Archive for the ‘EFSS’ Category

Cognitive Search: A New Generation of Enterprise search

Enterprise search
A lot of organizations have begun making significant investments in digital transformation in order to fill their operational gaps. One of the areas seeing this transformation is search, mainstream search is broken. Data volumes are growing at an exponential rate – the digital world is expected to create 163 zettabytes of data in 2025, a 10x increase compared to 2016. The concern for a lot of companies will be making information easily accessible to employees and customers. Employees already spend too much time searching for content. According to one study, knowledge workers spend 20 percent or more of their day searching for relevant and timely content. Employees should have the ability to find information, and gain insight, via a spoken question, an image, a natural language text input, or virtually any other way that feels intuitive and natural. Traditional enterprise search functions have shortcomings that make it difficult or at times impossible for users to find the information they seek. Modern, machine-learning based search is capable of transforming the way employees find answers and gain insights. This approach is commonly referred to as ‘cognitive search’, an increasingly powerful way to handle the data and knowledge-sharing challenges that modern enterprises commonly face.

Cognitive search is radically transforming the process of retrieving files. Search has now transcended basic keyword matching; it has evolved to become ‘cognitive’ – the ability to provide relevant answers to natural language questions. Manually searching for documents and files within enterprise systems is declining. Large enterprises have begun showing a dire inclination towards this disruptive technology. With all the hype around cognitive search and artificial intelligence (AI) in general, it’s seemingly difficult to grasp how to actually apply these new technologies to improve the workplace. Having a basic understanding of cognitive search and how it relates to traditional enterprise search is the first step towards establishing an effective cognitive search system and setting it up for ongoing growth.

Enterprise Search Vs Cognitive Search

In a recent brief, Forrester, research firm, defined cognitive search as – “the generation of enterprise search solutions that utilize AI technologies like machine learning and natural language processing (NLP) to ingest, understand, organize, and query digital content from several data sources”. Cognitive software mimics human behavior like perceiving, inferring, reasoning, and making hypotheses. And when coupled with advanced automation, these systems can further be trained to perform judgment-intensive tasks. Enterprise platforms with cognitive computing abilities are capable of interacting with users in a natural manner. With time, they can learn user behavioral patterns and preferences. This allows them to establish links between related data from both external and internal sources.

The major drawback of traditional enterprise search is that information is typically poorly defined and datasets are dispersed across multiple systems. Although it allows for in-depth indexing, tagging and keyword implementation, this is not always sufficient when making data based decisions. Cognitive search fills in the gaps, and augments what enterprise search is capable of doing.

Cognitive search offers the potential for phenomenal improvements in the efficiency, relevance, and accuracy of insight discovery. While some may view cognitive search as simply traditional search augmented by artificial intelligence and machine learning, there is actually a complex combination of capabilities that distinguishes, and makes it superior to traditional enterprise search. Cognitive search transcends search engines to amalgamate a vast array of data sources, along with avant-garde tagging automation, greatly improving how an organization’s employees find, discover and access the information they require to complete their tasks.

Most of the design elements used to build enterprise search can be utilized as the foundation for implementing cognitive search. While enterprise simply locates the data, cognitive applies user analytics to it in order or enhance understanding while also unearthing deeper trends that may have otherwise been missed.

The Impact of Cognitive Search

The workflow of an estimated 54 percent of global information workers is interrupted a few times or more per month, when trying to get access to answers, insights and information. Cognitive search can shift that paradigm by extracting the most relevant piece of information from large sets of varied and intricate data sources. According to the Economist, while content doubles every 90 days, 80 percent of the content information workers rely on for core revenue generation activities remains unstructured. This dramatic growth of unstructured content has become a challenge for several enterprises.

With cognitive search, knowledge worker searching internal systems are more likely to find the information they need. Customers looking through a company’s website can more easily find answers to their queries online. From a customer service and marketing perspective, this is a huge plus since it directly translates to a reduction in call center volumes while increasing overall customer satisfaction. Like humans, cognitive systems learn on the job, as more information is made available to them. That’s excellent news, given the rate at which the digital universe is growing each year.

Most companies are already using cognitive applications to target marketing campaigns; however, cognitive search is yet to be widely adopted. This is starting to change, as NLP – which previously required complex hardware, approaches mainstream appeal, primarily via the cloud. Cognitive search will likely have a greater impact on enterprise operations.

 

Author: Gabriel Lando
image courtesy of freepik.com

10 File Sharing Commandments

 

 

If you keenly reviewed all cloud services and their corresponding impacts on enterprises, EFSS would arguably be among the top revolutionary solutions. Before enterprises discovered it, the business scene was nothing close to what it is today.

With 21.3% of employees struggling to search and locate files even on standard PCs, productivity was an issue for both large and small businesses. Of course, this seemed normal then. But, if you analyzed the whole setup in retrospect after application of EFSS, you’ll notice major inefficiencies in both time and resource use.

Finding a single file, on average, took 18 minutes. This translates to half a day dedicated to searching and retrieving information for every worker. So essentially, a week or 5 working days would actually be two and half days of actual task handling, while the rest would be devoted to mining and distributing data.

Although cloud-based file sharing took some time to catch up, it has largely been a welcome tool in all types of enterprises. It’s now possible to coordinate information between a client in Chicago and a worker based in London.

Due to varying needs, file sharing solutions have since diversified, and businesses are now able to choose from multiple alternatives. While some are simply alternatives to distributing information online through FTP, others are used in tandem with third-party solutions to provide a collaboration suite that collectively facilitates file editing, review, versioning, approval, commenting and sharing.

Currently, an average business is utilizing 171 collaboration apps and 57 file sharing solutions. The proponents of this system claim that it helps enterprises capitalize on the services’ individual strengths. But the truth of the matter is that such a myriad of similar apps introduces complications in the overall IT infrastructure. Besides triggering increased security vulnerabilities, it misaligns the database architecture with enterprise goals.

So, to help you achieve effectual and secure file sharing, here are 10 critical rules your organization should follow:

  1. Maintain Simple Permissions

Of course, you can develop tens of groups to manage shared files by granting distinct permissions at separate levels. While this is arguably much more secure, it complicates the whole structure for all employees, occasionally resulting in immense inefficiencies.

Instead of this system, consider using a much simpler approach that helps shared file owners figure out their way around the system as they share the files. Otherwise, they may end up blindly sharing files with unauthorized users.

  1. Take Advantage of Security Groups

Most organizations are composed of several departments, each with its own group of employees handling similar tasks. They keep sharing the same types of files back and forth in their regular work duties. While each individual uses a distinct user account, employees in one department typically have the same level of security clearance.

So, instead of repeatedly going through all the files to award individual user permissions, do this at the security group level. A set of users in the same security group will have similar file permissions across the board.

  1. Give Security Groups Descriptive Names

If you belong to a large organization, you could end up dealing with tens or hundreds of security groups. Recalling individual permissions, therefore, becomes challenging, forcing you to repeatedly waste time to review several groups’ privileges each time you need to add a new user or restructure the system.

A thoughtful way to work around this would be awarding names that describe each group’s permissions. This gives you a direct mapping of individual privileges, consequently making life much easier.

  1. Define Respective Hierarchy Levels

Only governmental organizations award distinct hierarchy levels to each employee at the recruitment stage. Others mostly operate under assumed levels, consequently complicating the whole process of awarding file permissions.

So make an appointment with the human resource department to define respective hierarchy levels for each user. The resultant structure should subsequently be approved by the company executives before final implementation.

  1. Know How To Establish Effective Permissions

Establishing the organization structure and the corresponding hierarchy level for each employee is one thing. Interpreting this and awarding requisite permissions is a separate process altogether. It could be very confusing, especially at the lower half, where multiple users may be on the same level but with separate job duties.

To effectively establish requisite permissions for each user, compare the hierarchy with respective job duties and descriptions. This should help you determine security clearance levels that should be mirrored by the permissions.

  1. Avoid using The Everyone Group

In most systems, the Everyone group comes with full file control permissions by default. Therefore, to avoid potential multiple security vulnerabilities, avoid using the group. Instead, use an authenticated users group for universal file sharing.

  1. Create a Global Deny Group

Although it may be rare, you may occasionally need to quickly block off a user from all the resources in the system. However, this may not be so simple especially if you have multiple servers and numerous file shares, with many users awarded permissions for randomly scattered files.

With a global deny group, however, you’ll be able to conveniently deny resource access across the board by simply adding a user.

  1. Establish Full Time Permission Policing

With time, group administrators with senior privileges may start modifying shared file permissions and end up granting too many users full control. While this may be done to help others users share files freely, it substantially increases the risk of a potential breach.

So you may need to actively police permissions you’ve awarded by keeping track of them through a spreadsheet.

  1. Have an Emergency Response Strategy

Even with a solid security framework, it’s impossible to guarantee 100% safety of the data. You have to be prepared for a possible infiltration or data loss by developing an effective emergency response strategy.

A good way to do this is maintaining real-time backups, complete with shared file permissions on separate servers.

  1. Give Users Shortcuts To Shared Resources

All things considered, the primary reason why organizations are leveraging EFSS is the allure of improved efficiency. Instead of leaving it off at shared resources, you could make access easier for users by giving them centrally managed shortcuts.

 

Conclusion

Your ability to follow through with these guidelines ultimately depends on your EFSS user friendliness and overall features. Get in touch with us today to take advantage of a well-designed interface and extensive system features.

 

 Author: Davis Porter

10 Things To Consider While Evaluating an Enterprise File Sharing Solution

 

 

Going by recent trends in the EFSS ecosystem, it would be safe to conclude that technologies are progressively evolving and getting more complicated. There are now many vendors with numerous complex offerings, plus a myriad of tools to power different enterprise functionalities. While some have specialized in certain processes, other solutions come with multi-layered features. Only a handful are flexible enough to cater to almost any business model.

And that explains why most organizations are now relying on multiple services from separate vendors. The average enterprise is now leveraging 1,427 different cloud services, and the average employee is typically running 36 distinct services at their workplace. And that includes using separate file sharing solutions simultaneously.

Pretty solid, and some may argue that variety is the way to go. But, while it may have its benefits, one major disadvantage overshadows it all. It essentially beats the whole logic of optimizing enterprise efficiency. 30-45% of the resources dedicated to such solutions is ultimately wasted, and organizations fail to achieve an effectual central system that is adequately aligned with their core operations.

That leaves CIOs with only one option- adopting a single comprehensive enterprise file sharing solution, and subsequently implementing it across their entire organizations. Well, the major downside to this process is the fact that may not be a simple undertaking. Choosing a solution itself could prove to be a nightmare because, as we’ve previously mentioned, the industry is now quite extensive.

A poor Enterprise File Sharing Solution could set you back. A perfectly suitable one, on the other hand, will substantially boost all your operations. And we know what this means in the enterprise world, right?

So, to help you in the selection process, here are 10 factors you should prioritize on when selecting:

 

  1. Delivery Model Flexibility

Functionality flexibility is undoubtedly one of the main, if not the chief reasons why organizations are shifting to EFSS. So it makes no sense going for a service that is cannot be easily upscaled and downscaled

 

Review your organizations projected growth, and extrapolate it to include computer resources. Then subsequently compare this with different services, and focus on solutions that can effortlessly adapt to changing needs in real time.

 

  1. Certifications and Standards

EFSS solutions that adhere to recognized quality and standard guidelines demonstrate a distinct compliance with industry best practices. This is basically one of the most reliable ways to identify the safest bets you can proceed with.

 

For example, if you’re particularly concerned about security, you might want to check out providers accredited with renowned certifications like ISO 27001.

 

  1. Vendor Lock-In, Migration Support and Exit Planning

How is the EFSS suited to your current processes? How easy is it to transfer files and integrate it into your organization?

 

Even when the EFSS offers adequate migration support, you should additionally factor in vendor lock-in and exit planning. Consequently, you’ll be able to eliminate services that could prove to be problematic in case you may prefer to switch to a competitor solution in the future.

 

  1. Performance and Reliability

For a service that the entire organization will run on, you definitely cannot afford to compromise on performance and reliability.

 

To evaluate this, review providers’ SLAs for the last 6-12 months. And since downtime affects even the industry leaders, the subsequent reactionary measures should also count. Proceed only with a service provider who has implemented and adequately documented proven disaster management measures.

 

  1. Automation

Automating mundane and routine tasks substantially minimizes manual intervention, which ultimately boosts system and overall enterprise efficiency.

 

So it’s advisable to not only review EFSS according to functions that can be automated, but also the flexibility of the entire automation process. An ideal service should allow automation adjustments in line with your specific system architecture.

 

  1. Pricing Structure

For an industry that is exponentially growing, you’d expect competition to regulate the  pricing of EFSS. But, surprisingly, many providers are still way off the mark.

 

Compare different services and proceed with one that is reasonably priced, with costs that are only derived from specific features you leverage. And remember, reasonable pricing doesn’t necessarily mean cheap.

 

  1. Security

Compared to previous years, the number of CIOs worried about cloud security is reducing, with 25% as of 2017. But, it still remains the number one concern, despite upcoming revolutionary security features.

 

To guarantee the safety of your organization’s data, choose a service that extends past the standard server encryption and point-to-point SSL encryption.  Military grade double factor encryption, for instance, would be excellently suitable for sensitive data.

 

  1. Server Location

Each country has its own set of legislation on data governance. In the US, for example, the Patriot Act grants the federal government adequate powers to fully access any data if it’s considered relevant to national security.

 

In addition to ensuring that a service provider is transparent enough to disclose server location, choose an EFSS whose servers are governed by laws that wouldn’t be detrimental to your organization.

 

  1. Simplicity

The concept of cloud and enterprise file sharing is fairly complicated. But that shouldn’t be translated to basic service functionalities.

 

Even when it’s holistic with an extensive range of features, a good EFSS service should come with a simple interface that can be figured out within minutes by an average employee. The CIO should also be able to adequately comprehend the whole architecture and integration process. This not only minimizes training costs, but also eases adoption and reduces the chances of problems in future.

 

  1. Data Control

This may seem obvious and pretty straightforward at the beginning, but keenly reviewing SLAs from numerous service providers might reveal some shocking details on data control. Some of them do not explicitly grant exclusive data control rights. Your data, for instance, may be retained within some EFSS servers after deleting and migrating to a competitor service.

 

Therefore, it’s critically important to understand how your data will be managed and corresponding user rights. The most suitable solution, of course, should be one that completely respects data privacy by granting you full data control privileges.

 

Conclusion

Using these evaluation factors, a good place to start would be Filecloud. Feel free to get in touch for any clarifications about our enterprise file-sharing services.

 

 

Author: Davis Porter

10 Ways To Minimize Enterprise File Sharing Risks

 

 

If RightScale’s report on the state of the cloud in 2017 is anything to go by, the year 2016- for the first time in recent years- saw other cloud concerns surpass security. 32% of the IT professionals surveyed were particularly worried about the lack of relevant resources/expertise, compared to 29% who still considered security as the primary problem.

A year later, in 2017, concerns surrounding security went down further, and so did other worries. Now tying with managing cloud costs and lack of resources/expertise, cloud security is still a concern among 25% the professionals.

The significant reduction is evidently due to substantially improved cloud security systems coupled with fewer reports of large-scale data breaches. That notwithstanding, a quarter of IT experts are still worried about security, and that’s a considerably large portion.

According to a 2017 study by IBM and Ponemon on the cost of data breaches, they have every reason to be concerned. The average organizational, per capita data breach costs, are now at an all-time high of $225. Consequently marking a growth rate of 61% in just 10 years, primarily due to the fact that many organizations are exceedingly integrating their core processes into the cloud.

All things considered, you stand to potentially lose quite a lot now if your enterprise file sharing system was infiltrated. Data security is therefore critically important, more than ever before. But, unfortunately, organizations are not doing enough to enforce it, considering the bulk of security incidences are now emanating from enterprise-side vulnerabilities.

While service providers are progressively implementing superior security features, ultimate data safety is not possible without equally effectual measures by users. Here are 10 ways you can minimize enterprise file sharing security risks:

 

  1. Avoid EFSS Without Exclusive Data Control

Most of the other security measures are pretty pointless if you don’t have exclusive control over your organization’s data. Unfortunately, some enterprises are still going for free solutions, which for a long time, have been known to retain some of the data control rights.

 

Going with free solutions may be advisable in some special circumstances like trials. But not for organization-critical processes and sensitive data. You should rather opt for a paid EFSS system that grants you exclusive data control privileges.

 

  1. Go Private

To further enforce data control, you should consider keeping files in-house by choosing private over public EFSS. 72% of organizations are already within this bracket, mostly because of entirely exclusive data privileges.

 

If this proves to be too costly or resource-heavy, you could alternatively keep sensitive data within a much smaller private cloud setup, while leveraging a public EFSS. As a matter of fact, such a hybrid framework is currently the most popular, with 85% of enterprises.

 

  1. Set System Permissions

The more the number of people with unrestricted access to a system, the higher the number of potential vulnerability sources. So keep your system closely knit by managing network activities and system permissions.

 

Users’ system credentials should be managed according to their corresponding job duties and security clearance levels.

 

  1. Manage With Strong Passwords

81% of the hacking-related data breaches in 2017 occurred after attackers capitalized on stolen/weak system passwords. And this should not be surprising, considering “123456” is currently the most common password.

 

A simple password is easy to recall, but it’s also susceptible to hacking. So secure your EFSS system with a complex one, then back it up in an offline server just in case you forget.

 

  1. Manage Mobile Endpoint Devices

While system access through mobile devices can boost employee productivity by up to 9 hours per week, end-point gadgets will always be a major threat to your enterprise file sharing system.

 

Since it wouldn’t be advisable to completely eliminate them, consider implementing mobile device management solutions, and enforcing acceptable use policies.

 

  1. Implement File Security Management Tracking

File management system tracking would excellently supplement your use policies and device management solutions. In addition to controlling overall data usage, you’ll be able to manage additions and exceptions, plus track and report adherence to existing policies.

 

This will not only help you minimize potential vantage points for data leakage, but also identify vulnerabilities before they eventually develop into full-blown attacks.

 

  1. Run Real-Time System Scans

If your firewall is breached, the best case scenario would be reacting to contain the threat as soon as possible. But sadly, it takes enterprises an average of 201 days to identify a breach, and 70 more to contain it.

 

One of the most reliable ways to mitigate this is implementing a full-scale antimalware solution that comprehensively scans the system in real-time. It should subsequently not only prevent attacks but also raise alarm in case one is detected.

 

  1. Train Users Adequately

24% of data breaches are caused by human error. A good example of one is when military contractors mistakenly shared President Obama’s classified security blueprints of Marine One.

 

It’s impossible to completely secure your files against such occurrences. But you can substantially minimize the number of potential incidences by adequately training all the users on system usage, plus corresponding protocols.

 

  1. Implement Comprehensive Encryption Protocols

Even when you comprehensively implement security measures to protect enterprise file sharing, you still have to be prepared for a possible attack. And a great way to do this is making data useless to hackers through encryption.

 

While encryption during transfer is pretty standard by now, some organizations are still yet to implement device and server encryption. This should also be a priority since enterprise data can still be accessed at rest.

 

  1. Use certified EFSS Providers

By now, all EFSS service providers acknowledge that security is still a primary concern among their consumers. Consequently, they all market themselves as impenetrable systems- including ones with comparatively weak security features.

 

Of course, this can be confusing at times, but thanks to industry certification, there’s a way to separate the wheat from the chaff. So focus only on certified service providers that comply with set security standards.

That said, it’s critically important to leverage a proven solution you can trust. Get in touch with us at Filecloud and let us help you set up a super secure enterprise file sharing system.

 

 

Author: Davis Porter

FileCloud Unveils Enterprise Edition, Deploys Secure Collaboration and Storage for Large Organizations

  • Supports increased need for robust cybersecurity protection and compliance measures
  • Purpose built for organizations with 1000+ users
  • Allows businesses to keep their data on infrastructure of choice including public, private and hybrid clouds

FileCloud, a cloud-agnostic Enterprise File Sharing and Sync (EFSS) platform, today announced the release of FileCloud Enterprise Edition. Designed to enable IT administration, management and compliance across enterprise-level systems with over 1000 users, FileCloud Enterprise Edition simplifies data security in an increasingly cloud-based business environment.

“Managing secure collaborations across enterprise environments is critical and keeps many CIOs awake at night,” said Madhan Kanagavel, CEO of FileCloud. “ With just a few clicks, FileCloud’s Enterprise Edition helps IT administrators configure user settings, integrate branch office file servers, manage policies and deploy apps across any large organization. Innovations like these are the reasons why enterprises prefer FileCloud over other consumer-oriented
collaboration solutions.”

FileCloud solves the challenge of losing control over intellectual property/information assets. Unlike other centralized file Software-as-a-Service (SaaS) offerings, FileCloud gives complete control over their data by allowing businesses to keep their data on any infrastructure of their choice including public, private and hybrid clouds. Mobile apps increase productivity and flexibility without needing to worry about data integrity. Shared documents synchronize and can be locked or shared with expiration dates and users can access remotely the same drives that are available in the office.

Enterprise Edition features and services include:

  • Mass Deployment: Deploy and configure a fleet of end user computing devices (desktop, mobile devices, and file servers) in a few click from a centralized management dashboard.
  • Remote Health Monitoring: Includes real-time monitoring of employee devices and actions with a detailed audit trail and delegation capabilities to prevent data loss and detect security threats.
  • Compliance: Enforce policies and regulatory requirements (supports GDPR, HIPPA and FINRA compliance) across employees. Also offers Federated search and eDiscovery capabilities to find sensitive data across the user base.
  • Professional Services: Offers a wide range of technical assistance in implementing large deployments successfully including, deep technical help in designing high availability, branch office integrations, clustering and multi-cloud deployments. Services also can help in configuring Single Sign-On and integrating with other systems like ActiveDirectory.

Penta, a global IT services company with offices in Switzerland, UAE, and Japan, mainly servicing financial institutions has deployed FileCloud to solve a number of business challenges. “One of our biggest challenges as an IT service company is to set up and manage corporate file sharing securely across hundreds of file servers, computers, and mobile phones,” said Shadi Jaber, IT Manager at Penta. “FileCloud has the right features and toolset that makes this easy.”

Many large organizations including Fiserv, NASA, Swiss Federal Institute of Intellectual Property, and the City of San Diego use FileCloud for enterprise file sharing and collaboration. Try for free.

Data Security Questions Every Enterprise Should Ask

Over the past decade, cloud computing has transitioned from being a buzzword to becoming a staple technology for most enterprises, mainly driven by cloud’s accessibility, superior flexibility, and capacity compared to mainstream computing and storage techniques. However, just like mainstream data sharing and storage methods, cloud computing does not lack its fair share of data security issues. Palliating data security risks is essential to creating a level of comfort amongst CIOs, to migrate data applications to the cloud. The decision to transition to the cloud has to be dependent on how sensitive the data is and the security guarantees the cloud vendor provides.

Is your data safe in the hands of a cloud service provider?

In today’s exceedingly mobile world, enterprises are heavily relying on cloud vendors, and allowing remote access to more devices than ever before. The end result is a complex network that requires higher levels of security. The only way organizations can maintain the availability, integrity, and confidentiality of these different applications and datasets is by ensuring their security controls and detection-based tools have been updated to work with the cloud computing model. Whenever data is stored in the cloud, the main point of focus is typically the security of the cloud provider and hosting facility. However, this focus is usually at the expense of how the data itself is handled. This begs the question, do you trust the cloud vendor’s technology? Do you trust their employees? Do you trust their safeguards? Are you completely sure that if their back was against the wall they would not sell or compromise any of your data?

The fact of the matter remains that, once you move your data to a public cloud platform, you can no longer exercise your own security controls. Outsourcing also introduces a costly threat to intellectual property in the form of digital information like engineering drawings, source code, etc. An organization has to give its cloud service provider access to important IP assets, which are vital to the organization’s core business. Exposing invaluable information to third parties presents an epoch-making security risk. In most cases, migrating to the cloud means you have no option but to trust the vigilance, knowledge, and judgment of your chosen vendor.

As cloud-based solutions like Dropbox and Google Drive become more popular within the business setting; enterprises have to come to grips with the fact that issues like loss of control over confidential data are a looming security threat. Despite the fact that cloud vendors implement several security measures to isolate tenant environments, the organization still loses some level of IT control, which equates to risk as sensitive data and applications no longer reside within a private, physically isolated data-center. Is the business value worth the risk?

Why is Metadata Security Important?

In a nutshell, metadata is data about data. The bigger question is whether or not metadata is personally identifiable. If enough of it is linked together, a detailed profile of an individual or organization can be created; enough to personally identify them. Most IT security experts agree that metadata typically contains sensitive information, hidden from obvious view, but easily extractable. Metadata poses a great data leak risk since employees are not even aware of its existence. Whenever a request is made to store or retrieve data from a cloud storage server, the request and subsequent response contain metadata about both the request and the data itself. Since the organization has little to no control of this metadata, there is no way to guarantee its security.

What Happens in the event of a data breach?

As cloud adoption rates increase, cloud providers are increasingly becoming attractive targets for cybercriminals because of the huge amounts of data stored on their servers. Access to unencrypted metadata is enough to count as a full-fledged breach. The severity of a data breach is dependent on the sensitivity of the data being exposed. Breaches that involve trade secrets, health information and intellectual property are usually the most direful. It is worth noting that cloud vendors are not subject to similar data breach disclosure laws as federal agencies, banks, and other entities. So if a breach does occur, it may never be publicized or associated with the vendor.

Despite numerous efforts from public cloud providers to implement stringent security measures to curb the risk of data breaches; the burden of responsibility for data security ultimately falls on the organization and a breach will have critical financial and legal consequences.

Who Controls Your Data?

Ensuring that the data and applications residing in the cloud are kept safe is becoming more crucial as high-value data, mission-critical applications and intellectual property is transferred to the cloud. Despite the fact that cloud computing, in general, can be perceived as less secure, the fear of cloud security is situational. The real conundrum shouldn’t be whether or not to migrate to the cloud, but which cloud to migrate to. From a security standpoint, most cloud service providers are not ready. Using unsecured cloud vendors can expose sensitive cooperate data without your organization even realizing it. Enterprises commercially and legally have to maintain control over their data while customers and employees need to be able to freely collaborate, share and sync files they require. The solution is simple! Private Cloud.

Private Cloud Offers a Better Alternative

A private cloud computing model facilitates control and collaboration while protecting confidential data from unauthorized access. IT stakeholders need to have a detailed understanding of where and how data is being stored and transferred. With a self-hosted cloud deployment for critical data, you have maximum control, integration, and configuration of all the layers of security.

  • Flexible Infrastructure

A cloud deployment is considered private when it is hosted on the organization’s servers. However, that does not necessarily mean the servers are hosted on-premises. By going the self-hosted route, companies are able to choose whether they want to house their files on-premises or in a remote data center. Despite the fact that on-premises infrastructure has the added advantage of more control and ownership, you will also be responsible for capacity planning. Given the costs associated with operating a data center and the redundancy required to operate at 100 percent network and power uptime; organizations can opt to leverage a hosted private cloud in the form of Infrastructure as a Service (IaaS) or Platform as a Service (PaaS).

This model allows the organization to have a scalable, isolated computing environment that has been custom-designed to meet its specific workload requirements, with the jurisdiction of their choice. A good example is AWS’ VPC which provides cloud hosting capabilities with enterprise-grade IT infrastructure through a virtualized network of interconnected virtual servers. GovCloud also allows US government agencies to host private clouds in secure regions operated by U.S citizens, and is only accessible to vetted U.S entities.

In a nutshell, a private cloud allows organizations to develop a flexible infrastructure to deliver applications while retaining control and managing the risk of the services delivered to business partners, users, and customers.

  • Maximum Control

A private cloud deployment gives you control over security, privacy, and compliance. You can manage all your applications, IT services, and the infrastructure in one place using powerful tools like application and performance monitoring, VM templates, and automated self-service deployment. Since you have the control from the ground up, you will not be forced to adjust your security processes to meet those of the cloud; instead, you will bend the cloud to your will. A self-hosted cloud lets you leverage your current security infrastructure and procedures and easily integrates with existing tools. It simply works within your set framework; and when your data requirements scale, you will have the ability to scale with them.

The physical location of the data-center plays a crucial role in cloud adoption. A private cloud creates the opportunity to choose the region data will be stored. By having control over your selection of hosting provider/ data center, you know precisely where your servers are located, and under which nation’s data laws they are governed. Organizations may be obliged or simply prefer, to store data in a jurisdiction or country that is not offered by a public cloud provider.

In Closing

A private cloud expands visibility into workloads and cloud operations. Thus enabling IT administrators to design data storage, hardware, and networks in a way that guarantees the security of data and associated metadata. When IT is fully aware of where the data is located and who has access to it at any given moment in time; the risks of compliance violations, data security vulnerabilities, and data leakage are thwarted.

Author: Gabriel Lando

Announcing FileCloud 15 – Team Folders, Enterprise Search and Facebook Style Notifications to Make Organization Wide File Sharing Easy

The function of good software is to make the complex appear simple – Grady Booch, Creator of Unified Modeling Language (UML)

We are super thrilled to announce the launch of FileCloud 15.  It is a monumental release with big bang feature sets. With FileCloud 15, we have completely reimagined every aspect of the document sharing process. We have fine-tuned the user experience and functional architecture in every step of our design process to make organization wide file sharing simple, intuitive, and secure. Contrary to public perception that a system can’t have both a strong data security and an uncomplicated design, FileCloud 15 has introduced team folders, which offer simple file sharing yet with ironclad security.

Our Team Folder implementation is the best in the industry for organization wide file sharing. You don’t need to take our word for it. Please register for a free trial and check it out for yourself.

FileCloud 15 also boasts a powerful enterprise search, Facebook style notifications, completely redesigned user dashboard, @mention support, new outlook and sync app, mass deployment support, share analytics, and php7 support.

Here is the summary of major capabilities offered by FileCloud 15.

Team Folders Support – Organization wide file sharing made easy

A collaborative team environment and powerful knowledge sharing tools are important for building effective teams in an organization. FileCloud’s Team Folders make knowledge sharing seamless by offering collaborative folders that organizations can use to share and manage documents among team members easily.

Team Folders can be shared with everyone in the organization or with a sub set of people grouped by function or any other criteria (Ex: Marketing, Finance, Head office). Team Folders can automatically sync content across team members’ devices. Further, Team folders can be shared beyond organization boundaries and be extended to vendors, partners, and customers.

Many of our competitors in the EFSS market use waterfall permissions model in their Team Folder Implementation i.e. Team members have the same permission level in sub folders as they do in the top level folders. This kind of rigid sharing model doesn’t fit the majority of enterprise’s information sharing needs and increases data leak risks. On the contrary, FileCloud’s Team Folder system offers a granular sharing model for folders and subfolders i.e. Administrators can limit team member access to any sub folder independent of top level folder permissions.

The objectives of FileCloud’s Team Folders system:

Centralized Content Management: Instead of creating multiple individual file shares among users, Team Folders facilitate organizing files and folders in a centralized place.
Easy Provisioning of Users, Files, and Folders: Provision new users quickly with access to specific files and folders through team folders. Similarly, grant immediate access to new files for all relevant users by uploading the file to the right team folder.
Granular Control of Folders: Team Folders and their sub folders can be given granular permissions for users with Read, Write, Share and Sync access.
Manage Selective Sync: Admins can select specific team folders and enable or disable sync permissions on an easy to use user interface.
You can read more about How to use FileCloud Team folders for organization wide file sharing in our admin documentation.

Enterprise File Search – A single text box to rule them all

The ultimate goal of any enterprise information management system is to make it easy for users to find their content. We have delivered that goal with our new powerful enterprise file search. When enabled, FileCloud Search ingests and indexes every piece of content irrespective of where the content is stored (Managed Storage, Network Shares, and S3). With FileCloud 15, users don’t need to navigate the directories to find the content. They can just simply type what they are looking for and FileCloud Search will find the relevant documents in a matter of seconds.

FileCloud Enterprise Search is the big first step in our journey to build the industry’s most powerful, intelligent, context aware enterprise search system that will make content discovery dead simple for end users. Please see FileCloud Enterprise Search in action below,

Brand new user dashboard  – Access relevant files at your fingertips

FileCloud 15’s completely redesigned user dashboard makes sure all the relevant files are just one single click away for users. Using the new dashboard, users can create shortcuts for frequently used folders. The dashboard also presents the recently accessed files and the recent activities for quick access.

 

Facebook style notifications on user and system activity

Facebook style notification is a powerful UI design pattern to present contextual information. This UI design pattern helps end users to grasp the changes happening in their network quickly. With FileCloud 15, we have implemented a similar notifications design that allows users to quickly glance and grasp what is happening in their files, shares, and the FileCloud system.

Share Analytics –  Share Activity, Number of activities and Last Access time

FileCloud 15 brings powerful share analytics and insights for end users. Now users can see their popular files, last access time, and number of views and downloads at one place. This new functionality is great for sales organizations, startups, marketing, and legal departments. Further, share activity gives detailed information on Who did What action, When, How, and from Where (location).

Brand New Outlook Add-in

FileCloud Outlook Add-in is widely used by our customers. With FileCloud 15, we have further improved the capabilities of FileCloud Outlook Add-in. Now the Add-in offers the same advanced sharing options as our web interface. Users will now be able to decide between public and private shares, set password, share name, share permissions, expiry date, and much more. For more details, please check the FileCloud Add-in information presented in our admin documentation.

 

Web Browser upload progress bar improvements

FileCloud 15 brings a new browser upload widget that shows the upload progress and remaining files in queue. Ability to look at progress is great when uploading multiple files or a large file. See below new upload widget in action.

Speedup Network Folders  with NTFS permissions – Turbocharge your access speed

One of the unique selling propositions (USP) of FileCloud is that it enables access to existing file shares while enforcing the NTFS permissions in place. Many of our enterprise customers utilize this functionality and share files directly from their existing file shares. With FileCloud 15, we are speeding up the access performance 3-5 times especially in large file shares with thousands to 100K files. Please go to Settings –>Network Shares and “Enable Caching for NTFS Permissions”. Memcache is a prerequisite to enable this functionality.

Updated Sync app with new management UI

With FileCloud 15, we have refreshed the UI of the FileCloud sync client, and made several product improvements and bug fixes. The new sync client enables users to navigate different configuration options, activity logs, and settings screen easily.

Mass Deployment Default Configuration Support for Sync, Drive and Outlook Add on

Mass deployment support is one of the popular requests from our bigger customers. FileCloud 15’s mass deployment support helps enterprises in rolling out FileCloud desktop clients across enterprises easily. With this current release, Administrators can set default configuration values (Server URL, user profile, http proxy info, and etc.) for FileCloud desktop clients across the enterprise.

For more details on mass deployment support and default config values please refer to our administrator guide.

Seeding functionality for quick loading of files into Managed Storage from Local and S3

In recent times, many customers are moving from Box and Egnyte to FileCloud. To make these file migration tasks easier, FileCloud 15 now supports importing files (Pre-seeding) to user accounts and team folders. This will also help onboarding users easily in large enterprise deployments where user home folders and file servers are used for file sharing. To find more information on how to pre-seed files please refer to our admin documentation here.

Support for PHP 7.0, Ubuntu 16.04, New MongoDB Driver

FileCloud 15 brings support for php 7.0 on Ubuntu 16.04 to deliver better performance and increased security. It also requires a new MongoDB driver to function.

NOTE 1: UPGRADING FROM AN OLDER FILECLOUD VERSION– Unlike our previous updates, FileCloud 15.0 is not available through the Admin portal and upgrading requires some additional steps. Please follow the upgrade instructions provided in this link.

Integrated FileCloud Windows Installer with Content Search, Document Preview and Helper

We are also releasing a new windows installer for FileCloud Server. The installer now includes installation of content search, document preview and FileCloud NTFS helper modules.  With the new installer, it will take less than 10 minutes to completely install FileCloud server on Windows servers.

Apart from the major features listed above, FileCloud 15 offers tons of significant product improvements, bug fixes, and enhancements. Please find the complete FileCloud 15 release notes here.

FileCloud 15 is a big step in our vision to build the world’s most powerful, unified file services platform that organizes enterprise data, enhances collaboration and productivity while providing iron clad data protection. We are happy with what we have delivered. We hope you will like it too!

 

Dropbox Business price increase in 2017 – Why FileCloud Online can be a powerful alternative?

As IPO pressures mount, Dropbox has resorted to the familiar tactics to shore up their revenue – increase the price substantially and pray customers will not notice. In some scenarios, the price has gone up by 75% (fr0m 12.50$ to 20$). The long time customers who put their faith in Dropbox are getting the short end of the stick.  You can find disappointed Dropbox customers are venting over the new price increase  in dropbox forums and in spiceworks. It seems like Dropbox has also dramatically rearranged their feature set and removed features from their base plans.

Here is the summary of Dropbox Business pricing plans (Based on Annual Pricing)

Standard – $12.50/per user/ per month

  • 2 terabytes total storage cap.
  • 120-day history cap.
  • NON-HIPAA compliant servers.
  • Team folder.
  • Admin console (many features of current base plan are removed).

Advanced – $20/per user/per month

  • Unlimited storage.
  • Advanced admin controls.
  • SSO.
  • HIPAA compliant.
  • Tiered-admins (still no separate one for billing only).
  • Device approvals.
  • Audit logs.
  • Business hours only support.

Enterprise – $56/per user/per month (Oops!)

  • Unlimited storage.
  • Basic EMM support.
  • Domain insights and account control (turn off personal accounts at work).
  • 24/7 support,
  • Account manager, developer + training help.

Typically companies tend to grandfather pricing for their long term customers and don’t take the features out that are available already to a new plan. It seems like Dropbox has dropped the ball on this one. Fortunately the Enterprise File Sharing and Sync market is a very competitive one and customer has many choices to choose from.  There is no need for IT managers and CIOs to accept dropbox’s skyrocketing pricing and deal with the uncertainty.

FileCloud Online is one such powerful alternative for Dropbox Business. FileCloud is currently used by 1000+ enterprises across 90 countries from SMBs to Fortune 500 companies . It powers organizations like NASA, US Army ERDC, Sanderson Farms, Stewart Title, D.R.Horton and many others. FileCloud is IT industry’s most versatile  enterprise file sharing and sync platform and in many metrics it is the fastest growing player in the market. Recently, FileCloud is Honored as a 2017 Coolest Cloud Software Vendor by CRN.

For 100 users, FileCloud Online can save you  14000$ over Dropbox Business.  FileCloud Online comes with free, unlimited client accounts. If your company has small employee base and work with lot of external partners and customers. This features itself can save a ton of money for your organization. In addition, FileCloud comes with a lot of enterprise features like branding, endpoint backup, workflows and admin reports which are not offered by Dropbox business. The following table offers the features and pricing comparison between FileCloud Online and Dropbox Business.

Dropbox Business vs FileCloud Online – Features and Pricing Comparison

Features FileCloud Online  Dropbox Business 
Enterprise File Sync and Share
Single Sign-On Integration (SSO)
Audit Logs
Role Based Administration
Endpoint Backup
Takeout guarantee – export files anytime
Branding – domain, login page, emails, logos, ToS
Free unlimited vendors and partner accounts
Automated Workflows and Admin Reports
Advanced training for end users and admins Upgrade
Mobile Device Management Upgrade
Pricing for 100 users/ year $9600 $24000

If you are  currently looking for a powerful dropbox business alternative, please try FileCloud Online. It will take less than 10 minutes of your time and you may end up saving thousands of dollars. If you have any questions or need technical assistance please feel free to contact us at support@codelathe.com.

 

Types of Controls to Manage Your Business Data in an EFSS

EFSS Data Controls

In 2015, there were 38% more security incidents than 2014, and an average cost per stolen record – containing sensitive and confidential data – of $154 (the healthcare industry payed the most, at $363 per record). Worse still, even when 52% of IT professionals felt that a successful cyber-attack against their network would take place in the year, only 29% of SMBs (fewer than 2014), used standard tools like patching and configuration to prevent these attacks.

The consequences of poor data security and data breaches in the cloud cannot be overstated. A look at these statistics shows the effect of data insecurity and data breaches in the cloud are a road that no business wants to take. All the aforementioned statistics show the lack of control of data in the cloud, so we will first look at who controls data in the cloud, followed by how to manage business data in an EFSS.

Who controls data in the Cloud?

It is clear that your IT department does not know who controls data in the cloud, as revealed by participants of a Perspecsys survey on data control in the cloud. According to the results, 48% of IT professionals don’t trust that cloud providers will protect their data, and 57% are not certain of where sensitive data is stored in the cloud.

This issue is also closely tied to data ownership. Once data ownership changes, then we expect a change in the level of control users have on their data . To quote Dan Gray on the concept of data ownership: “Ownership is dependent on the nature of data, and where it was created”. Data created by a user before uploading to the cloud may be subjected to copyright laws, while data created in the cloud changes the whole concept of data ownership. It is no wonder that there is confusion on this matter.

Despite challenges such as half or no control of data stored in the cloud, there exist techniques that we can use to control business data in an EFSS, consequently preventing unauthorized access and security breaches.

Types of data control for business data in an EFSS

 

Input validation controls

Validation control is important because it ensures that all data fed into a system or application is accurate, complete and reasonable. One essential area of validation control is supplier assessment. For example, is a supplier well equipped to meet a client’s expectations? With regards to controls to ascertain data integrity, security and compliance with industry regulations as well as client policies. This activity is best carried out using an offsite audit in the form of questionnaires. By determining the supplier system life-cycle processes, your team can decide if the EFSS vendor is worthy of further consideration or not. Additionally, the questionnaire serves as a basis to decide whether an on-site assessment will be carried out, based on the risk assessment. If carried out, the scope of an onsite audit will be dependent on the type of service an EFSS vendor provides.

Service level agreements should also be assessed and analyzed to define expectations of both an EFSS vendor and user. Usually, this is also done to ensure that the service rendered is in line with industry regulations. Additionally, we must ensure that an EFSS provider includes the following in the service level agreement.

  • Security
  • Backup and recovery
  • Incident management
  • Incident reporting
  • Testing
  • Quality of service rendered
  • Qualified personnel
  • Alert and escalation procedures
  • Clear documentation on data ownership as well as vendor and client responsibilities
  • Expectations with regards to performance monitoring

Processing controls

Processing control ensures that data is completely and accurately processed in an application, via regular monitoring of models and looking at system results when processing. If this is not done, small changes in equipment caused by age or damage will result in a bad model, which will be reflected as wrong control moves for the process.

Include backup and recovery controls

Processing control ensures that data is completely and accurately processed in an application, via regular monitoring of models as well as looking at system results when processing. If this is not done, small changes in equipment caused by age or damage will result in a bad model, which will be reflected as wrong control moves for the process.

Identity and access management

Usually, Identity and Access Management (IAM) allows cloud administrators to authorize personnel who can take action on specific resources, giving cloud users control and visibility required to manage cloud resources. Although this seems simple, advancement in technology has complicated the process of authentication, authorization and access control in the cloud.

In previous years, IAM was easier to handle because employees had to log into one desktop computer in the office to access any information in the internet. Currently, Microsoft’s Active Directory and Lightweight Directory Access Protocol (LDAP) are insufficient IAM tools. User access and control has to be extended from desktop computers to personal mobile devices, posing a challenge to IT. For example, as stated in a Forrester Research report, personal tablets and mobile devices are being used in 65% of organizations, as 30% of employees provision their own software on these devices for use at work, without IT’s approval. It is no wonder that Gartner predicted in 2013 that Identity and Access Management in the cloud would be one of the sought-after services in cloud-based models, in just 2 years.

With this understanding, it is important to create effective IAM without losing control of internally provisioned resources and applications. By using threat-aware identity and access management capabilities, it should be clear who is doing what, what their role is and what they are trying to access.  Additionally, user identities, including external identities, must be tied to back-end directories, and sign-on capabilities must be single because multiple passwords tend to lead to insecure password management practices.

Conclusion

Simple assurance by an EFSS vendor that you have control of business data in the cloud is not enough. There are certain techniques that should be employed to make sure that you have a significant level of data control. As discussed, ensure that you have an effective identity and access management system, have processing and validation controls as well as business data backup and recovery options in place. Other important controls that we have not discussed include file controls, data destruction controls and change management controls.

Author:Davis Porter

Image Courtesy: jannoon028,freedigitalphotos.net

FileCloud v13.0 Launch: “It Takes a Village”

It takes a village to raise a child.

This famous African proverb also applies to software development. To develop great software, organizations need a team of talented developers who work with passion. The development team must work alongside UX designers with a great eye for detail, an outstanding quality assurance team, a product management team that has a fanatical focus on delivering real value, and, most of all, a loyal customer base with whom the software team can collaborate. Innovation and cutting edge products are not developed in a vacuum. It takes constant iteration, refinement, and on-going discussion with customers that provide valuable insight.

With FileCloud v13.0, customers are able to see how the various iterations of our solution have come together. We have worked with many of the largest (and smallest) organizations in the world and listened to their changing needs. The collaboration makes us especially proud of our latest release.

 

FileCloud v13 Launch

We want to extend a heartfelt thank you to our team for their incredible hard work, and to our outstanding customers for their feedback and support.

Industry’s First Robust Ransomware Protection

Ransomware is probably the number one security threat faced by enterprises today. It is a specific type of malware that encrypts valuable digital files and removes originals forcing the enterprise to pay to get the key. The victims of ransomware range from hospitals, schools, state and local governments, police departments and small to large businesses. According to computer security firm Malwarebytes, nearly 40 percent of all businesses experienced a malware attack since 2015.

Public SaaS products such as Dropbox, Office 365, and Google Drive are particularly vulnerable. Public SaaS also provide an attack vectors into end user computers by spoofing email messages and deliver the malware payload.

With FileCloud 13, we are launching the industry’s first file content heuristic engine for EFSS to find and protect your enterprise files from ransomware attacks. It is a remarkable engineering feat, and we are very proud of the real value it can bring to your enterprise data protection. More than ever, your files need it.

FileCloud v13 is the only EFSS solution in the marketplace that has built-in powerful ransomware protection. With the combination of file content heuristic engine, unlimited file versioning and custom email templates/ UI branding we employ a multi-thronged approach to combat the ransomware threat.

You can read more about FileCloud content heuristic engine, and how it protects your files from ransomware here.

Powerful Workflow Automation

With FileCloud v13, we are launching workflow automation on top of FileCloud platform. Using FileCloud workflow customers can automate critical business processes in their organization, and can make better information-driven decisions to ensure maximum productivity. Customers can setup simple conditions, which are triggered by operations in FileCloud v13 such as when a file is created, or when a file is updated. A variety of actions (i.e. send email, block a device, and archive a file) can be set to run when the condition is triggered.

FileCloud v13 workflow automation

The workflow follows a simple IFTTT (“IF CONDITION” – “THEN ACTION”) model. Some of the possible workflows are,

  1. Archive (Move/Copy) files if they are not accessed for x number of dates.
  2. Send an alert to admin if our content heuristic engine identifies a file MIME mismatch.
  3. Disable a user if he has not accessed FileCloud for x number of dates.
  4. Notify users if a file is updated or a comment is added to file or folder.

You can read about FileCloud’s Workflow automation capabilities here.

Granular Folder Permissions

Setting up a folder share with appropriate security permissions for a group of users is one of the most challenging tasks in managing enterprise information. Many enterprise file share and sync solutions do not address this important requirement adequately.

granular folder permissions

With FileCloud v13, we bring versatile, granular folder permissions to mimic any kind of file share, and permissions hierarchy. Different organizations have different security needs when it comes to securing group folder shares. FileCloud granular folder permission model allows organizations to manage access permissions at any folder and subfolder level. Administrators can ensure appropriate level of access for every user, by assigning individual folder level permissions. FileCloud’s granular folder permission model mirrors the NTFS file permissions model used by many enterprise admins. You can read more about FileCloud granular folder permissions here.

Versatile File Storage Connectors

Our goal is to make FileCloud an one stop destination to manage (connect, aggregate/index, protect and present) all your unstructured data independent of where it is stored (network shares, cloud storage services like S3, Google Drive, SharePoint or other Enterprise Content Management platforms). With FileCloud v13, we are launching a file storage connector for Amazon s3. We will be adding more File storage connectors for SharePoint and other ECM products in the future FileCloud releases. You can read about amazon s3 based network folders here.

File Connector

Desktop SSO

We have provided SAML based single sign-on for web browser access in FileCloud but many large enterprises, research organizations and federal institutions that deal with highly sensitive data expect single sign on for desktop apps as well (FileCloud Sync and FileCloud Drive). With FileCloud v13, we are supporting SAML based Desktop SSO using a device authentication code. You can read more about FileCloud Desktop SSO support here.

filecloud desktop SSO

 

File Browser App

File Browser App

 

With FileCloud v13, we are launching a native File Browser as part of our sync client to remotely browse the cloud space. It supports the following operations: upload folders and files, drag/drop files, create folders, quick edit, locking/unlocking and other functions that you typically see in a remote WebDAV or FTP client.  File Browser app doesn’t store files offline and take any storage space on the local computer. It solves a critical pain point for many customers who want to sync only a subset of files locally but still want the ability to quickly access all the files on the server when needed. For more info, please check here.

Other Major Features

FileCloud v13 also comes with the following major features:

  • Password protected shares – Now you can protect your public shares with passwords
  • Show thumbnail previews for Word, Powerpoint, Excel and PDF documents
  • New chrome browser extensions – Save to FileCloud and FileCloud for Gmail.

We have also made performance improvements to our sync, drive clients, numerous UI improvements, bug fixes and security updates. You can find the complete release notes here.

FileCloud Future Roadmap

Every great software needs a worthy problem

We live in an Information age where the real competitive advantage of a company centers on the how efficient it can manage the information it owns. Whether you are a small business with 10 employees or an enterprise with thousands of employees, the growth in the amount of unstructured data is staggering.  IDC and EMC project that data will grow to 40 zettabytes by 2020, resulting in a 50-fold growth from the beginning of 2010. According to Computerworld, unstructured information will account for more than 70-to-80 percent of all data in organizations.  It doesn’t matter whether you are an information company or a manufacturing company, success will depend, in large part, on how well the organizations protect, and share information.

growth in unstructured data

That’s the problem we want solve better than everyone else.

What to expect from us in future?

We are just getting started! So far with FileCloud we have built a basic foundation to sync, share, and backup your enterprise files. The reality is that the EFSS market is a much smaller subset of the total enterprise information management market space. Ultimately, our goal is to ensure that the right person has access to the right content at the right time from the right place.

To achieve our ultimate goal, we will be focusing on the following items in our roadmap:

  1. Storage connectors to ECM (SharePoint and others) and other cloud storage products (Dropbox, Google Drive). Increasingly enterprise content is stored on a variety of services and applications. We want to provide one simple interface for accessing all of your data while making it easy for system admins to manage and protect the data stored in these different services.
  2. File/Share analytics: Users are creating and storing unstructured content more than ever, with data volumes increasing by nearly 40% per year. To protect and manage this data first one needs to understand what data they have (Data Inventory & Data Awareness). We will be offering detailed file and share analytics across all your storage targets.
  3. Data intelligence: We will be looking at machine learning to classify (tagging) documents and improve our search capabilities across all your storage targets. We want to unearth and surface relevant content when and where you need it.
  4. Improve UX: We will be improving the end user experience across all our endpoint apps (especially mobile) and the web.

Collaboration and conversation around documents: We will bring web editing/collaboration of documents using Microsoft Office Online and Libre Office cloud suite. Further, we will be augmenting our comments interface to support conversation around documents. This will make the document review process so efficient that “to and from” email will be obsolete.

About FileCloud

FileCloud continues to grow and we are working to hire the best for our engineering, tech support and QA teams. Our organization guarantees that you will always get the support you need from us to be successful in your business.

Currently, FileCloud is used by Fortune 500 companies; Global 2000 firms; city, state and federal institutions; world-class universities; and renowned science and research organizations such as NASA. FileCloud is deployed in over 90 countries. We also work with more than 100 VARs and managed service providers across the world.