Rethinking File Security Then, Now & Future Presenters: Moderator: Sharon Teo Gunes Altungunes Ting Teck Wei CEO Product Manager Marketing Manager
Development Center About Us America South Asia Middle East International HQ Established in 2000 ▪ Development Center Headquartered in ▪ Singapore Provides solutions ▪ to Government and Enterprises
Agenda Evolution of File Security Sharon Teo CEO File Security in EasiShare V10 Ting Teck Wei Product Manager
Evolution of File Security Sharon Teo CEO
Pop Question What are the common and risky behaviours seen in your organization?
Going back in time.. Proliferation of Smartphones & Lack of The Start of Mapping External Data Sovereignty Tablets Network Drives Dropbox File Sharing 2007 2011 Organise and Emergence of Search Files Easily Mobile Devices
Mapped Drives
Sync & Share Consumerization of IT? BYOD Cloud Sync Mobility
Birth of EasiShare From a “Proof of Visibility Audit Concept” to Project “Sync Log “Going Live” and Share” 2012 2013 2015 XXXXXX External OTP via Modernise Flexible File Sharing SMS Legacy Storage Storages Connector
Proof of Concept Private Government Storage for Sync & Share
EasiShare – 1 st version Share Files on Web AES256-bit Sync & Encryption Back up Files
Secure Sharing with OTP SMS OTP Link Expiry
Comprehensive File Tracking with Audit Log IP Addresses All User Activities
Platform Agnostic with Flexible Connectors The New Way The Old Way WebDav SAN SMB
Security Progress Admin Increased Network Zero Trust Air-Gapped Security Needs Separation Audit Architecture Approach A B TRUST 2016 Backup and Sync Secure Collaboration Versioning Everchanging COVID 19 -Work Control Cyber threats From Home
Air-Gapped Architecture Intranet DMZ Public Anti-Virus SFTP Web Web App App DB DB External recipients Data retrieve files with Diode OTP protection
Everchanging Cyber Threats October 2018 WannaCry caused 200,000 computers to lock out users Source: Telegraph June 2020 Ransomware caused temporary shut down of its production plant globally April 2020 Ransomware breach in Source: Forbes its internal network Source: ZDNet 2020 Most infections are related to ExternalBlue activities. It suggests 2017 2019 that businesses are not tackling Third worst hit nation by 29% of data breaches their SMB Vulnerabilities Wannacry; over 40,000 caused by Ransomware computers were infected Source: 2020 State of Malware Report Source: Carbon Black Threat Report Source: The Economic Times
SMB Replacement with Version Control Check-In/Check-Out Versioning
User Control & Audit Segregate User Roles Control Security Policies Company/Group/User Level User Audit Log
Backup and Sync To the Server From Your Device
Internal Collaboration Manage Folders Manage User Permissions
Audit & Controls Segregate Admin Roles Control Security Policies Company/Group/User Level Admin Audit Log
Balancing Security & Users Experience Corporate User Multi-Device Policies Experience Accessibility International Legacy Regulations Systems Workplace Multi-Function Efficiency Features Employee Internal Cost Demands Budgeting Audit IT Challenges
Securing your Enterprise Files IT security or infrastructure Workplace productivity with architecture driven initiatives better Visibility & Controls Secure Infrastructure Collaboration Modernisation Backup and Banning Sync of USBs SMB Large File Replacement Transfer
File Security in EasiShare v10 Ting Teck Wei Product Manager
EasiShare’s Journey Enterprise File Security Holistic Approach Data Backup Manage Folders & Protection (Access Overview) Approval Workflow Integrations Access Quick Review Web Access Document Editing Tag Present (v9) New (v10) Future
Document Tags Classification with Document Tagging Label sensitive files for • policy-based controls when sharing files
Manage Folders (Access Overview) View Managed Folder Permissions Owners can quickly have a • view of folders shared with respective users and their permission levels
Quick Access History and Favourites Readily access the files • that you have recently worked on
EasiShare’s Journey Enterprise File Security Holistic Approach Data Backup Manage Folders & Protection (Access Overview) Approval Workflow Integrations Access Quick Review Web Access Document Editing Tag Present (v9) New (v10) Future
End to End Data Backup & Protection Disaster Recovery Backup and data replication to • offsite backup locations Delta Sync Web App Only delta changes are transferred to • DB EasiShare server, saving bandwidth Delta Changes Endpoint Backup and Sync Automated file backup to EasiShare • server
Access Review / Approval Workflow Access Review Approval Workflow System User Admin Periodic Sharing of Benefits: Benefits: Access Review Sensitive Files Additional • Compliance to • approval before security policies Data file sharing Owner Increase • Reduce the risk • efficiency during Data Review of data leakage access review Approval of Owner Permissions File Sharing Currently still Left the working with us company
Web Editing For Office Documents Edit without Downloading Reduce the need to upload and • download files Auto Check-Out & Versioning Easily track and manage changes •
Pop Question From all the features you've seen, which feature do you like the most?
Data Protection Scenario Intranet DR Site 3-Tier Secure Architecture Web Tier App Tier CIFS Storage Backup Tier Immutable Snapshots in Backup Storage DB Tier
Data Protection Scenario Intranet DR Site 3-Tier Secure Architecture Web Tier Quick Recovery App Tier CIFS Storage Backup Tier Immutable Snapshots in Backup Storage DB Tier
EasiShare’s Journey Enterprise File Security Holistic Approach Data Backup Manage Folders & Protection (Access Overview) Approval Workflow Integrations Access Quick Review Web Access Document Editing Tag Present (v9) New (v10) Future
Our Ready Integrations Semantic Search Encryption Storage Connectors Early Breach Detection Anti-Virus
Recommend
More recommend