Syncplicity by Axway Blog 2018-04-25T21:21:33Z Copyright (c) 2018, kconner ExpressionEngine tag:syncplicity.com,2018:04:20 <![CDATA[Dell Technologies World.  We’ll Be There, Will You?]]> tag:syncplicity.com,2018:blog/8.1270 2018-04-20T16:52:00Z 2018-04-25T21:21:33Z

Join us at Dell Technologies World in Las Vegas to discuss how to modernize your IT infrastructure with our secure content collaboration platform.

As a Dell partner, we are looking forward to participating in the upcoming Dell Technologies World in Las Vegas - a conference where IT professionals & business decisions makers can see, touch and discover products and solutions to enable digital transformation from the edge to the core to the cloud.

During the event, we will be discussing following topics:

·         How to mobilize Dell EMC storage with Axway Syncplicity
·         How to replace file shares to modernize infrastructure and reduce costs
·         How to gain anytime, anywhere access to all of your data from any device

To schedule your meeting with Axway click here

Our customers benefit from the significant ROI that a modern content collaboration platform brings to their organizations by increasing efficiency and agility -- work anytime and anywhere – while reducing costs.

Because Syncplicity does not restrict where data is stored, Dell storage customers can keep their data on-premises, in the cloud, or hybrid.  With Syncplicity  IT regains control and security over corporate data while providing employees with full and seamless access to information from anywhere, any times, and from any device.

Watch this video and find out why users love and IT trusts Syncplicity!

Make sure you visit Axway, booth #1650 to learn how we can help you modernize and mobilize your workplace with Syncplicity.  Schedule a meeting today or stop by our booth and get one of our statement t-shirts! 

To learn more about Syncplicity capabilities read: To compose your digital workplace, go modern.

]]>
<![CDATA[Spring Release 2018: What’s New]]> tag:syncplicity.com,2018:blog/8.1265 2018-04-18T10:26:00Z 2018-04-18T17:03:22Z Kristie Conner

What’s new with Syncplicity? 

The Syncplicity product and engineering team has been busy building new enterprise features.  We continue to innovate across four pillars that drive value for our customers:

  • Innovative User Experience, the user
  • IT Modernization, IT
  • Advanced Data Protection & Security, Security + Governance
  • Ecosystem Collaboration, Developers

You'll see that the Spring Release brings some very exciting features that empower the entire Syncplicity ecosystem from administrators to users, but this release has a strong emphasis Innovative User Experiences (user) and Ecosystem Collaboration (developers).

Watch the webinar “Spring Release: What’s New with Syncplicity”.

Innovative User Experiences

Power + Usability

This spring, we released an improved desktop experience, one that is both innovative and powerful.  We have combined the strength of multi-folder sync (the ability to sync any folder on your desktop to the cloud) with the power to seamlessly stream files from the cloud to the desktop. 

With this release, you have the benefits of multi-folder sync like real-time backup, recovery from Ransomware combined with streaming files from the cloud without using storage – accessing millions of files without consuming storage.

Available on Syncplicity Windows App 5.4.0, not currently available on Mac. 

Folder Insights + Notifications 

With our new notifications users have more visibility into their folders and files than ever before.  With notifications and digest, that users can set for daily, weekly, monthly – users receive an update that summarizes activity.  At a glance – users can see what content has been shared, re-shared, changed and deleted.

Removing the guesswork.  These types of features help users in subtle yet, powerful ways from understanding personal collaboration activity to knowing who is responsive, to being alerted to changes in a file so that you can keep abreast of new content.

External Sharing
As we continue to evolve our sharing models, to address our customers’ need to provide users with secure sharing, external sharing is a top priority. We address three levels of sharing – Internal, Affiliate and External.  Now, users can easily view from Syncplicity online if their folder is being shared with an external partner, internal or if the folder has been shared by an external partner. This helps users manage external collaboration and sharing – helping avoid data leakage while giving IT more granularity over external sharing.

This features requires activation, please contact your Syncplicity Customer Success Manager.

Advanced Data Protection

Improved Security for Regulated Industries
For security conscious industries, we now offer client certificate based authentication for Syncplicity Windows App and the Syncplicity web client. This additional level of security supports using client certificates allowing mutual TLS/SSL authentication against Syncplicity storage. Only users with the correct certificate installed will be able to access corporate data.

This new feature ensures only trusted devices can access company data, providing heightened security. 

Customer owned encryption keys is also available in a controlled release for customers and prospects, giving you, the customer, ultimate control over your encryption keys, ensuring no unauthorized 3rd party can access your company files.

Application Whitelisting – Control Access to Syncplicity API
Prevent unauthorized applications from accessing data from Syncplicity.  Administrators have the ability to enable and disable application whitelisting and specify application keys to whitelist. Giving companies the control over what applications connect to Syncplicity and the ones to be blocked.I

Define specific capabilities for applications accessing Syncplicity.

Application Scopes
With this features customers can limit what API calls are made to the Syncplicity API. Applications Scopes provide control over Syncplicity’s APIs that an application can call, providing Enterprises complete security and control based on their security policies for external applications on each of the APIs.

Ecosystem Collaboration 

We are excited to announce our Developer Portal and our new Content API giving customers the power to create and innovate by building custom applications that solve your unique use cases.

  • Full exposure of Syncplicity API in Developer Portal
  • Addition of the Content APIs
  • Sample code
  • Interactive documentation

To read the blog, click here.

In addition, to the new Developer Portal we’ve released five new applications that customers can download from the AMPLIFY MARKETPLACE, click here.

  • Adobe Sign
  • Confluence
  • JIRA
  • Microsoft OneNote
  • Chrome Extensions

Thank you for your continued support.  To learn more please visit our support site for release notes.

The Product Solution, Management and Engineering Team at Axway Syncplicity  

]]>
<![CDATA[Announcing the addition of Content APIs on Syncplicity Developer Portal]]> tag:syncplicity.com,2018:blog/8.1266 2018-04-18T10:25:00Z 2018-04-18T13:31:02Z We are excited to introduce the Syncplicity Developer Portal!  The new portal includes an interactive console with everything you need to help facilitate and speed custom application development. From exploring the latest document for Syncplicity’s application programming interfaces (APIs) which include content capabilities and user provisioning to accessing sample code in Java, C#. With Syncplicity APIs, developers can make their applications content aware by accessing files for upload, download, create shared links. APIs allow both developers, technology partners and customers to easily create end-user applications or administrative applications connecting to customers’ Syncplicity accounts.

As a developer, the portal will provide complete access to everything you need to get started, upon creation of a developer account, you will instantly get access to interactive documentation, code samples, knowledgebase articles and a Syncplicity sandbox environment to test your application or just your API calls.  The site provides an easy to follow reference guide and prerequisites to help you get started.  One of benefits is instant help from a community of other developers and our team here at Syncplicity, including Product Management.

Build Custom Applications to Meet Your Business Needs

They Syncplicity APIs can help you address a wide-range of unique use cases based on your business requirements.  

As a Syncplicity platform user or an application developer, you can enable development of your content aware applications by using Syncplicity API set – building applications for end-users that streamline interactions with content and improve collaboration.  Giving business users new innovative ways to collaborate with internal and external teams.

  • Build an integration between Syncplicity and your application
  • Automate routine processes with Syncplicity
  • Customize Syncplicity for your organization

An example: Build an administrative tool to simplify user provisioning or an application to automate group and policy configuration

Our API platform takes care of the heavy lifting so you can focus on your business needs. Further, you can publish your new application on the AMPLIFY MARKETPLACE.  The AMPLIFY MARKETPLACE includes applications provided by Axway, the Syncplicity team, our customers and partners. Additionally, you can also find reference applications/connectors you can use.

Take a look at our new applications / integrations, to download click here.

  • Syncplicity for OneNote
  • Syncplicity Extension for Chrome
  • Adobe Sign connector
  • Syncplicity for Jira
  • Syncplicity for Confluence

Join our webinar, Spring Release 2018 to learn more about the Developer Portal, Content API and our new applications. Register to attend live or watch on-demand at a later date.

Enjoy!

Product Management

]]>
<![CDATA[The changing face of Enterprise File Sync and Share]]> tag:syncplicity.com,2018:blog/8.1267 2018-04-12T02:19:00Z 2018-04-16T17:04:44Z Kristie Conner The content collaboration platform (CCP) market, formerly enterprise file sync and share, is going through a period of rapid transformation. CCP is a key building block for digital transformation as enterprises look to modernize their infrastructure to power a modern, digital workplace. Some, CCP solutions are providing enterprises with a path to modernize their infrastructure and realize the productivity benefits of a secure mobile, digital workforce while ensuring data is stored securely and in line with changing data protection regulations.  True digital transformation requires unlocking unstructured data from within legacy infrastructure – home directories, group shares and making it easily accessible to enterprise users from any device, anywhere while offering security and a feature rich CCP solution.

For CCP solutions to truly enable digital transformation – businesses need to understand their infrastructure and security requirements and then map to the right CCP solution. Whether from an application or infrastructure perspective, CCP solutions will need to adapt to ensure their place as strategic and competitive tool for today’s businesses.  

The Digital Workplace
As businesses look to capitalise on the productivity benefits of modern technologies a key trend has been mobility and BYOD. CCP vendors continues to prioritise the “anytime anywhere” working model, enabling the digital workplace while giving senior-level executives peace of mind around security and governance. CCP providers that specialise in hybrid options allow businesses to easily align their data storage with their business needs – whether on premises, in the cloud, a private cloud or a combination of the three.

The digital worker requires seamless access to content “anytime anywhere” on any device regardless of where it resides in the enterprise, but they also require integration with popular user productivity tools like Microsoft Office 365.  Modern EFSS providers are not only providing the infrastructure for secure mobile access, but collaboration functionality that improves productivity.

Additionally, as cloud solutions play an increasingly large role, a progressive CCP solution will need to ensure that enterprises maintain flexibility, something that can be achieved through hybrid cloud solutions. Not all data is created equal and large, global corporations need the flexibility that comes with a hybrid cloud offering, allowing them to customize their environment, combining public or private cloud and on premise, without sacrificing usability.

An Infrastructure for Tomorrow – Security, Compliance and Data Protection

With uncertainty still surrounding data protection and compliance enterprises are operating in an increasingly complex environment. One such example is Privacy Shield that was recently approved to replace Safe Harbour. The one certainty is that businesses operating within Europe need to have a fine-grained understanding of what data they are collecting and the geographical regulations that apply to that data. To achieve this -- business are changing the way they evaluate new technology such as cloud, and how which their data is accessed and shared.

CCP can provide an answer. By providing a consolidated modern storage platform, CCP addresses the issues of distributed, costly and insecure legacy storage solutions, delivering a secure and compliant way to manage and store data. CCP solutions which enable infrastructure modernisation will also support enterprises in meeting the most stringent security, governance and IT administration requirements and avoiding costly fines for non-compliance.

And it’s not just being compliant that companies need to worry about. As more global enterprises become victims to ransomware attacks and business leaders become increasingly nervous, EFSS providers can support organisations with real-time backup, multi-folder sync features, retention policies and recovery plans.

What Next?
The CCP market is evolving to address an increasing number of business requirements to improve collaboration across the digital ecosystem and infrastructure modernization, while ensuring data is secure. Organizations are looking for vendors who integrate with office productivity solutions, like Microsoft Office 365 and connect to back-end content repositories to provide access to content that was previously not available unless you were behind the fire wall. Though integration, whether with applications or infrastructure, CCP can support the modernization of the workplace as a critical component to digital transformation in the modern business. 

To learn more read: Gartner Magic Quadrant for Content Collaboration Platforms.

]]>
<![CDATA[How to Reduce the Impact of Ransomware & Shadow IT]]> tag:syncplicity.com,2018:blog/8.1264 2018-04-09T02:37:00Z 2018-04-09T02:51:23Z With a growing tally of high-profile incidents, multiple warnings from European and US agencies on increased cyber-threats, and employees tempted to use collaborative tools to share information, causing Shadow IT, leaders across industries are under pressure to reduce risk from data attacks and prevent data leakage.

Register for the Axway Syncplicity webinar and learn how to reduce damages due to ransomware attack and gain control of Shadow IT using a secure content collaboration platform.

Let's Face It -- There is No Solution that Prevents Ransomware Attacks 
Some surveys unveil ransomware losses for businesses can average $2,500 for each incident, with businesses willing to shell out upwards of $50,000 to decrypt their data.

Ransomware appears between 6 key cyber threats most dangerous for organizations this year. Last year, was a plague of ransomware attacks, with targets including Britain’s National Health Service, San Francisco’s light-rail network, and big companies such as FedEx. Ransomware is a relatively simple form of malware that breaches defenses and locks down computer files using strong encryption. Hackers then request money in exchange for digital keys to unlock the data.  Usually, victims have no choice and often pay, especially if the material encrypted hasn’t been backed up.

Read 8 Tips for How to Prevent & Recover from Ransomware

Shadow IT is a real problem for IT Teams
The growth of cloud-based software, along with the continued outsourcing of enterprise data services, has led to an explosion of shadow IT problems for large enterprise. Now while Shadow IT sounds very malicious, it usually is innocently deployed. Most of the time, it is born within an organization simply because employees are trying to be productive. Hosting and moving files using an open consumer file sharing platform, for example, can lead to serious security risks. When employees and departments start ‘piece-milling’ enterprise software solutions together that are not approved by IT, sensitive client and internal data can be made susceptible to breach.

Learn more about why shadow IT is a problem

A Secure Content Collaboration and File Sharing Solution Can Help 

Axway Syncplicity is an innovative and robust cloud-based solution built on a hyrid-cloud archieecture that provides seamless and automatic access to files,shared folders with strong security features that make IT very happy.

Register for our webinar and learn all about Ransomware & Shadow IT prevention.

]]>
<![CDATA[Time to bridge MFT and Content Collaboration Platform]]> tag:syncplicity.com,2017:blog/8.1261 2017-11-20T19:09:00Z 2017-11-20T19:31:09Z BY SCOTT LEWIS, SENIOR DIRECTOR, PRODUCT & SOLUTION MARKETING, AXWAY

Gartner has stated in its recent Magic Quadrant for Content Collaboration Platforms (read the full report here) that 80% of large and midsize organizations in mature regions will have deployed one or more content collaboration platform (CCP) products.  Gartner defines CCP as a range of content-centric platforms enabling secure file productivity and content collaboration for individuals and teams as well as supporting the creation of a modern digital workplace. It is the evolution of the EFSS (Enterprise File Sharing and Synchronization) products.

Now this is not meant to be lesson on CCP and MFT but let’s step back and look at both and why there is a value in bridging the two.

CCP solutions address the use cases of people sharing and collaborating very well with other people be it within an organization and with customers, partners and suppliers.

The focused is placed on ease of use and universal access from any device, anytime, anywhere to optimize collaboration with other individuals.

On the other hand, with Managed File Transfer (MFT) solutions the use cases are driven by business processes typically between systems of record which are event and scheduled driven. Premiums are places on automation, monitoring and security. Think “locked down back office processes”. 

There is definitely a “better together” scenario if we can bridge MFT with CCP we could open up many new use cases that we have not been able to support before.

Been there, done that but failed
In particular, MFT vendors tried to include file sharing and human based file transfer use cases into their offer. They delivered Frankenstein like products that end users basically refused to use as they were not finding the simplicity they desired. Also, patterns and use cases are so different that it was also creating performance issues on the MFT side. But the intention is still valid, to achieve maximum efficiency and to address hybrid patterns within the organization, IT need to deliver MFT and CCP and expose them as consumer like services to end-users.

Solution is not replacing one with the other
Whatever solution that tried to replace other - MFT by EFSS or EFSS by MFT was just doomed to fail. Both serve a vital purpose and bridging the two properly opens the door to many new possibilities. This is the approach we have taken here at Axway. We have created a bridge between our leading Axway Syncplicity CCP solution and our leading Axway SecureTransport MFT Gateway solution. The two solutions are governed solutions and managed and controlled by IT. Doing so permits new use cases such as an application delivering files to a person or a team, and a person or team sending a file to an application. All while providing the familiar user interface the end users are already using with the benefits of secure anytime, anywhere, any device access.

Take advantage of bridging CCP and MFT 

Axway SecureTransport and Syncplicity customers can download the Syncplicity Connector for SecureTransport for free from the Axway AMPLIFY marketplace and start transforming the way their organization collaborates and innovates.

]]>
<![CDATA[Content Collaboration Platforms: Friend or foe in protecting your content?]]> tag:syncplicity.com,2017:blog/8.1259 2017-11-16T14:04:00Z 2017-11-16T14:28:50Z Syncplicity is an important ally for enterprises determined to protect their content. It can be highly sensitive content like PII – personally identifiable information. Or perhaps something less sensitive, such as public data on a website. Either way, if there’s a breach, it’s not good.

If you want your business to remain viable and competitive, security matters. But to maintain a high level of content security, experience matters. That’s where Syncplicity comes in. As a company with experience managing millions of files for our customers using our content collaboration platform, we take data protection very seriously. It’s probably why we’ve become such a valued ally to so many.

Fact is, Axway Syncplicity recently received one of the highest scores for security capability in Gartner’s Critical Capabilities Research for Content Collaboration Platforms – especially in use cases involving Centralized Content Protection. And this comes just as regulatory compliance is heating up. With Europe’s General Data Protection Regulation (GDPR) taking effect in May 2018, and directives such as PrivacyShield in the U.S., data security and content protection are top of mind for enterprises around the globe. And they’re looking to the cloud for answers.

Securing sensitive content

Keeping sensitive content secure is a big part of a company’s overall data protection strategy. With Syncplicity’s DLP integration capability, organizations are moving sensitive and confidential content to the cloud to enforce security policies. And they’re doing it by leveraging their existing DLP solution. Syncplicity integrates with top DLP solution providers, including leaders in the 2017 Gartner Magic Quadrant for Enterprise Data Loss Prevention (DLP), to give customers a seamless, reliable way to manage sensitive content – including files stored in Syncplicity. Symantec Data Loss Prevention, Digital Guardian and McAfee DLP Prevent, are some of the trusted brands Syncplicity integrates with.

How does this work? Well, organizations can now leverage their existing DLP infrastructure to detect when sensitive content is added to Syncplicity. Access to files and sharing is restricted based on DLP classification. Classification is done in the DLP engine, which identifies what is considered sensitive whether it’s personally identifiable data (PII), health records, intellectual property, or customer or partner information.

Through this integration, companies can enforce file and folder sharing restrictions based on corporate policies, allowing them to adhere to strict security and compliance regulations and requirements. For example, Sara in HR can see PII of employees in, say, the U.S., but other U.S. employees can’t. At the same time, Sara is unable to view PII associated with employees in Europe. Companies can customize policies based on region, employee type and department. And these policies are easily adjusted by approved teams using an administrative console.

Insider threats and cyber crimes

Regulatory compliance is a key reason for DLP solutions and strategies, but there are other business drivers. Insider threats and cyber crimes such as those involving ransomware jeopardize business operations and may put your organization out of compliance with regional or industry regulations. Exposure to ransomware is particularly costly because it not only affects business operations, but will also carry a stiff, 4 percent fine for breaking GDPR mandates starting in May 2018.

Syncplicity lets you track user behavior and recover files. Combine this with your existing DLP capability, and you’ll have a much more comprehensive solution – one that secures sensitive data, applies policies to that data, tracks user behavior (digital footprint) and lets you recover from internal or external content breaches.

Learn more about how we can help you protect your sensitive content with advanced data protection solutions that combine your existing DLP capabilities with Syncplicity.

To learn more about DLP, click here and to learn more about how Syncplicity provides customers with Advanced Data Protection, click here.

]]>
<![CDATA[What’s missing from those “Millennials Are Killing dot dot dot” lists? Home Directories.]]> tag:syncplicity.com,2017:blog/8.1257 2017-10-26T13:15:00Z 2017-10-26T16:18:52Z

Written by Frank Murphy, Director of Strategic Sales Engineering, Syncplicity
LinkedIn Profile

A trend in popular culture today that you may have missed is to catalog the growing list of industries, services, and other business-as-usual practices that are being disrupted or even killed off at the hands of Millennials. Everything from family restaurants, doorbells to napkins are being looked at differently by an entire generation who is unafraid to challenge accepted practices. Although the targets of the disruption vary -- the common factor driving the disruption is the need for convenience, avoiding friction, and living life on the go. What happens when that same approach finds its way into your corporate file storage environment? You guessed it, even more disruption. 

As out-dated as the door bell: The Home Directory
Just as the doorbell has been a business-as-usual standard fixture on any flat, apartment or house, it's been standard practice for corporate users for decades to be provisioned a small repository of space. This space is typically carved out on a file server somewhere, that is their ‘home’. This directory comes with a logical organizing structure. Just like the buttons assigned to each occupant of an apartment building and when people arrive -- they push the buzzer.As an end user you have data you need to store, but you don’t need to share it with anyone else you put that in your home directory. That is, it’s specific function – the home of your files. It’s what you do. And you automatically get connected to that home directory through some mapping function when you first login. And just like the doorbell, you get one assigned to you whether you actually use it or not.

That's what happened to me when I first showed up as a new hire at EMC 17 years ago. Access to that home directory assumes that I was tethered to the network and able to reach it over network-based storage protocols. In 2001, it was unthinkable to get access to data remotely - "remote access" meant hopping in your car and driving to the office to get to your files.

A new normal: always-on connectedness
Fast forward to today, and it’s a different world. Remote access means I have to always connect to VPN to get map a drive letter.  Who needs that? A mobile tablet or phone or similar device doesn't know what a mapped drive leter is. Syncplicity users have access to all their files all the time. In my case, that access is spread out across five or six different devices. My data is tethered to me, not me tethered to the network to get to my data.

Disrupting the home directory: not just for Millenneals
Although the gray hair in my current badge photo disqualifies me as a millenneal, the same benefit of convenience and reduction of friction is where Syncplicity excels. Plus, not being able to connect to the network, or to any wifi signal brings on feelings of anxiety and FOMO (fear of missing out). In my case the fear isn't missing out on someone's Instagram post or Snap Chat -- it’s the fear of missing a customer request, a sales order or anything else I collaborate on throughout the day. The millennial thinking is: why surprise your host with a loud and disturbing buzzing sound when you can send them a text before you arrive? Avoids the hassle. That hassle avoidance motivation also drives users to keep their data as close as the phone in their pocket. That drive for convenience drives users to take matters into their own hands, or their own pockets, and causes a major challenge for data security and governance through Shadow IT Syncplicity can help avoid that friction and hassle of being tethered to the network when we live in a fundamentally untethered and wireless world. For those rare moments you find yourself off-line, you're still not completely disconnected with the ability your favorite files on your mobile device, or use favoriting on SyncDrive if your users only have a laptop and still need a mapped drive letter experience.

Ding Dong: Distupt or be distupted
Migrating legacy home directories into Syncplicity using DataHub, decomissioning or repurposing that NAS capacity while also replacing the home directory with SyncDrive, is the best of both worlds. It It marries the convenience of.... of access anywhere, with the ability to store data in the Syncplicity Cloud, in the cloud of your choice like AWS or Azure, and/or in an on premises StorageVault.

Learn more about SyncDrive and DataHub here.

]]>
<![CDATA[GDPR overexposes shadow IT]]> tag:syncplicity.com,2017:blog/8.1256 2017-09-28T13:55:00Z 2017-09-28T14:15:06Z By Jean-Claude Bellando

Cloud computing paves the way for shadow IT
Shadow IT is described as IT solutions used within a company without organizational approval. It’s the IT activity that takes place in the shadows without the usual security and control requirements on data placed under the responsibility of the company.

Shadow IT predates the cloud when many employees downloaded and installed their own software to achieve tasks. Since cloud solutions come with an easy-to-consume (starting with freemium account) and easy-to-use paradigm, the potential lack of control is astounding. Symantec states that "organizations use 20 times more cloud apps than they think."1 Corporate IT security professionals estimate they have 30 to 40 apps in the cloud, when the reality is a staggering 928 apps.

Shadow IT does not meet security requirements
The main reason shadow IT emerged was usability and price. Security is still not considered by end users and is often seen as a constraint. As a consequence, "only 8.1% of cloud services meet enterprise security and compliance requirements,"2 states a recent Skyhigh networks report.

Shadow IT: the digital workplace and CCPs
In addition to a focus on the digital workplace, shadow IT also relies on Content Collaboration Platforms (CCP) as defined by Gartner in a recent Magic Quadrant report. “Of the 1,427 cloud services used by the average company, 342 are related to collaboration, file sharing, content sharing”2 (Skyhigh networks report). In addition, “25% of all files shared in the cloud are broadly shared” 1 (Symantec). According to Symantec, this shared data contains personal data for “3% of those shared files contains current compliance related data (PCI, PII, PHI)”1.

The digital workplace in a GDPR perspective
The European Union’s new GDPR (General Data Protection Regulation) is a game-changing regulation that will bring a new focus to shadow IT for any company doing business in Europe. When the rules take effect in May 2018, the GDPR will require:

  • A focus on shared data, not only broadly shared data
  • A focus on all personal data (anything that identifies someone), not just PCI, PII, or PHI
  • Reports of personal data leaks within 72 hours
  • A stronger assessment and monitoring of the conditions of data transfer between entities and across boundaries
  • More rigorous sanctions that can impact a company’s reputation and bottom-line:
    • A GDPR violation can generate a penalty up to 4% of the global revenue of the companies involved in the data processing
    • This is on top of any damages done to individuals
    • A company’s image or brand can be severely damaged

What to do now?
No one can stop the move to GDPR. It’s time to standardize existing EFSS solutions into one that:

  • Offers GDPR-aware features (privacy by design)
  • Provides the company DPO (Data Protection Officer) with the necessary control of all data, including location of data
  • Provides the user’s expected features and usability, securely, protecting them and their organization
  • Delivers expected IT security features, like granular-group based policies, remove wipe and others that protect the user, while also giving the freedom they require to do their jobs

Besides GDPR compliance, there are other immediate rewards to standardizing on an industry leading, secure solution such as reduced costs and easier collaboration for all employees. GDPR is coming, and it’s coming fast. If your organization is guilty of a lot of shadow IT, take the time to get your IT business in order. Your company’s image, revenue, and data will thank you.

To learn more about Axway Syncplicity and how we help you compose a secure digital workplace:  Modernize Your IT Infrastructure or Innovative User Experiences.

[1] Symantec: 2H 2016 Shadow Data Report
[2] Skyhigh networks report: Cloud adoption risk report Q4 2016 

]]>
<![CDATA[Play ball with Syncplicity by Axway and win]]> tag:syncplicity.com,2017:blog/8.1252 2017-06-30T15:28:00Z 2017-09-22T20:00:19Z Kristie Conner Did you know Major League Baseball (MLB) uses Syncplicity by Axway to power their digital transformation? It’s a great story about how MLB is driving engagement, making it easier for users including baseball scouts to access and share data, securely. So we asked Dan Gainey of MLB to tell us all about it in a webinar to be held July 19. You should be there.

If you’ve never heard Dan speak – or even if you have – you’re in for a treat. Just ask anyone who attended IMAGINE SUMMIT 2017 in Atlanta, or who packed the house at Gartner IT Expo last year. The webinar happens soon after the MLB All-Star Game, so Dan will surely have stories to share about how Syncplicity by Axway helped the league streamline internal collaboration across one of their major events.

Dan Gainey weaves in key themes of digital transformation that impact the digital workplace.  If you’re in IT, or manage collaboration, mobility or security, this webinar will provide you with vital insight providing a 360-degree view of what digital transformation looks like across critical groups and the business impact.

To register click here.

Learn how Axway Syncplicity can help you Modernize Your IT Infrastructure or create Innovative User Experiences.

]]>
<![CDATA[Axway Syncplicity delivers Privacy and Data Protection by Design]]> tag:syncplicity.com,2017:blog/8.1202 2017-02-13T17:52:00Z 2017-09-22T20:04:08Z Brian W Levine

By Brian W. Levine, Security and Compliance Officer

As RSA 2017 kicks off, it’s exciting to look out at today’s security and privacy horizon and see how Syncplicity by Axway is uniquely positioned to help enterprises meet the most critical challenges in data protection and digital workplace transformation.

It’s almost a cliché to state that we have seen tectonic shifts in global privacy and security over the last 18 months (but I’ll recap anyway). Consider the rise of IoT botnets crippling the internet, corporations held hostage by crypto-ransomware, and nation-state hacks targeting US elections. In the privacy realm, the US-EU Safe Harbor treaty for data transfer was thrown out and its upgrade, EU-US Privacy Shield, stands on trial to decide if it will face a similar dismissal. Further, the EU-GDPR go-live date looms, and companies slow to adapt will be sure to find themselves in a courtroom facing fines starting at the entry-price of 20 Million Euros per violation. Deep breath, yes these are interesting times.

While cyberattacks increase and data protection laws are in flux, one thing is certain; a proactive transformation strategy which places user privacy and the protection of company data at the foundation is the clear route through the shifting landscape. Leading with these principles, Syncplicity by Axway has developed innovative solutions to meet these challenges, while enabling digital transformation and empowering your mobile workforce. 

For our customers, the concepts of data protection by default and privacy by design mean that we place confidentiality and privacy of personal information and company data as primary requirements. Here are examples of how this design objective is embedded into our products and processes:  

  • While the physical location of data has become an increasing concern, Axway Syncplicity hybrid cloud architecture offers multiple options to address data sovereignty. Customers choose where to host their file storage - on-premises, in a private cloud, or in one of  Axway Syncplicity's regional public clouds. Policy-driven storage allows multiple storage locations to be defined within a single tenant account, meaning users have a seamless sharing experience while the back-end infrastructure complies with global data protection concerns.
  • In 2016, we launched  Axway Syncplicity PrivacyRegions, an innovative solution which ensures personal information and company meta-data is stored and processed only in the local PrivacyRegion, and is not subject to cross-border data transfer regulations. The additional protection comes at no cost to the user experience; users can still seamlessly share files with trusted recipients in any geographic region.
  • Fears of government action and potential ‘back doors’ in technology products have sparked a fever pitch of scrutiny and will continue to be debated topics in this environment. StorageVault Authentication is a patented security control that ensures it’s technically and physically impossible for  Axway Syncplicity to provide third-party access to customer data, as well as restricts insiders from any unauthorized access. This zero content knowledge approach ensures compliance with the most secure data processing and confidentiality requirements.
  • Visibility and transparency is critical and we provide compliance certifications and audit reports for all our systems, processes, and data-centers. We have partnered with TRUSTe to validate our privacy practices and certify our commitment to privacy protection, choice, and accountability.
  • Enterprises need to be proactive, not reactive, to ensure confidentiality and prevent data leakage before it becomes an issue. Our rich set of group-based policies and access controls allow companies to set the right level of data protection based on a user’s specific profile.
  • End-to-end security controls like  Axway Syncplicity's Secure Shared Files applies an encrypted rights management container around documents, so that when files are sent externally, they remain protected and the enterprise maintains ownership of encryption keys.
  • Customers should not have to choose between security, privacy, and a great end-user experience. As we know, if you impede user productivity, users will find their own insecure alternatives.  Axway Syncplicity's clients and Web apps are designed to enable frictionless productivity and collaboration without compromising on security and privacy.
  • On every project, our developers perform an impact analysis to evaluate potential security and privacy issues before writing a single line of code. We use multiple third-party security teams to penetration test our systems using a variety of attack vectors and techniques. 

 Axway Syncplicity has committed to delivering the highest levels of security, data governance, and privacy available in the file sync and share market, and we continually engage with our customers, R&D, and support teams to unlock new use cases for user productivity and enterprise transformation.

We welcome the challenges of 2017 and beyond and are passionate in our belief that we offer a unique value proposition to address today’s secure file sharing requirements. We look forward to engaging with you at the RSA Conference to demonstrate first-hand how we empower the digital workplace and modernize IT infrastructure while maintaining the highest levels of data protection and privacy.

P.S. Be sure to stop by our booth #N4243 to learn more and also receive a coffee mug with a #hashtag you will find interesting, and as always we welcome your thoughts and comments @Syncplicity by Axway @BrianLevinePM

Find out how we can help you Modernize Your IT Infrastructure or view our solution brief outlining how we can help you protect your data.

]]>
<![CDATA[Why All Companies Should Have a Ransomware Recovery Plan]]> tag:syncplicity.com,2017:blog/8.1195 2017-01-26T19:28:00Z 2017-09-22T20:06:39Z Brian W Levine Cyber criminals are not only becoming more and more sophisticated but also bolder. The most insidious computer crime today doesn’t involve viruses or stealing credit card numbers. Instead, it comes in the form of ransomware – rogue programs that hold an entire organization’s data hostage with unbreakable encryption and demand a ransom for the decryption key.

These attacks are becoming increasingly common. In 2015, there were 2,453 reported ransomware incidents, in which victims paid about $24.1 million, according to the FBI. Security researchers found that the number of users who came across crypto ransomware in the last year increased by more than 500 percent from the previous year.

In the past few months alone, new and more powerful ransomware has appeared, with criminals targeting sensitive entities like healthcare facilities. For example, MedStar Health, a major healthcare provider in the Washington, D.C., region, was forced to disable its network for several days after a ransomware attack early this year, while Hollywood Presbyterian Medical Center in Los Angeles, California, paid $17,000 in response to an attack in February.

Ransomware is flourishing for two basic reasons.

First, it’s simple economics. Rather than dealing with the trouble and risk involved in stealing credit card files and peddling them on the black market, criminals using ransomware can simply sit back and wait for the victims to pay. Of course, the criminals don’t always send the decryption key in return – these are thieves, after all.

The second reason is that a ransomware attack is incredibly difficult to prevent. It only takes a single click within an email or on a website for an unsuspecting employee to activate the code that encrypts an entire system and triggers a ransom demand. Even if an enterprise has the most updated anti-virus software or access restrictions on sensitive files, it remains vulnerable to ransomware via just one unsuspecting user.

While it’s difficult for an enterprise to feel completely confident in preventing a ransomware attack, it can take steps to mitigate the effects of this new and destructive type of malware – and recover normal operations in minutes or hours – if the proper precautions and recovery plans are in place.

The most important recovery element is real-time protection of data, which means backup copies of all files and data are stored securely in the cloud rather than local desktops. To be most effective, this needs to be accomplished automatically, with a copy being synced up to the cloud every time a file is edited or saved. These backups let a business “roll back” to the moments before a ransomware attack and recover all its files – even in cases where the ransomware has affected large numbers of users within the organization.

It’s also important that the software or service you use to create these backups is capable of excluding the kinds of encryption files known to be associated with ransomware – so you don’t wind up restoring the very files that created the problem in the first place.

Finally, businesses must establish a retention policy. Whether you choose to retain deleted files forever or for a specified time period, a retention policy will allow your original files to be retrieved after they are deleted or encrypted by ransomware. This is a critical part of a recovery plan as it can allow files to be restored quickly and won’t hold you back with a time-consuming and expensive recovery process.

Cybercriminals are an unfortunate reality in today’s marketplace, and it’s easy to fall victim if you’re unprepared. By being aware and maintaining the right backup strategy, however, your company can minimize the damage from these attacks and turn the tables on this latest generation of attackers.

Read our 8 Tips for Ransomware Recovery & Prevention, click here

Brian Levine is Senior Director of Security of Cloudr Security

]]>
<![CDATA[SyncDrive: Size Does Not Matter]]> tag:syncplicity.com,2016:blog/8.1186 2016-12-21T13:27:00Z 2017-09-22T20:08:45Z Kristie Conner

SyncDrive: Size Does Not Matter

The amount of unstructured data in home directories, group shares and network drives across the enterprise is staggering and the overall amount of information is growing exponentially as the world becomes more digital. The reality is that we are just at the beginning – the volume of data is exploding, more data has been created in the past two years than in the entire history of the human race. That is a lot of data – and it begs the question: what do we do with that data, and exactly how do knowledge workers access it?

Syncplicity by Axwayhas an answer – SyncDrive. While we might not be solving all your unstructured data needs (okay, 90% of them), if you choose Axway Syncplicity we can help you untangle your home directories and group shares and at the same time modernize your file storage infrastructure – along with providing access to all your data via the desktop, laptop and mobile devices. Imagine, being able to give your enterprise users VPN-less access to all their enterprise content from any device, where data size does not matter. 

Now, imagine being a user and, never having to worry (again) about having enough space on your device or maneuvering and moving files so you have just the right ones when you need them. SyncDrive redefines how users work with large volumes of data across the enterprise. Users can selectively sync the files they need, and the intelligent cache feature ensures they never need to worry about running out of storage.

SyncDrive is a revolutionary feature that will have an immediate impact on the user and IT. What about the value to the overall enterprise? For a typical Fortune 1,000 company, just a 10 percent increase in data accessibility will result in more than $65 million additional net income. With SyncDrive, we make this possible.

This new SyncDrive feature is now available and extends our digital transformation lead by enabling enterprises to modernize their IT infrastructure and access petabytes of data stored in legacy file shares.”

Find out how SyncDrive can improve your business agility, click here.

]]>
<![CDATA[Axway Syncplicity PrivacyRegions Answers Data Protection Requirements]]> tag:syncplicity.com,2016:blog/8.1188 2016-12-19T13:43:00Z 2017-09-22T20:11:45Z Kristie Conner

Axway Syncplicity PrivacyRegions Answers Data Protection Requirements

Syncplicity by Axway is raising the technology architecture bar with a new EFSS innovation that ensures corporate compliance without getting in the way of user productivity. Axway Syncplicity PrivacyRegions allows companies to remain compliant with region-specific data protection and residency regulations while still allowing their users to seamlessly share folders and files with users and companies based in other regions. Personal information (PII) and corporate meta-data is never processed or stored in other regions.

Axway Syncplicity PrivacyRegions uniquely combines regional cloud services, policy-driven hybrid cloud storage and a new privacy driven architecture. Today, we’re pleased to announce that Syncplicity by Axway European Union (EU) PrivacyRegion is generally available. This design enables EU-based enterprises to confine the storage and processing of all their files, meta-data, and personal information to the EU region. 

Seamless User Experience

Syncplicity by Axway is the only EFSS provider to offer regional cloud services that do not restrict user sharing. We allow users to seamlessly collaborate across regions with a single account, while maintaining all the information—including meta-data—within a designated region. For example, with Syncplicity by Axway, an enterprise’s storage and control plane can be in Europe. Other EFSS vendors allow customers to choose a geographic zone for file storage, but they process and store all meta-data, such as filenames, PII, and significant indexing of regional files’ content in U.S.-based cloud services. By contrast, Syncplicity by Axway PrivacyRegions segregates a company’s meta-data, PII and file storage to its chosen region. For example, customers who choose Syncplicity by Axway EU PrivacyRegion are assured all of their information is kept within Europe.

Syncplicity by Axway is the first vendor to provide regional cloud services allowing users to seamlessly collaborate across regions without requiring multiple user accounts for each region. Syncplicity by Axway’s solution is unique in segregating all data to specific regions, while still providing users ‘a single-pane-of-glass’ experience and seamless collaboration across regions.

Syncplicity by Axway's release of PrivacyRegions builds upon a long-standing posture of data privacy compliance. Our ‘data protection by default’ strategy provides a flexible architecture with the necessary granular privacy, confidentially and data sovereignty controls built-in, giving our customers the right tools to adapt to evolving regional legislation and business requirements across the enterprise.

To learn more about how Syncplicity by Axway ensures compliance with global privacy and security regulations, please click here.  To learn how you can securely compose a digital workplace, click here.

]]>
<![CDATA[Hybride Speicher und Datenschutz: So sorgen Sie für Compliance]]> tag:syncplicity.com,2016:blog/8.1185 2016-12-06T15:54:00Z 2016-12-06T16:06:15Z Mit Big Data und dem Internet of Things kommen auf klassische Storage-Architekturen neue Aufgaben zu, denen sie immer weniger gerecht werden können – sie sind oft zu starr und unflexibel. Ein Ausweg könnte Enterprise File Sync & Share (EFSS) sein, das vorhandene und neue Speicher zu hybriden Strukturen zusammenführt. Wo liegen die Stärken eines EFSS-Systems und welche Faktoren insbesondere im Datenschutz spielen eine besondere Rolle? Lesen Sie dazu mehr in diesem Artikel.

Nicht alle Daten müssen in die Cloud. Bei einigen ergibt dies jedoch durchaus Sinn. EFSS hilft bei der Umsetzung.

Weltweit nehmen die Datenmengen durch Big Data oder Internet of Things zu. Bisherige Ansätze wie die exklusive Speicherung von Daten auf eigene Storage-Strukturen bedienen oftmals die neuen Anforderungen nur noch unzureichend. Besonderer Flaschenhals kann dabei das klassische Storage-Management werden. Ein Ende dieser Entwicklung ist bei einem globalen Gesamtdatenvolumen von 8,5 Zettabyte kaum absehbar – bis zum Jahr 2020 erwarten Marktforscher eine Steigerung auf 40 Zettabyte.

In Deutschland kommen zu dieser Entwicklung darüber hinaus auch noch verschiedene Auflagen des Datenschutzes hinzu. Wegen dieser besonderen Ausgangslage können Unternehmen nicht einfach den günstigsten Cloud-Storage-Anbieter wählen, sondern müssen explizit die Vereinbarkeit der einzelnen Lösungen mit den jeweils geltenden Vorschriften abgleichen.

Weltweit nehmen die Datenmengen durch Big Data oder Internet of Things zu. Bisherige Ansätze wie die exklusive Speicherung von Daten auf eigene Storage-Strukturen bedienen oftmals die neuen Anforderungen nur noch unzureichend. Besonderer Flaschenhals kann dabei das klassische Storage-Management werden. Ein Ende dieser Entwicklung ist bei einem globalen Gesamtdatenvolumen von 8,5 Zettabyte kaum absehbar – bis zum Jahr 2020 erwarten Marktforscher eine Steigerung auf 40 Zettabyte.

In Deutschland kommen zu dieser Entwicklung darüber hinaus auch noch verschiedene Auflagen des Datenschutzes hinzu. Wegen dieser besonderen Ausgangslage können Unternehmen nicht einfach den günstigsten Cloud-Storage-Anbieter wählen, sondern müssen explizit die Vereinbarkeit der einzelnen Lösungen mit den jeweils geltenden Vorschriften abgleichen.

Bei der Wahl zwischen Cloud- und On-Premise-Storage stehen Entscheider vor einem Dilemma. Während lokale Strukturen rasch an die Grenzen der eigenen Kapazität stoßen können, fehlt bei Cloud-Angeboten die Nachvollziehbarkeit des konkreten Speicherorts der manchmal unternehmenskritischen Daten. Die Nachvollziehbarkeit der Ablage ist allerdings je nach Branche und Art der Daten aufgrund von staatlichen oder unternehmensinternen Regularien erforderlich. Deswegen kommen hier Cloud-Anbieter mit Speicherorten außerhalb der Europäischen Union, beispielsweise US-Provider, nicht in Frage.

Flexibilität und Sicherheit
Die Frage, ob bei der Datenspeicherung mehr Flexibilität oder mehr Sicherheit gewünscht wird, lässt sich auf einfache Weise beantworten: beides, denn beides ist für die Unternehmen von zentraler Bedeutung. Der Ansatz, um hier die Bedürfnisse der Kunden erfolgreich zu adressieren, heißt Enterprise File Sync & Share (EFSS). Mit EFSS sind die Vorteile beider Welten verfügbar. Hier können weniger sensible Daten in die Cloud wandern, die automatisch mit den Anforderungen mitwächst. Unternehmenskritische Daten hingegen sind auf lokalen Strukturen besser aufgehoben. Mit einer Policy Engine, wie sie beispielsweise Syncplicity by Axway anbietet, können Administratoren Richtlinien zur Behandlung verschiedener Datentypen festlegen.

Bei global agierenden Unternehmen lassen sich Daten so automatisch auf den Servern oder Cloud-Diensten der einzelnen Regionen speichern, während sie den länderübergreifenden Arbeitsgruppen zur Verfügung stehen. Der Unterschied zum klassischen Administrationsansatz, bei dem dies prinzipiell auch zu bewerkstelligen ist, ist die Automation sowie der bessere Überblick über die vorhandenen Daten. Nebenbei umgehen Unternehmen so auch überflüssige Redundanzen. Ein Aspekt der bei der gesetzeskonformen Speicherung gerne übersehen wird, sind die Meta-Daten. Falls die originären Daten gesetzeskonform zwar in der EU liegen, ist in vielen Fällen ausländischen Behörden ein Rückschluss auf die Unternehmensaktivitäten durch die Auswertung der Metadaten möglich. Im Idealfall regelt eine Policy Engine mittels der PrivacyRegions die korrekte Distribution dieser speziellen Daten gleich mit.

Seite 2 - Hybride Speicher und Datenschutz: So sorgen Sie für Compliance

Daneben können Unternehmen mit einem EFSS-System flexibler auf veränderte Datenvolumen reagieren. Hier lassen sich weniger kritische Daten temporär von On-Premise auf die Cloud auslagern, ohne dass versehentlich kritische Informationen mitwandern. Eine EFSS-Lösung weist dabei den Speicherort gemäß den vorab definierten Policies automatisch zu. Damit bietet EFSS eine skalierbarere Umgebung als klassische Speicherlösungen.

Alleine schon aus rechtlichen Gründen ist die Nutzung eines EFSS-Systems bei komplexeren Problemstellungen ratsam, denn die gleichzeitige Nutzung von Cloud-Storage und lokalen Speichern könnte ohne eine gemeinsame Einbettung in ein Managementsystem dazu führen, dass klassifizierte Daten an einem ungeeigneten Standort gesichert werden. So haben beispielsweise Personal- und Gehaltsdaten nichts auf einem Cloud-Speicher zu suchen, dessen Sicherheitsmaßnahmen durch den Provider nicht abschließend geklärt werden konnten.

Organisatorische Erleichterung durch EFSS
Jedoch hilft eine EFSS-Lösung auch dabei, die Organisation in der IT zu vereinfachen. So fällt bereits einiges an Aufwand alleine dadurch weg, dass nicht jede Speicherplattform für sich organisiert werden muss. Speicher- und Synchronisationszugriffe erfolgen unter einem Dach. Dadurch werden auch mehrere in verschiedenen Versionen gespeicherten Daten vereint. Ein konsolidierter Datenstand steht auf diese Weise zur Verfügung.

Nicht zuletzt ergeben sich Einsparpotentiale, denn die dynamische und Policy-gestützte Datenverteilung hilft, die Strukturen schlank zu halten und die Bereitstellung überflüssiger Ressourcen zu vermeiden. Dies ist bei der Nutzung von Cloud-Storage auch möglich, doch nur zu dem Preis der mangelnden Einflussnahme auf die Verteilung der Daten. Dies gilt natürlich auch für einen Filialbetrieb, bei dem die Vorhaltung lokaler IT vollkommen reduziert werden kann.

Arbeitswelt im Wandel
Mit der zunehmenden Nutzung eigener Endgeräte oder flexibleren Arbeitsmodellen wie dem Home Office stellt sich für die Unternehmens-IT die Frage, wie mit Daten auch in Hinblick auf eine unternehmensferne oder dezentrale Nutzung zu verfahren ist. Informationen stehen hier in nicht kontrollierten Raum zur Verfügung und die Gefahr eines Datendiebstahls steht permanent im Raum. Aus diesem Grund sollte ein ausgeklügeltes Synchronisationsmanagement die Dateien zur Verfügung stellen, die für die Bearbeitung von Geschäftsprozessen unbedingt erforderlich sind. Auch hier stellt ein EFSS-System sicher, dass der Zugriff entweder zeitlich oder auf Geräteebene begrenzt gewährt wird, damit unternehmenskritische Informationen an ihrem vorgeschriebenen Ort verbleiben.

Mehr Schutz vor Ransomware
Der Albtraum eines jeden Administrators ist es, wenn sich die Rechner der Nutzer mit einer Verschlüsselungs-Schadware infizieren. Selbst nach der Zahlung eines Lösegelds an den Cyberkriminellen, der die Ransomware entwickelt hat, ist der Zugriff auf die Daten keinesfalls garantiert. Die EFSS-Lösung von Syncplicity by Axway etwa bietet hier einen guten Schutz. Durch das Storage-Management werden Daten permanent in verschiedenen Generationen gesichert, sodass eine Restaurierung wichtiger Informationen jederzeit möglich ist.

Im Gegensatz zu herkömmlichen Cloud-Synchronisationen kommt hier nicht nur ein "magischer Ordner" zum Einsatz, bei dem die Verschlüsselung durchsynchronisiert wird, sondern mehrere. Diese lassen sich dann voneinander isoliert behandeln. Damit minimiert sich das Risiko, dass alle Datenbereiche unbrauchbar werden. Außerdem stellt EFSS sicher, dass riskante Dateitypen von der Synchronisation ausgenommen werden. Ferner können bei Nutzung der Share-Funktion Mailanhänge seltener verwendet werden, was auch hier du einer Verringerung des Risikos führt. Sollte der Worst Case allerdings eingetreten sein, erstellt EFSS einen Recovery Plan, nach dem sich die befallenen Dateien sukzessive rasch wiederherstellen lassen.

Fazit
Herkömmliche Storage-Architekturen sie sind oft zu starr und unflexibel. Ein Ausweg könnte Enterprise File Sync & Share bieten, das vor allem beim Datenschutz seine Stärken ausspielt und es vermag, vorhandene und neue Speicher zu hybriden Strukturen zusammenzuführen.

Read original article here.

]]>