Data Vault

Data Vault – Secure Data Storage & File Sharing / Collaboration




Secure Data Vault


Data Vault Security


The Challenge

Current transfer solutions such as courier services, FTP servers, email or leased lines can be very costly, insecure, not scalable or rely heavily on IT for setting up new partners and processes.

Growth and need to collaborate and share information quickly has increasingly resulted in employees becoming reliant upon cloud storage offerings like Amazon Simple Storage Service (Amazon S3), Box and 3rd party hosted multi-tenanted cloud storage platforms - the need to secure sensitive data in these environments grows increasingly urgent.

Moreover, organisations continue to grapple with regulatory requirements posed by SOX, PCI, HIPAA, Basel II and others, which require organisations to encrypt sensitive data being exchanged and provide accountability on who accessed files. Lack of compliancy with these regulations can result in heavy fines and audit failures.




Solution Features & Benefits



> Sync, store and share sensitive information files with encryption

> Share passwords and other sensitive information securely


> On-premise and cloud based secure data vault solutions


> Secure enough for the most sensitive of industries – financial and legal sectors and many others

 
> Can be used purely for in-house employees or securely share content with partners, suppliers and customers


> Solution scales organisation sizes and budgets from small 5 users accounts to thousands of global enterprise users


> Provision secure access and sharing to mobile users / devices

> Securing data while empowering business mobility

> Enable mobile employees to work and collaborate from anywhere


> Auto sync across all devices

> Integrate with Microsoft Outlook, SharePoint, Network File Shares, Office 365, 3rd party cloud platforms


> Store and manage privilege user passwords
> Secure data in storage systems: On-premise and cloud based SAN, NAS, File Servers

> Featured secure access control


> Two factor authentication

 
> Send, store and encrypt files, emails and attachments

> Segregate privileged users from sensitive business data (IT admins can not read finance directors reports)

> Audit and log activity

> Tamper-proof audit logs

> SIEM, data loss prevention and anti-virus integration

> PCI DSS compliance reports

> Data backup, disaster recovery and high availability features

> Solutions tested by independent penetration testing experts

> Encryption
  • Encrypted using AES 256-bit encryption. Dual encryption for extra -security. Can be configured to run in FIPS 140-2 compliant mode.
  • Transparent encryption
  • Application encryption
  • Fields and columns in databases encryption