Rethinking File Security Then, Now & Future Presenters: - - PowerPoint PPT Presentation

rethinking file security
SMART_READER_LITE
LIVE PREVIEW

Rethinking File Security Then, Now & Future Presenters: - - PowerPoint PPT Presentation

Rethinking File Security Then, Now & Future Presenters: Moderator: Sharon Teo Gunes Altungunes Ting Teck Wei CEO Product Manager Marketing Manager Development Center About Us America South Asia Middle East International HQ


slide-1
SLIDE 1

Rethinking File Security

Then, Now & Future

Presenters:

Sharon Teo CEO Ting Teck Wei Product Manager

Moderator:

Gunes Altungunes Marketing Manager

slide-2
SLIDE 2

▪ Established in 2000 ▪ Headquartered in Singapore ▪ Provides solutions to Government and Enterprises

About Us

Middle East America South Asia Development Center International HQ Development Center

slide-3
SLIDE 3

Agenda

Evolution of File Security File Security in EasiShare V10

Sharon Teo CEO Ting Teck Wei Product Manager

slide-4
SLIDE 4

Evolution of File Security

Sharon Teo CEO

slide-5
SLIDE 5

Pop Question

What are the common and risky behaviours seen in your organization?

slide-6
SLIDE 6

Going back in time..

2007 2011 The Start of Dropbox Emergence of Mobile Devices Proliferation of Smartphones & Tablets Mapping Network Drives Organise and Search Files Easily External File Sharing Lack of Data Sovereignty

slide-7
SLIDE 7

Mapped Drives

slide-8
SLIDE 8

Sync & Share

BYOD Cloud Sync Mobility Consumerization of IT?

slide-9
SLIDE 9

2015

Birth of EasiShare

From a “Proof of Concept” to “Going Live” External File Sharing Project “Sync and Share” 2012

XXXXXX

OTP via SMS Visibility Audit Log 2013 Modernise Legacy Storages Flexible Storage Connector

slide-10
SLIDE 10

Proof of Concept

Private Government Storage for Sync & Share

slide-11
SLIDE 11

EasiShare – 1st version

Share Files on Web AES256-bit Encryption Sync & Back up Files

slide-12
SLIDE 12

Secure Sharing with OTP

SMS OTP Link Expiry

slide-13
SLIDE 13

Comprehensive File Tracking with Audit Log

IP Addresses All User Activities

slide-14
SLIDE 14

Platform Agnostic with Flexible Connectors

The Old Way The New Way SAN SMB WebDav

slide-15
SLIDE 15

Security Progress

Increased Security Needs Everchanging Cyber threats 2016 Network Separation A B Air-Gapped Architecture COVID 19 -Work From Home Secure Collaboration

TRUST

Zero Trust Approach Admin Audit Backup and Sync Versioning Control

slide-16
SLIDE 16

Air-Gapped Architecture

Intranet DMZ

External recipients retrieve files with OTP protection

Public

SFTP

Anti-Virus

Data Diode

Web App DB Web App DB

slide-17
SLIDE 17

Everchanging Cyber Threats

April 2020 Ransomware breach in its internal network

Source: ZDNet

2019 29% of data breaches caused by Ransomware

Source: Carbon Black Threat Report

2020 Most infections are related to ExternalBlue activities. It suggests that businesses are not tackling their SMB Vulnerabilities

Source: 2020 State of Malware Report

June 2020 Ransomware caused temporary shut down of its production plant globally

Source: Forbes

2017 Third worst hit nation by Wannacry; over 40,000 computers were infected

Source: The Economic Times

October 2018 WannaCry caused 200,000 computers to lock out users

Source: Telegraph

slide-18
SLIDE 18

SMB Replacement with Version Control

Check-In/Check-Out Versioning

slide-19
SLIDE 19

Control Security Policies

Company/Group/User Level

User Control & Audit

User Audit Log Segregate User Roles

slide-20
SLIDE 20

Backup and Sync

From Your Device To the Server

slide-21
SLIDE 21

Internal Collaboration

Manage Folders Manage User Permissions

slide-22
SLIDE 22

Audit & Controls

Segregate Admin Roles Admin Audit Log Control Security Policies

Company/Group/User Level

slide-23
SLIDE 23

Balancing Security & Users Experience

International Regulations Corporate Policies Legacy Systems Cost Budgeting Internal Audit User Experience Workplace Efficiency Multi-Device Accessibility Multi-Function Features

Employee Demands IT Challenges

slide-24
SLIDE 24

Securing your Enterprise Files

Banning

  • f USBs

SMB Replacement Infrastructure Modernisation IT security or infrastructure architecture driven initiatives Workplace productivity with better Visibility & Controls Secure Collaboration Large File Transfer Backup and Sync

slide-25
SLIDE 25

File Security in EasiShare v10

Ting Teck Wei Product Manager

slide-26
SLIDE 26

Future

Holistic Approach

Integrations

New (v10) Data Backup & Protection Access Review Approval Workflow Web Editing

EasiShare’s Journey

Quick Access

Enterprise File Security

Document Tag Manage Folders (Access Overview) Present (v9)

slide-27
SLIDE 27

Document Tags

Classification with Document Tagging

  • Label sensitive files for

policy-based controls when sharing files

slide-28
SLIDE 28

Manage Folders (Access Overview)

View Managed Folder Permissions

  • Owners can quickly have a

view of folders shared with respective users and their permission levels

slide-29
SLIDE 29

Quick Access

History and Favourites

  • Readily access the files

that you have recently worked on

slide-30
SLIDE 30

Future

Holistic Approach

Integrations

EasiShare’s Journey

Quick Access

Enterprise File Security

Document Tag Manage Folders (Access Overview) Present (v9) New (v10) Data Backup & Protection Access Review Approval Workflow Web Editing

slide-31
SLIDE 31

End to End Data Backup & Protection

Delta Changes

Endpoint Backup and Sync Delta Sync Disaster Recovery

  • Automated file backup to EasiShare

server

  • Only delta changes are transferred to

EasiShare server, saving bandwidth

  • Backup and data replication to
  • ffsite backup locations

Web App DB

slide-32
SLIDE 32

Approval Workflow

Access Review / Approval Workflow

Review Permissions Currently still working with us Left the company Approval of File Sharing Periodic Access Review

Access Review

Benefits:

  • Compliance to

security policies

  • Increase

efficiency during access review Sharing of Sensitive Files System Admin Data Owner User Data Owner Benefits:

  • Additional

approval before file sharing

  • Reduce the risk
  • f data leakage
slide-33
SLIDE 33

Web Editing

For Office Documents Edit without Downloading

  • Reduce the need to upload and

download files

Auto Check-Out & Versioning

  • Easily track and manage changes
slide-34
SLIDE 34

Pop Question

From all the features you've seen, which feature do you like the most?

slide-35
SLIDE 35

Data Protection Scenario

3-Tier Secure Architecture

Immutable Snapshots in Backup Storage Backup Tier

Web Tier App Tier DB Tier

Intranet DR Site

CIFS Storage

slide-36
SLIDE 36

Data Protection Scenario

3-Tier Secure Architecture

Immutable Snapshots in Backup Storage Backup Tier

Web Tier App Tier DB Tier

Intranet DR Site

CIFS Storage Quick Recovery

slide-37
SLIDE 37

Future

Holistic Approach

Integrations

EasiShare’s Journey

Quick Access

Enterprise File Security

Document Tag Manage Folders (Access Overview) Present (v9) New (v10) Data Backup & Protection Access Review Approval Workflow Web Editing

slide-38
SLIDE 38

Encryption Anti-Virus Semantic Search Early Breach Detection Storage Connectors

Our Ready Integrations

slide-39
SLIDE 39