Archive for category Data Security

Risky Cloud-based File Sharing Has Met Its Match in GoDrive EFSS

Posted by on Tuesday, 10 March, 2015

So you’ve decided 2015 is the year to finally end your organization’s use of high risk cloud-based file sharing services.  Maybe it came from a directive by senior management to reduce the exposure of sensitive company documents, or maybe you’ve accepted that policy enforcement is simply unmanageable.

Chances are, your requirements include greater control over user access, end-to-end encryption, disk quotas and the ability to wipe files on lost or stolen devices.  At the same time, you recognize that ease of use is paramount or employees will resist giving up their familiar apps.

One Way to Reduce RiskGoDrive by GoAnywhereTM might be one way to do just that.  More than a Dropbox alternative, GoDrive is a cloud storage replacement that delivers peace of mind.

For IT Professionals, GoDrive is the on-premise Enterprise File Sync and Sharing (EFSS) solution that gives you the centralized control you need.  Detailed audit logs provide senior management the assurance of knowing who’s accessing what files, when and from which device.

End-users will appreciate the intuitive drag-and-drop interface, and advanced file monitoring features are sure to impress.  Desktop sync creates a Windows drive that automatically updates documents for collaboration with both local and remote team members.

It’s the new network security initiative that makes perfect sense for everyone who needs a better way to share files. Try it yourself today with a FREE trial download to test on your own on-site or hosted system.

4 Benefits of On-premise Enterprise File Sync and Sharing

Posted by on Tuesday, 3 March, 2015

Benefits of on-premise EFSSToo many organizations have underestimated the value of mission-critical business documents.  Some employees may take great risks with sensitive or proprietary information and hope that nothing bad happens.

Today, there’s a new way for your entire organization to easily store documents and enjoy secure collaboration with GoDrive by GoAnywhereTM.  What makes GoDrive unique is the underlying technology, which provides powerful security and access management to make sure your data is safe.

Let’s look at the four biggest benefits of the GoDrive Enterprise File Sync and Sharing (EFSS) solution:

  1. Better Protection. Cloud-based file sharing services are limited in their ability to protect your sensitive business documents. As high profile service providers, they are under increased threat of attack by hackers, as seen in recent headlines regarding security concerns and data breaches. In contrast, GoDrive allows you to store your sensitive documents on your server of choice, providing you with local security and management of those documents.
  2. Efficiency and Control. Sending email attachments can be problematic due to file size restrictions or their vulnerability to interception during transmission. The GoDrive EFSS central storage lets you share a document once and continue to make updates, all the while shared users are accessing the most current information.
  3. Convenience. The GoDrive EFSS solution eliminates the need for memory sticks to transport data and the risk associated with using them. Your files can be securely accessed anywhere, anytime with a secure Internet connection and browser.
  4. Easy Sharing. Network drives can be found in nearly every office for sharing files within your department.  However, it’s not so convenient if you want to share files between remote office locations or when working offsite.  EFSS enables you to connect and share simply and easily without boundaries.

GoDrive is built on the proven security features of GoAnywhere ServicesTM.  The intuitive interface is simple for employees and trading partners, and project leaders will appreciate the advanced activity monitoring and email notifications.

Talk to your IT administrator about the security advantages of GoDrive.  They can even download a FREE full feature trial for evaluation.

What GoAnywhere customers should know about Shellshock

Posted by on Friday, 26 September, 2014

On September 24th, vulnerability CVE-2014-6271 and CVE-2014-7169, also known as Shellshock or the Bash bug, was found in the widely-used Unix Bash shell. The vulnerability allows Bash to execute commands from environment variables unintentionally.

GoAnywhere Director, GoAnywhere Services, and GoAnywhere Gateway run on a JVM which is invoked from within a Bash shell.  While GoAnywhere is not directly affected by this bug, the GoAnywhere startup process utilizes the common JAVA_HOME and JRE_HOME environment variables during the initialization of the JVM.  It is thus possible that a compromised environment variable on a vulnerable Linux and Unix system could cause the startup and shutdown process of GoAnywhere to unintentionally execute other commands and programs.

Linoma Software recommends that our customers who deploy GoAnywhere to Linux and UNIX servers be aware of this security bug and apply the appropriate patches as they become available from your operating system vendor.

SFTP vs FTPS – Best Solution for Secure FTP (Infographic)

Posted by on Thursday, 14 August, 2014

With large data breaches recently taking center stage in the media, many businesses have begun paying close attention to internal practices and taking action to improve internal systems and processes. As a result, an increasing number of businesses (people) who rely on data transfers are looking to move away from standard FTP in favor of a more secure method.

We are often asked about the key differences between SFTP and FTPS. There are potential pros and cons with each method, which is why businesses should weigh the differences carefully to determine what option would serve them best.

Over the years, we have tried explaining SFTP vs FTPS in a variety of ways. Between lists and charts and drawings, we found that most people were easily able to comprehend unique aspects of each transfer protocol when it was presented visually.

We created the following infographic to highlight the positives and negatives of using SFTP vs FTPS. You can also view the original blog post for a more detailed comparison.

sftp vs ftps infographic

 

Share this Image On Your Site

IT Security Threat Reaches Executive Level

Posted by on Friday, 18 April, 2014

The success of a company now relies on its ability to secure critical data.  When escalated to this level of importance, it’s time for the CEO and board to become directly engaged in the process.

The traditional role of IT has changed significantly in recent years.  IT professionals, previously tasked with configuring office computers and network servers, are now entrusted with securing trade secrets and highly sensitive customer records.  Add to this a surge of cloud-based applications and storage that make an organization’s data vulnerable and the IT department suddenly has a very full plate.

Organizations are being targeted primarily for the purpose of financial gain.  Customer records often include sensitive data that can be easily monetized, providing ample motivation for both hackers and internal threats.  As companies increase their digital assets — through the harvesting of more customer personal, financial and transaction information – they become a higher profile target for thieves.

Failure to Recognize a Breach

single sign-on breachFirewallThe challenge often seems to be detecting and resolving intrusions.  Sometimes the first notification of a breach comes from federal investigators who’ve discovered the organization’s data on the open market.  Even when signs of suspicious activity present themselves, too frequently the threat is not given proper escalation.

Of greatest concern is the timely reporting of incidents through the levels of company leadership, regulatory authorities and, ultimately, the effected parties. The IT department might feel compelled to research and resolve the breach before notifying senior management.  This can turn a potentially damaging situation into a public relations nightmare.

Common Language is Key

The solution begins with establishing a communication channel and common language between business and IT leaders.  Together they must understand and agree upon the level of risk the organization is willing to tolerate.

These marching orders allow the IT department to make a plan that meets these strategic needs.  Once completed, the gaps, priorities, and strategy needs to be communicated back to the CEO and board in a language that top leadership can understand.

Lastly, don’t deny the limitations of your IT department.  The complexities and rapidly changing nature of security breaches may require the assistance of outside expertise to keep systems and procedures current.

This post is based on a TechRepublic article by Michael Kassner titled, “C-level execs need to rethink IT security”.