Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Egnyte Tackles Data Loss With New Data Governance Solution

Cloud computing remains a problem for many businesses. While the move to IaaS is gathering pace, it is still true that most organizations operate a hybrid approach, combining cloud apps and on-premise data. According to Egnyte, 85% of apps are now in the cloud, while 85% of data is still on premises. This creates a huge governance issue as corporate data moves into and out of cloud applications.

Cloud computing remains a problem for many businesses. While the move to IaaS is gathering pace, it is still true that most organizations operate a hybrid approach, combining cloud apps and on-premise data. According to Egnyte, 85% of apps are now in the cloud, while 85% of data is still on premises. This creates a huge governance issue as corporate data moves into and out of cloud applications.

Cloud App Security

Egnyte itself started life as one of those apps – a business-oriented file store, sync and share service. Now it claims to have taken everything it has learned about governance issues, international privacy concerns and geographical regulations to create a new product launched today: Egnyte Protect. “While our roots have been in the Enterprise File Sync and Share space,” explains CEO Vineet Jain, “we saw a real opportunity to capitalize on all the analytics we acquired and learned from our platform file usage to help customers get smarter about how they manage their content.”

Companies store their data in multiple cloud applications – the enterprise might have a Box account while employees might also use Dropbox, Drive or OneDrive. Egnyte Protect doesn’t care. It will provide IT with data governance controls wherever that data might go.

The first release today provides access control. It can be used to eliminate insecure links, to unify permissions across content repositories, and to locate unusual access patterns to help locate and limit data leakage.

Three other modules will be added in the future: selective encryption, data residency and data retention. The encryption module will allow selected files to be encrypted locally and remain encrypted wherever they are stored. In this case the encryption keys remain with the company and are not held or known by the cloud service provider.

The data residency module will allow users to control where the data is stored; locally, in the cloud, in specified geographic regions or even specified cloud companies.

The data retention module will govern the life-cycle files, allowing the user to specify how long files should be retained and who can access or modify them.

Egnyte Protect

At a time when many countries require that at least some types of data must remain within national borders, and the EU is applying strict and heavily sanctioned rules on all European personal information, Egnyte Protect is designed to give its customers the tools to apply strict governance and security rules on all of their data, wherever it goes.

“Data governance is an area IT departments historically tend to shy away from because of the perceived effort and time to value when it comes to creating and enforcing policies,” comments Sean Pike, program director, eDiscovery and Information Governance at IDC. Most organizations need to hire experts, invest in equipment and spend months figuring out the right implementation – modifying policies as they uncover issues. This is the problem that Egnyte Protect claims to have solved.

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Cybercrime

A database containing over 235 million unique records of Twitter users is now available for free on the web, cybercrime intelligence firm Hudson Rock...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Software maker Adobe on Tuesday released security patches for 29 documented vulnerabilities across multiple enterprise-facing products and warned that hackers could exploit these bugs...