Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
security [2019_06_18 15:39] – [11 Data Security] jim | security [2019_06_18 16:16] – [2 Encrypted Data in Motion] jim | ||
---|---|---|---|
Line 2: | Line 2: | ||
====== Security ====== | ====== Security ====== | ||
- | SME provides a SaaS and hybrid on-premise Cloud solution | + | SME provides a SaaS and hybrid on-premises multi-cloud content management |
===== 1 Data Center ===== | ===== 1 Data Center ===== | ||
Line 20: | Line 19: | ||
Administrators should also connect to storage providers using HTTPS. For storage providers with a fixed endpoint including AWS S3, Azure, Google Cloud Storage the File Fabric always uses HTTPS. | Administrators should also connect to storage providers using HTTPS. For storage providers with a fixed endpoint including AWS S3, Azure, Google Cloud Storage the File Fabric always uses HTTPS. | ||
+ | [[https:// | ||
===== 3 Encryption Algorithm ===== | ===== 3 Encryption Algorithm ===== | ||
- | Storage Made Easy can be used to encrypt data transmitted to any cloud that is mapped to a user personal, Cloud File Server, or Appliance account. | + | The Enterprise File Fabric |
* an initial Round Key addition | * an initial Round Key addition | ||
* Nr-1Rounds | * Nr-1Rounds | ||
Line 29: | Line 29: | ||
The chaining variable goes into the input and the message block goes into the âCipher Key. The likelihood of recovering a file that has been encrypted using our encryption is fairly remote. The most efficient key-recovery attack for Rijndael is exhaustive key search. The expected effort of exhaustive key search depends on the length of the Cipher Key and for a 16-byte key, 2127 applications of Rijndael; | The chaining variable goes into the input and the message block goes into the âCipher Key. The likelihood of recovering a file that has been encrypted using our encryption is fairly remote. The most efficient key-recovery attack for Rijndael is exhaustive key search. The expected effort of exhaustive key search depends on the length of the Cipher Key and for a 16-byte key, 2127 applications of Rijndael; | ||
- | Any AES-256 decryption tool that supports the Rijndael cipher with 16 byte blocksizes can be used to un-encrypt files. We also provide free desktop decryption tools for [[https:// | + | Any AES-256 decryption tool that supports the Rijndael cipher with 16 byte blocksizes can be used to un-encrypt files. We also provide free desktop decryption tools for [[https:// |
See also [[https:// | See also [[https:// | ||
- | |||
===== 4 Authentication Security ===== | ===== 4 Authentication Security ===== | ||
Line 63: | Line 62: | ||
{{:/ | {{:/ | ||
- | SME supports Access Control Permissions at a Role, User, or folder level for shared folders. The Permissions can be taken from Active Directory if single sign-on is being used. | + | The File Fabric |