File Server Encryption


File Server Encryption

File Server Encryption

Can you confidently control access, track, monitor and prevent sensitive business information leave your network or cloud file servers?

File sharing and collaboration applications pose a big risk to data loss and compliance breach.

Ensure secure file access and transfer


Data Vault


Solution Features & Benefits



> Turn your file server into an encrypted data vault, with access control and audit logging

> Syncronise and encrypt data going to DropBox from file servers via OSi mobile devices

> Mobile device data cache encryption

> Automatically encrypts data leaving and going out of the file server / vault and where ever it travels or rest (in-tranist or at-rest)

> Non-disruptive encryption

> Role separation is supported by enforcing different permission levels for users, data owners, and administrators

> Discover sensitive information with DLP integration, and encrypt it

> Data-in-Trasit: encryption remains with the files or folders even if they moved from the file server, ensuring authorised access only by those with appropriate permissions

> Persistent file encryption on desktops, laptops, network, and cloud-servers

> Confidently allow access to your data anywhere with your mobile devices




> Protect data in collaborative spaces – including the Cloud

Shared file servers have emerged as central collaborative tools in today’s workplace and many companies now offer cloud based file sharing, enabling users to access shared information anywhere.

Organisations must have confidence that data stored and shared in this way is secure and only accessible to authorised users if they are to be used as true productivity tools.

File encryption solutions for servers also typically extends protection of data on PCs and mobile devices to ensure the security of share documents on internal and cloud based file servers by automatically and transparently encrypting files and folders based on either manual or centralised policy. Collaborative file sharing work spaces can be created and managed by users, and shared with third parties, where policy based access control rules are applied in context to what people can access and share.



Transparent and Seamless

Products feature transparent encryption, enabling security teams to implement encryption, without having to make changes to their organisation’s applications, infrastructure, or business practices.



Content Inspection

Files placed into the file server / vault are inspected for potentially malicious executables or viruses.




Version Control

Maintain most recent files versions, even if files have been taken out of the file server / vault and put back in at a later date. This is also maintained and reflected for data backup.



Strong end-to-end encryption

Applying access control to devices and applications, allowing content owners or administrators to specify access rights for specific groups, individuals, applications, or file locations.

Administrators are able to set encryption policy so content such as documents, spreadsheets, presentations, video, and audio are automatically encrypted when produced from selected applications or sent to specific folders. Once encrypted, files and folders can be moved without jeopardising their encrypted status, ensuring only authorised users have access to sensitive data.

Secure documents can be moved or copied and stored securely on shared network drives, FTP servers, application servers, desktops, USB flash drives, CDs/DVDs and external hard drives. Copies taken using backup software will automatically stay secured. Encrypted documents carry user access rights with them to protect against unauthorised access.



Data Anywhere with your mobile device

Users tap the File Viewer application on their mobile device and access their files as they normally would.



Empower user assigned permissions

Gives users control on who can access a secured file by assigning access rights to other users or groups.

Administrators can define policies to manage sharing rights for users or groups. Also create groups or departments with particular access rights.



Separation of duties

Separation of duties means that different people control different levels of management or procedures so that no one person controls multiple or all levels.

IT staff -including hypervisor, cloud, storage, and server administrators—can perform their system administration tasks, without being able to gain access to the sensitive data residing on the systems they manage.



Authentication

Add two factor authentication for even stronger user access control.




Compliance

Address compliance requirements:

> enforce separation of user duties by keeping data private within entitled communities.

> extensive reporting tools for auditing of file security policies, as well as regulatory compliance.

> FIPS 140-2&3 Validated encryption



Platforms

a broad range of File systems, storage architectures and operating systems, including Microsoft Windows, Linux, Oracle Solaris, IBM AIX, and HP-UX.



Also See

- Cloud data protection

- Data-at–rest encryption

- Database encryption

- Storage (NAS) encryption

- Data Vault

- Encryption in transit

- Mobile File Sync encryption (OSi device to Dropbox)

- Email encryption

- Privileged user access control








Contact us today to discuss your requirements in more detail.



P: +44(0)7714 209927

S: +44(0)1273 329753

info@securenetconsulting.co.uk