Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
security [2019_04_10 22:13] – [5 Document Security] added DLP steven | security [2019_06_18 16:12] – [3 Encryption Algorithm] jim | ||
---|---|---|---|
Line 2: | Line 2: | ||
====== Security ====== | ====== Security ====== | ||
- | SME provides a SaaS and hybrid on-premise Cloud solution | + | SME provides a SaaS and hybrid on-premises multi-cloud content management |
===== 1 Data Center ===== | ===== 1 Data Center ===== | ||
Line 22: | Line 21: | ||
===== 3 Encryption Algorithm ===== | ===== 3 Encryption Algorithm ===== | ||
- | Storage Made Easy can be used to encrypt data transmitted to any cloud that is mapped to a user personal, Cloud File Server, or Appliance account. | + | The Enterprise File Fabric |
* an initial Round Key addition | * an initial Round Key addition | ||
* Nr-1Rounds | * Nr-1Rounds | ||
Line 29: | Line 28: | ||
The chaining variable goes into the input and the message block goes into the âCipher Key. The likelihood of recovering a file that has been encrypted using our encryption is fairly remote. The most efficient key-recovery attack for Rijndael is exhaustive key search. The expected effort of exhaustive key search depends on the length of the Cipher Key and for a 16-byte key, 2127 applications of Rijndael; | The chaining variable goes into the input and the message block goes into the âCipher Key. The likelihood of recovering a file that has been encrypted using our encryption is fairly remote. The most efficient key-recovery attack for Rijndael is exhaustive key search. The expected effort of exhaustive key search depends on the length of the Cipher Key and for a 16-byte key, 2127 applications of Rijndael; | ||
- | Any AES-256 decryption tool that supports the Rijndael cipher with 16 byte blocksizes can be used to un-encrypt files. We also provide free desktop decryption tools for [[https:// | + | Any AES-256 decryption tool that supports the Rijndael cipher with 16 byte blocksizes can be used to un-encrypt files. We also provide free desktop decryption tools for [[https:// |
See also [[https:// | See also [[https:// | ||
- | |||
===== 4 Authentication Security ===== | ===== 4 Authentication Security ===== | ||
Line 54: | Line 52: | ||
* Private links can be created for documents and these can be combined with passwords to secure the document. | * Private links can be created for documents and these can be combined with passwords to secure the document. | ||
* Links can be set to be time expired and/or combined with private links and password for further additional document security. | * Links can be set to be time expired and/or combined with private links and password for further additional document security. | ||
- | * [[watermarking|Watermarks]] unique to each file preview or shared file download can be added to trace back how files were leaked. | + | * [[watermarking|Watermarks]] unique to each file preview or shared file download can be added to enable tracing |
+ | * [[contentdiscovery|Content Discovery]] monitors documents for sensitive data which can generate an email, quarantine, or initiate a workflow. | ||
===== 6 Access Control Security ===== | ===== 6 Access Control Security ===== | ||
Line 105: | Line 104: | ||
* **Disaster Recovery** - The [[foreverfile|ForeverFile™ archive]] is a backup, disaster recovery and ransomware protection feature that continuously protects data, wherever it is stored. For each primary storage provider that is being protected, a separate secondary or Backup provider is configured. For maximum availability the backup cloud should be located in another data center. It could also be with different cloud vendor, storage technology or tier. | * **Disaster Recovery** - The [[foreverfile|ForeverFile™ archive]] is a backup, disaster recovery and ransomware protection feature that continuously protects data, wherever it is stored. For each primary storage provider that is being protected, a separate secondary or Backup provider is configured. For maximum availability the backup cloud should be located in another data center. It could also be with different cloud vendor, storage technology or tier. | ||
+ | ===== 12 Cyber Essentials ===== | ||
+ | |||
+ | Storage Made Easy is [[https:// | ||
+ | |||
+ | It was developed in collaboration with industry partners, including the Information Security Forum (ISF), the Information Assurance for Small and Medium Enterprises Consortium (IASME) and the British Standards Institution (BSI), and is endorsed by the UK Government. | ||
+ | |||
+ | ===== 13 London Office of Regional CyberSecurity Advancement (LORCA) ===== | ||
+ | |||
+ | Storage Made Easy [[https:// | ||
+ | |||
+ | LORCA is one of two cyber innovation centres as part of the National Cyber Security Strategy objective to grow the UK’s cybersecurity sector and make sure the UK is the safest place to live and do business online. | ||
+ | |||
+ | Security by Design was selected as one of the most pressing challenges. The office is now on the lookout for cybersecurity solutions that make it significantly cheaper or easier for products to be made secure. | ||
+ | This includes ensuring products are secure as standard, rather than requiring an add-on solution, and at code level, as this remains a challenge across the sector. |