit bietet EFSS eine skalierbarere Umgebung als klassische Speicherlösungen.

Alleine schon aus rechtlichen Gründen ist die Nutzung eines EFSS-Systems bei komplexeren Problemstellungen ratsam, denn die gleichzeitige Nutzung von Cloud-Storage und lokalen Speichern könnte ohne eine gemeinsame Einbettung in ein Managementsystem dazu führen, dass klassifizierte Daten an einem ungeeigneten Standort gesichert werden. So haben beispielsweise Personal- und Gehaltsdaten nichts auf einem Cloud-Speicher zu suchen, dessen Sicherheitsmaßnahmen durch den Provider nicht abschließend geklärt werden konnten.

Organisatorische Erleichterung durch EFSS
Jedoch hilft eine EFSS-Lösung auch dabei, die Organisation in der IT zu vereinfachen. So fällt bereits einiges an Aufwand alleine dadurch weg, dass nicht jede Speicherplattform für sich organisiert werden muss. Speicher- und Synchronisationszugriffe erfolgen unter einem Dach. Dadurch werden auch mehrere in verschiedenen Versionen gespeicherten Daten vereint. Ein konsolidierter Datenstand steht auf diese Weise zur Verfügung.

Nicht zuletzt ergeben sich Einsparpotentiale, denn die dynamische und Policy-gestützte Datenverteilung hilft, die Strukturen schlank zu halten und die Bereitstellung überflüssiger Ressourcen zu vermeiden. Dies ist bei der Nutzung von Cloud-Storage auch möglich, doch nur zu dem Preis der mangelnden Einflussnahme auf die Verteilung der Daten. Dies gilt natürlich auch für einen Filialbetrieb, bei dem die Vorhaltung lokaler IT vollkommen reduziert werden kann.

Arbeitswelt im Wandel
Mit der zunehmenden Nutzung eigener Endgeräte oder flexibleren Arbeitsmodellen wie dem Home Office stellt sich für die Unternehmens-IT die Frage, wie mit Daten auch in Hinblick auf eine unternehmensferne oder dezentrale Nutzung zu verfahren ist. Informationen stehen hier in nicht kontrollierten Raum zur Verfügung und die Gefahr eines Datendiebstahls steht permanent im Raum. Aus diesem Grund sollte ein ausgeklügeltes Synchronisationsmanagement die Dateien zur Verfügung stellen, die für die Bearbeitung von Geschäftsprozessen unbedingt erforderlich sind. Auch hier stellt ein EFSS-System sicher, dass der Zugriff entweder zeitlich oder auf Geräteebene begrenzt gewährt wird, damit unternehmenskritische Informationen an ihrem vorgeschriebenen Ort verbleiben.

Mehr Schutz vor Ransomware
Der Albtraum eines jeden Administrators ist es, wenn sich die Rechner der Nutzer mit einer Verschlüsselungs-Schadware infizieren. Selbst nach der Zahlung eines Lösegelds an den Cyberkriminellen, der die Ransomware entwickelt hat, ist der Zugriff auf die Daten keinesfalls garantiert. Die EFSS-Lösung von Syncplicity etwa bietet hier einen guten Schutz. Durch das Storage-Management werden Daten permanent in verschiedenen Generationen gesichert, sodass eine Restaurierung wichtiger Informationen jederzeit möglich ist.

Im Gegensatz zu herkömmlichen Cloud-Synchronisationen kommt hier nicht nur ein "magischer Ordner" zum Einsatz, bei dem die Verschlüsselung durchsynchronisiert wird, sondern mehrere. Diese lassen sich dann voneinander isoliert behandeln. Damit minimiert sich das Risiko, dass alle Datenbereiche unbrauchbar werden. Außerdem stellt EFSS sicher, dass riskante Dateitypen von der Synchronisation ausgenommen werden. Ferner können bei Nutzung der Share-Funktion Mailanhänge seltener verwendet werden, was auch hier du einer Verringerung des Risikos führt. Sollte der Worst Case allerdings eingetreten sein, erstellt EFSS einen Recovery Plan, nach dem sich die befallenen Dateien sukzessive rasch wiederherstellen lassen.

Fazit
Herkömmliche Storage-Architekturen sie sind oft zu starr und unflexibel. Ein Ausweg könnte Enterprise File Sync & Share bieten, das vor allem beim Datenschutz seine Stärken ausspielt und es vermag, vorhandene und neue Speicher zu hybriden Strukturen zusammenzuführen.

Read original article here.

]]>
<![CDATA[Ransomware is on the rise prepare your business for the worst]]> tag:syncplicity.com,2016:blog/8.1182 2016-12-01T17:27:00Z 2016-12-01T17:39:40Z Brian W Levine Cyber criminals are increasingly turning to ransomware as a form of blackmail to exploit public and private enterprises. It’s estimated that the cost of ransomware attacks will total over $1bn this year – and researchers warn that the problem is only going to grow. Hackers are not only increasingly sophisticated, but also getting bolder in their approach and so the most insidious computer crime today doesn’t involve viruses or stealing credit card numbers but comes in the form of ransomware. These rogue programs have the ability to hold an entire organisation’s data hostage with unbreakable encryption, while the cybercriminals demand a ransom for the decryption key.

These attacks are becoming increasingly common. In the past few months alone, new and more powerful ransomware has appeared, with criminals targeting sensitive entities such as NHS hospitals and local councils. In fact, almost 30 NHS trusts admit that they have been the victims of ransomware attacks in the past 12 months, while 30% of UK councils were victims of ransomware in 2015.

The reasons for ransomware flourishing are two-fold.

Firstly, basic economics. Stealing credit card details and selling them on the black market can be time-consuming with a potential payoff of less than a dollar per card, so cybercriminals are turning to ransomware to sit back and wait for victims to pay up. Less work for greater returns!

Secondly, ransomware is very difficult to avoid. A single click within an email or website is all it takes for an unsuspecting employee to activate the code that encrypts an entire system and triggers a ransom demand. Even if an enterprise has the most updated anti-virus software or access restrictions on sensitive files, it remains vulnerable to ransomware via just one unsuspecting user.

However, all is not lost. Organisations can take steps to mitigate the effects of attacks and recover normal operations in minutes or hours – if the proper precautions and recovery plans are in place. The most important recovery element is real-time protection of data, which means backup copies of all files and data are stored securely off-site rather than on local servers. In order for this to be effective, it needs to be accomplished automatically, whereby a copy is made every time a file is edited or saved. Backups like this let a business “roll back” to the moments before a ransomware attack and recover all its files – even in cases where the ransomware has migrated across the local network and servers.

To do this, the software or service a business uses to create the backup must be capable of excluding all encryption files known to be associated with ransomware. Businesses need to avoid restoring the files that delivered the ransomware in the first place.

Last but not least, businesses need an effective retention policy – whether that is to retain deleted files forever or for a specified time period. Establishing a retention policy will allow the business to retrieve the original files after the ransomware attack. This is an integral part of any recovery plan as it removes the need for costly recovery processes, which are often time-consuming, meaning the business can be up and running again with the least disruption to the operation.

In today’s technological age cybercriminals are an unfortunate reality. Businesses therefore should think ‘not if, but when we are attacked’ and take all the necessary precautions to ensure that the attack causes the least amount of damage to the business. By being aware and maintaining the right backup strategy, your company can minimise the damage from these attacks and turn the tables on this latest generation of attacks.

Read original theCsuite.co.uk article written by Brian W. Levine, Syncplicity Security Officer here.

]]>
<![CDATA[Thank you, CIOReview!]]> tag:syncplicity.com,2016:blog/8.1180 2016-11-30T21:22:00Z 2016-12-01T00:51:22Z Kristie Conner

If you have not opened the latest issue of CIOReview Magazine, then let us tell you first!  We were recognized by CIOReview as one of the “20 Most Promising Compliance Solution Providers of 2016”.  It’s an annual listing by CIOReview of 20 companies that are on the forefront of providing compliance solutions and impacting the marketplace.

“Syncplicity’s role in modernizing legacy infrastructure to keep data safe and compliant is noteworthy.  The company offers users an easy to use file sharing and collaboration solution with complete control of their data while fully adhering to compliance requirements.”

To read the full article on Syncplicity “Bolstering Secure Frameworks for File Sharing” click here

To learn how we can help your organization kickstart IT infrastructure modernization to reduce costs and empower your digital workplace, please email us at sales@syncplicity.com

]]>
<![CDATA[A Different Kind of Sharing]]> tag:syncplicity.com,2016:blog/8.1173 2016-11-03T15:58:00Z 2016-11-09T15:10:34Z Kristie Conner

Most of us have been to tradeshows and fallen for the free giveaways.  Those little trinkets look so alluring under the lights and in the excitement of the show.  One year I recall bartering with another vendor for one of their selfie sticks, thinking that is kind of cool, but in reality I don’t take selfies – so it sits around in its unused glory taking up space.  And, it’s cheaply made. How many times have I brought stuff home just to be thrown away or collect dust?

The #truthis I don’t pick up any stuff anymore, or almost never.  

For our upcoming show Gartner ITExpo in Barcelona the marketing team came up with a new idea. We decided to select a charity and for every person who gets scanned at our booth we will donate 2 Euros to an important cause.  The cause chosen for the Gartner ITExpo in Barcelona is Solar Aid, an International charity that combats poverty and climate change by providing access to solar lights in some of the most remote regions of Africa.

If you are headed to Barcelona stop by our booth to get scanned, get a “I donated to Solar Aid through Syncplicity” sticker and support an organization that is doing great work #ADifferentKindofSharing!

Just Five Scans

Just 5 Scans at our booth will result in 3 Solar Lights, 13 People Reached, £435 Saved by Families, 3018 Extra hours of child study time, 3.2 tonnes of CO2 emissions everted and 6 people experiencing better health.

Visit the Syncplicity Booth (#403) and participate in a Different Kind of Sharing.

]]>
<![CDATA[Affiliate Sharing: Helping Enterprises Build their Digital Ecosystem of Trust]]> tag:syncplicity.com,2016:blog/8.1152 2016-10-03T19:18:00Z 2016-10-04T17:46:27Z Kristie Conner

In a recent Enterprise Strategy Group (ESG) research study, they found that 98% of IT and security professionals were extremely concerned with having technologies in place to ensure policies are applied to the sharing of sensitive data. Our newest product enhancement, affiliate sharing, does just that.  Affiliate sharing extends sharing and collaboration capabilities to include a trusted network of specific partners and customers, in essence helping enterprises build their digital ecosystem of trust.

IT often blocks external sharing due to the perceived security risks, but their digital workers are looking for ways to share large files and folders with partners and customers, even if that means using consumer (shadow IT) file sharing tools.  Our latest product enhancement gives digital workers a secure and seamless way to share files and folders within their digital ecosystem, building a ‘trusted network’, while maintain the level of security control required by IT.

“External sharing is critical to Texas A&M University, and Syncplicity’s new controls give me confidence that my teams can share files and folders securely among our trusted group of organizations,” said Danny Miller, CISO System Chief Information Security Officer at Texas A&M University. “In today’s digital world, the firewall is no longer the boundary for data and information sharing. These new Syncplicity enhancements enable us to lock down sharing within a trusted group of affiliated organizations, helping us stay compliant and secure – maintaining central control while enabling easy end-user collaboration.”

Affiliate Sharing offers a comprehensive set of controls that allow you to:

  • Build a trusted digital environment for extending file sharing with partners and customers by assigning specific groups of users the domains with whom external sharing is approved.
  • Extend security controls and sharing policies to both outbound and inbound folder sharing separately, based on Active Directory group membership.
  • Leverage new folder re-sharing rights controls to override company wide and group-based external sharing policies to ensure that users who are approved to share externally cannot expose specific confidential information.
  • Shut down data leakage by optionally setting inbound folder sharing for specific groups of users to be read-only.

To start building your digital ecosystem of trust, checkout the new additions to Syncplicity’s group-based policies and security controls, or to learn more about these and other security features contact your Syncplicity Customer Success Manager.

]]>
<![CDATA[Collaborate in Microsoft Office with the Syncplicity App Tab]]> tag:syncplicity.com,2016:blog/8.1135 2016-08-17T15:06:00Z 2016-08-17T17:32:36Z Doug Benson

The pace of today’s collaborative work often requires editing files that are shared among multiple people. But collaborating with others in real-time can create problems. Does someone else have the document open right now? Will my changes get overwritten? Am I looking at the latest version?

There have been several approaches to this problem, including real-time editing within a browser. But the vast majority of Enterprise documents are created and edited in desktop versions of Microsoft Office applications. These applications are the gold standard, and present in nearly every office environment worldwide. So Syncplicity set out to address the real-time viewing and editing problem directly at the source.

The Syncplicity App Tab is a collaboration feature that works with desktop versions of Microsoft Word, Excel and PowerPoint, from Office 2007 through Office 2016 (included with Office 365). The App Tab was introduced in the Syncplicity desktop client version 4.1.0 for Windows. In future releases we will bring the feature to Mac and mobile clients as well.

When you use Microsoft Word, Excel or PowerPoint to open a file inside a shared folder, the Syncplicity App Tab displays. The App Tab helps you avoid accidental file conflicts when collaborating on shared files, with visible notifications when a file’s status changes. Popup notifications display directly inside Microsoft Office when other people view a file that you are also viewing, when someone else starts editing that file, or when a newer version of that file becomes available.

Learn More

Get an entertaining and in-depth tour of the new App Tab in just over 7 minutes by watching our Syncplicity App Tab Video Guide. Amaze your friends! We also created a written guide to Using the Syncplicity App Tab, if reading is more your thing.

Enjoy collaborating with the Syncplicity App Tab, and send us feedback!

]]>
<![CDATA[Ransomware Prevention & Recovery with Syncplicity]]> tag:syncplicity.com,2016:blog/8.1130 2016-08-01T14:36:00Z 2016-08-03T13:56:31Z Brian W Levine

To say ransomware is a growing threat is an understatement.  With multiple public warnings from US and European law enforcement, a growing tally of high-profile incidents, and new guidance on HIPAA breach notifications, business leaders across industries are justifiably nervous.  While there is no foolproof way to prevent an attack, there are measures you can put in place today to better defend against this new and very destructive type of malware. Additionally, when an attack does slip through the defenses, a quick recovery is possible if you have a solid remediation plan in place.

As the saying goes, ‘an ounce of prevention is worth a pound of cure’. With that adage in mind, here are a few practical guidelines you and your organization should implement today, to get the maximum ransomware prevention and recovery mileage from Syncplicity. Be sure to check out the links below for detailed instructions to implement these tips.

Back-Up Files in Real-Time

While there is no single solution for preventing ransomware attacks, a consistent recommendation from experts across the industry is ‘Backup, Backup, Backup’. For most enterprise users (and consumers), that’s easier said than done.  It’s a behavior that often requires extra manual steps and backup jobs that usually never complete.  However, with Syncplicity, continuous backup is easy and seamless. Files and folders are backed up automatically in real-time, meaning you start syncing all your folders just once and move on, eliminating worries about data loss.

Utilize Multi-Folder Sync

Our unique EFSS feature, Multi-Folder Sync, allows users to back up every folder on their desktop automatically.  The design of this features allows users and admins to sync all files and folders in place without moving them to a “magic folder.”  In the unfortunate event your company or a user is breached by ransomware, they have back-ups of every file in every folder on Syncplicity, not just the few files they remembered to copy to the single “magic” sync folder of other EFSS solutions. 

We recommend that you educate your users to sync all their critical files and folders, including Desktop and My Documents. As an administrator, you also have the ability to proactively specify the sync of any desktop folders to ensure that your corporate users are safe. 

Establish an Enterprise Retention Policy

The most common ransomware variants attack by deleting files and replacing them with renamed encrypted versions, or by retaining filenames and encrypting the contents in place. In both cases, Syncplicity retention policies will enable you to ensure the files can be recovered.

The Syncplicity deleted files retention policy allows you to retain deleted files forever or for a specified time period, so that your original files can be retrieved after they are deleted by ransomware. Administrators should also review your file versions retention policy which controls how long prior versions of a file are saved after they have been edited or overwritten.

Exclude Risky File Types

To contain and stop the spread of an attack, administrators can block problem file types from syncing.  Syncplicity File Type Exclusion Policy gives you the ability to preemptively block known crypto document types, for example those with the .locky and .crypt filename extension, and also block potentially malicious executables such as .vbs, .scr, and .exe.

Eliminate or Reduce Email Attachments

Ransomware often enters a system via email when a user unknowingly sets it loose within the organization by opening an infected attachment. One way to reduce your organization’s risk is to train employees to use Syncplicity to share links to files rather than opening documents directly from their email clients. The Syncplicity Outlook Add-In automatically transforms email attachments to links or users can copy a Syncplicity shared link into the body of an email message.

Establish a Recovery Plan

The restoration process after a ransomware attack can be time consuming and costly resulting in significant business impact.  The attackers are betting that you’ll pay the ransom to get business moving again. However, with Syncplicity, the most critical component of your remediation strategy, recovery of the locked files, is covered.

With your retention policies and multi-folder sync now in place, users can restore files to prior unlocked versions and restore deleted files using the Syncplicity interface.

Enterprises that have been hit with system-wide breaches impacting multiple users and thousands of files should contact Syncplicity for assistance.

As the ROI continues to be attractive for attackers, it will likely be some-time before the current wave of ransomware attacks subsides. By following industry guidance and the strategies outlined above you can avoid being the next victim in the headlines.

Knowledge Articles

]]>
<![CDATA[Syncplicity Releases European Cloud Storage]]> tag:syncplicity.com,2016:blog/8.1081 2016-04-28T16:23:00Z 2016-04-28T23:18:43Z Brian W Levine

April 2016 has been an exciting month for the privacy community! Legislators in Europe up-voted the General Data Protection Regulation (GDPR), down-voted EU-US Privacy Shield and wait for it… Syncplicity quietly launched European Cloud Storage!

Syncplicity is excited to announce the general availability of European (EU) Cloud Storage. This enables Syncplicity users to choose the physical location of their cloud file storage to meet regional privacy and data sovereignty concerns. With a single-click, customers define their preferred cloud storage region and enterprise admins can configure multiple storage locations for their global user-base.

Data Sovereignty has become increasingly important amidst the wake of Safe Harbor, and companies need cloud solutions that enable them to maintain the highest levels of visibility and control over their data. While data regulators have rejected the EU-US Privacy Shield agreement, global enterprises must ensure they remain in compliance with regional privacy laws, protect employee personal information, and preserve the confidentiality of valuable corporate intellectual property.

Syncplicity enterprise customers have always had a choice for their storage region with hybrid cloud StorageVaults, and our new EU Cloud Storage option provides additional capability to scale quickly and meet global information governance requirements.

A First for the EFSS Market

Syncplicity’s model is unique in providing a ‘single pane of glass’ end-user experience, while providing maximum visibility and control for IT to choose the right storage location, based on national sovereignty, data sensitivity, and other business logic.

Within a single enterprise account, admins can define multiple storage policies for their global deployments, leveraging on-premises storage, private cloud, and Syncplicity’s cloud storage within a single seamless user experience. Folders and files can be securely shared globally, while maintaining control of where the data is stored and who owns the content.

End-users are able to access data in multiple storage locations and access shares from multiple companies, with a single log-in. Similar offerings in the market require end-users to create multiple unique accounts for each storage location, which results in account sprawl, a broken user-experience, and a nightmare for IT governance. 

In contrast to Syncplicity, cloud-only EFSS providers do not offer the flexibility to use private cloud, public cloud, and on-premises storage within a single account - with popular cloud-only solutions, enterprises are forced to move all of their data to a multi-tenant public cloud for storage and processing, which opens potential for data leakage and breach of confidentiality. 

Enabling Global and Mid-size enterprises to adopt the cloud

Syncplicity’s data governance model is especially appealing to large enterprises with business operations and employees located around the globe. Mid-sized enterprises that do not have the resources to manage a hybrid cloud are excited to have a regional cloud storage layer that allows them to rapidly deploy and scale.

While model clauses and binding corporate rules provide the legal framework for meeting European Data Privacy Regulations, Syncplicity’s Hybrid Cloud and EU Cloud Storage provides customers the highest level of control over the physical and logical security of their data.

More information

The feature is generally available and included with Personal, Business, and Enterprise Edition. Additional details on how to configure EU Cloud Storage for your account are available here.

Looking forward

While we have consistently led the EFSS market in offering true security and privacy controls, we are excited to add EU Cloud Storage as the latest component in our architecture. Combined with our policy driven hybrid cloud, group-based security policies, integrated rights management, and zero-content-knowledge StorageVault Authentication, EU Cloud Storage is an integral part of a multi-layered approach to data governance, privacy, and security. 

In the coming months we have many more exciting enhancements on our security roadmap and I look forward to keeping you updated!

]]>
<![CDATA[EMC World Las Vegas 2016]]> tag:syncplicity.com,2016:blog/8.1074 2016-04-22T16:36:00Z 2016-04-25T18:19:41Z

Visit Syncplicity in Booth #159, Hall C

  • Gain anytime, anywhere access to all of your data from any device
  • Replace file shares to modernize infrastructure and reduce costs
  • Maximize your EMC investment with Syncplicity + ECS and Syncplicity + Isilon 

We invite you to attend our EMC World speaking sessions:

ECS - What’s New & Strategic Roadmap
Breakout Session, with featured customer Siemens
When: Monday, May 2nd, 1:30pm – 2:30pm
Location: Murano 3201a
Add to my calendar

The Future of Enterprise File Sync and Share
Jon Huberman, Syncplicity CEO, and Virtustream
When: Tuesday, May 3rd, 2:00pm – 2:20pm
Location: Virtustream Booth #656
Add to my calendar

Improve data access and stakeholder engagement while dramatically lowering storage costs
Jon Huberman, Syncplicity CEO
When: Wednesday, May 4th, 12:00pm – 12:20pm
Location: Fireside Chat Booth #1128
Add to my calendar

ECS — What’s New & Strategic Roadmap
Breakout Session, with featured customer Siemens
When: Wednesday, May 4th, 3:00pm – 4:00pm
Location: Palazzo L
Add to my calendar

]]>
<![CDATA[Synpclicity’s Got Your Back #WorldBackupDay]]> tag:syncplicity.com,2016:blog/8.1061 2016-03-30T19:33:00Z 2016-03-31T07:03:48Z

Let’s celebrate – because today is a reminder that you have one less thing to worry about! 

With Syncplicity your sync’d folders are backed up in real-time no matter where they are located and that means your files are available on any device – so if your computer or mobile device crashes, or is lost or stolen – you can still access your files from any device and you can sync them onto a new computer.

If you want to learn more about how to ensure your teams are backed-up contact your Customer Success Manager.

]]>
<![CDATA[How is Syncplicity transforming the digital workplace?  Together, with partners like Microsoft.]]> tag:syncplicity.com,2016:blog/8.1041 2016-02-25T12:54:00Z 2016-02-25T17:50:49Z

Walking around Syncplicity’s office, you hear two words popping up all over the place: transformation and enterprise. They are passed back and forth between gulps of espresso and Red Bull; come alive during heated debates; and stand proudly as pillars of our product roadmap.

We have always developed solutions that integrate at some level with Microsoft solutions. But when we joined Microsoft’s Cloud Storage Partner Program (CSPP) last year, we were presented an opportunity to add a whole new dimension. Fueled by our mission to digitally transform the enterprise, we immediately began work on native integrations that address our enterprise customers’ greatest needs.

We recently announced the first of these new products: A Universal Outlook Add-in for Office 365. There is much more to come this year, beginning with in-use file notifications, which will enhance collaboration on Office files and add capabilities to document creation and workflow editing.

“Our customer base is the enterprise, and our product roadmap is focused on their needs,” said Syncplicity CEO Jon Huberman. “Developing enterprise-grade solutions with a deep level of native integration takes a lot of work and investment. In 2015, we kicked off development efforts to eliminate pain points for Office 365 users and help IT prepare for the adddition of cloud-based Office solutions. Our future development efforts will continue to leverage our Microsoft partnership to make the digital transformation of the enterprise a reality.”

We are passionate about meeting the requirements of our enterprise customers, who have complex infrastructures, yet want to offer cloud and mobile-first experiences to their end-users. By coordinating closely with our enterprise customers, we ensure that our development efforts maintain strict focus on their needs. Partnering directly with Microsoft presents a world of opportunity for new enterprise-grade features and capabilities that will help create the digital workplace of the future, and we intend to take it as far as it can go!

For more information on Syncplicity and Microsoft click here.

Read 'Syncplicity Microsoft Outlook Add-in for Office 365 to Transform the Digital Workplace' press release here.

]]>
<![CDATA[Syncplicity covers every aspect of digital transformation.]]> tag:syncplicity.com,2016:blog/8.1042 2016-02-25T12:40:00Z 2016-02-25T17:48:16Z

Building on our existing Windows Office integration, we recently announced the release of Syncplicity’s universal add-in for Office 365. Why Office 365? Because we’re planning for your future. In fact, we’re helping define it.

Imagine your users with the ability to share any size file by linking to it directly from Outlook¾no email attachments involved. Imagine the cost savings achieved by centrally storing one copy of a file instead of 50 email attachments. Imagine robust enterprise-grade security controls such as a link expiry, document-specific passwords, information rights management, group-based permission policies, and true cross-platform, cross-device functionality.

You can stop imagining, because Syncplicity already has it all.

As the technology landscape continues to evolve, Syncplicity is thinking ahead – providing solutions that meet the needs of the digital enterprise.  How we do this?  We offer IT flexibility and choice around local and cloud-based solutions. When the day comes for you to put one foot in the cloud, our Office 365 Outlook add-in means Syncplicity is one less thing you’ll have to worry about.

“Syncplicity’s goal is to help transform the digital workplace by empowering users to be more productive. With Office 365 becoming a platform of choice for large enterprises, the new Syncplicity Outlook add-in does just that,” said Syncplicity CEO Jon Huberman. “This new feature removes a pain point for Office 365 users, reduces infrastructure costs associated with large email attachments, and gives organizations more control over the security of their content.”

As a member of the Microsoft Cloud Storage Partner Program (CSPP), we’ll continue to develop solutions to enhance Microsoft Office collaboration and work closely with our enterprise customers to ensure you’re prepared for the digital workplace of the future.

Read more about our partnership with Microsoft and the CSPP here.

Read 'Syncplicity Microsoft Outlook Add-in for Office 365 to Transform the Digital Workplace' press release here.

]]>
<![CDATA[Backup is a Feature, not a Solution!]]> tag:syncplicity.com,2016:blog/8.1040 2016-02-22T17:45:00Z 2016-02-24T23:30:19Z Mike Nikzad

Significant Business Impact of Lost Documents

In a fast-paced business environment, losing documents that knowledge workers invested time and energy into has a significant impact on your business—missed internal and external deadlines, lost sales analysis numbers, customer meetings without the latest presentation, etc.

When a laptop crashes or is stolen, the resulting productivity loss can turn into days of downtime unless you have a robust real-time document backup and continuous availability solution in place—one that provides instant access to documents from anywhere, on any device.

Backup is a Feature not a Solution

Workers today expect that all their work files are available everywhere and anytime thanks to how they deal with their personal files outside of work. The difference at work is the complexity of the work environment combined with the sensitivity of work information that requires an enterprise rather than consumer-grade solution to anywhere, anytime file access and sharing. Syncplicity Enterprise file sync and share (EFSS) is the answer to their demands by giving them the functionality they are used to and the security that the company requires.

Real-time Document Backup and Continuous Availability

EFSS solutions enable secure backup of desktop files and folders, while providing many complimentary benefits. They allow users to access, view, and edit content from any device, whether they are in the office or on the road. Knowledge workers continue to work as normal, but with the peace of mind that their documents are automatically backed up in real-time whenever they click “Save.” Users can also easily share folders and files with internal and external collaborators. Powerful enterprise-grade administration capabilities that enable IT to implement group-based policies can be used to restrict individuals from sharing designated content outside the company.

To ensure widespread user adoption, your IT team can silently push and install sync clients onto PCs and mobile devices using standard software distribution tools. You can designate specific folders to automatically sync, such as My Documents, Desktop, and as many custom folder paths as required. Users don’t have to remember to copy files to a “magic folder.” Instead, IT ensures that content is reliably managed, simply by selecting folders to auto-sync on user’s computers.

Continuous Access to Files from Anywhere on Any Device

With the evolution of the mobile workforce, your users often have several devices that they use interchangeably while in the office, traveling, meeting on-site with customers, or working at home. Their expectation is that if one device is not available, they can continue to access all of their files from another computer or device and keep working without missing a beat.

Secure, ubiquitous access to backed-up documents through mobile, desktop, and web apps is important to ensure users don’t experience any document access downtime. VPN is not required to access files, so users are free to work from wherever they are, using whatever device is in their hands.

Prevention of Sensitive Data Leakage

The risk associated with data leakage from lost or stolen devices is mitigated by the ability of IT administrators to remote-wipe a device as soon as it is reported missing. Even if an individual outside the company gains access to a device, group-based policies are essential to allow administrators to require app-level passcode entry, preventing malicious access to files.

Group-based policies can also be leveraged to lock down mobile device open-in capabilities to prevent document leakage on unmanaged devices. Integrations with leading mobile device management (MDM) solutions allow IT to configure fine-grained security policies, including white listing trusted apps so data leakage prevention controls do not get in the way of productivity.

Auto-versioning of Backed-up Files with Self-service Version Restore

Real-time document backup is a great way to ensure that valuable time and effort in document authoring is never lost. Network backup solutions often require a user to file an IT helpdesk ticket in order to have a particular version of a file restored, which delays productivity and adds to IT overhead. End-users must be able to directly restore previous file versions on-demand. Of course, rich global-and folderlevel retention settings ensure that old versions are not kept forever.

The Importance of Storage Location Choice for Backing Up Files

Not all files are created equal. External marketing collateral is not the same as board meeting minutes, sales projections, or pending M&A due diligence evaluations. Data sovereignty, corporate compliance, and company intellectual property requirements place a heavy burden on IT to ensure files are stored in a secure location that meets strict regulations—secure enough to ensure your CIO can sleep at night. It is important that IT can choose where backed-up files reside—public cloud storage, private cloud storage, private on-premises storage in your own datacenter, or a hybrid combination. StorageVaults provide unparalleled control and flexibility by enabling IT to assign different groups of users (or folders) to regional or country-based on-premises locations, or to cloud storage.

A Solution to the Shadow IT “Dropbox Problem”

When IT does not provide a backup solution that allows easy access to documents from any device, anywhere, anytime, users quickly find ways to share files with the same consumer systems they use in their personal lives. This introduces many risks associated with data privacy and protection, corporate compliance, and leakage of sensitive company intellectual property. Most CIO’s aren’t aware of how extensive the problem is, and they are often surprised when their team performs a network traffic analysis that reveals how prevalent the “Dropbox problem” has become. It is crucial that you deploy a secure real-time backup and EFSS solution that IT trusts. Equally important, though, is that users love its exciting user interface, which they easily adopt across all of their connected tablets, smartphones, and computers.

IT Cost Take Out

Deploying a single solution for backup and EFSS reduces the number of vendor solutions you have to manage and provides cost savings for already tight IT budgets. EFSS can also replace antiquated and expensive file share and home directory infrastructures in an extremely cost-effective way. For some organizations, cost savings are in millions of dollars.

A Worthy Digital Transformation Initiative for Any Business

As an IT organization, replacing your existing single-purpose desktop backup software with a feature rich hybrid EFSS solution saves money and helps you avoid costly downtime associated with loss of access to critical business documents. Before renewing your costly back-up application maintenance contract or adding more and more expensive hardware to store back-up files or email attachments, choose a digital transformation for your organization by deploying an EFSS solution.

IT organizations in large, security-conscious, multi-national enterprises across all industries trust Syncplicity to provide realtime document backup and anytime, anywhere access that end-users demand, without compromising on security, control, or choice of file-storage location.

Article Featered in CIOReview: http://storage.cioreview.com/cxoinsight/backup-is-a-feature-not-a-solution-nid-12250-cid-12.html 

]]>