Choose the Right File Sharing Solution for ITAR Compliance

ITAR (International Traffic in Arms Regulations) is promulgated pursuant to the Arms Export Control Act (22 USC sec. 2751). The regulations are programmed to restrict and control the import and export of defense and military-related items, technologies, and services. Any item or service subject to the regulations must be included on the United States Munitions […]

Read More »

Understanding CMMC and Compliance Using FileCloud

CMMC is a means by which the US Government is using to enforce a tiered approach to audit third-party compliance with NIST SP 800-171, based on five different levels of maturity. DoD third-party organizations have been required to comply with NIST 800-171 since January 1, 2018. In the past three years, the DoD struggled with […]

Read More »

Keeping your Cloud Infrastructure Secure Using SIEM

What if instead of building a solution that processes and collects logs and security events, you could push the problem to the cloud through an encrypted channel? As a result, you would easily get detailed reports about threats to your company. In this article, we will examine the topic of SIEM (Security Information and Event […]

Read More »

Information Security – An Overview of General Concepts

Information Security – The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. – Definition of Information Security from the glossary of the U. S. Computer Security Resource Center Why we need to protect information Information and information systems help us […]

Read More »

Understanding CJIS Policies and Implementation using FileCloud

CJIS Security Policy entails information security requirements, guidelines, and agreements documenting the will of law enforcement and criminal justice agencies for protecting the sources, transmission, storage, and generation of Criminal Justice Information (CJI). The Criminal Justice Information (CJIS) Security Policy provides a secure model of laws, standards, and elements of published and vetted policies for […]

Read More »

Enforce data protection in FileCloud with Smart DLP

How FileCloud’s intelligent data leak prevention capabilities work to protect enterprise content with information on how to configure DLP.]

Read More »

How to Best Utilize FileCloud’s Metadata

    Info: This is the first post in the series “Smart Classification, Metadata, and Smart DLP – the powerful combo” about data classification and security in FileCloud The current world is all about data. Data mining, data science, AI, everything revolves around gathering data, processing data, and analyzing it. The same applies to modern […]

Read More »

Finding a Safe Place for Your Data and Software

  Your organization runs on data and software. But this whole IT environment needs to live somewhere. Preferably a safe place that no unwanted people can access. What options do you have? How should you choose where to host your data and your software? In this article, we’ll explore these topics in-depth, hopefully giving you […]

Read More »

Securing FileCloud with On-Premise Installations

  FileCloud provides secure file storage and sharing infrastructure to corporations for data storage. FileCloud can be easily accessed through any device. Files can be easily stored, shared, and synced across different channels. Although the FileCloud application is fully compliant with HIPPA, FIPS, ITAR data governance policies, it is still critical to perform basic hardening […]

Read More »

How to Easily Debug Windows Network Share Access Issues

  When trying to access existing remote network shares from a Windows machine, you may see some errors that prevent you from accessing the share. This blog is about some of those errors and how to fix them. Problem 1: User account has insufficient permissions This is the most obvious issue but is often overlooked. […]

Read More »