Get more information, see product demos, and more.
Go Beyond Encryption
for Data Beyond the Enterprise.
The Challenge: Securing Data
across the Dynamic Enterprise
Challenge 2014: Ensuring enterprise data security and accessibility
Enterprise data must be both secure and accessible—each are tough challenges. Today's enterprise must ensure that their information sharing environments both protect data and allow collaborative access to a rapidly evolving range of users, devices, and services. Specifically, secure, reliable data sharing must perform for a global user base, across disparate computing environments with different security levels, support mobile and BYO (bring your own) devices, and integrate cloud and local services. Current coverage of massively damaging security breaches at Target, Snapchat, and Starbucks prove that data encryption is inadequate to these challenges.
Encryption and other “Me-too” security measures are not a "silver bullet"
Data encryption is essential to securing enterprise information, but it does not provide a comprehensive solution. Recent reports that the NSA can not only break industry standard encryption algorithms but has paid cyber security firms to weaken those algorithms (NY Times, 17 Jan 2014), underscore the need for additional security methods when data are in transit or at rest. McAfee Labs (Dec 2013) predicts a substantial increase in attacks aimed at shared resources in the cloud, and organizations will face additional threats due to vendor security and the unintended—and unsecured—commingling of personal and corporate data on home and mobile devices and in the cloud (InfoSecurity Magazine, Jan 2014).
Encryption, even properly used, can fall prey to threats including sniffing and malware, and is not proof against environments where encryption keys are stored locally or co-located with data, and where third-party applications integrate with cloud services. All of these threats resonate in today's complex enterprise computing environments—they cannot be merely avoided, they must be acknowledged, solved for, and secured.
Additional challenges include a huge growth in the use of mobile devices and BYOD users. Administrators must secure these devices, the data they store and access, and both the cloud services and the connections across which they access them. Each represents a new security threat, and none are rendered secure by encryption alone.
Finally, security professionals must address a variety and range of security policies for applications and services and ensure that enterprise employees adhere to these policies and practice secure computing. Encryption doesn't apply here, at all.
Secure Fabric™: Beyond Encryption for Data Beyond the Enterprise
The answer to these challenges must address each aspect of today’s evolving enterprise environment. Cloud services like Box, Ignite, and Syncplicity that originally targeted a consumer market are attempting to retrofit their security implementations to meet enterprise requirements, slapping on a veneer of encryption that fails under fire. Secure Fabric, a Topia Technology platform, ensures data security and accessibility by providing a tightly designed infrastructure for moving data and files within and across enterprises and the cloud, on network, home, and mobile devices.
Secure Fabric Elements
Secrata™ is the most secure way to move and manage files across content locations (data stores). This Secure Fabric element ensures full control and visibility for IT, and provides ease of use for employees. Secrata uses workspaces to help the user manage their files. An integrated messaging platform provides a way to securely collaborate and annotate documents. Secrata is easily integrated into existing workflows to drive adoption and extend corporate assets. IT can control where files can reside and be sent, using a powerful policy engine. Secrata is elegantly simple to use, and powerfully secure.
CloudView™ creates a unified user experience across file locations. This Secure Fabric element allows the enterprise to securely register content where it lives… no need to aggregate files into a single location or cloud vendor. Cloud View extracts metadata to securely and easily find and manage files no matter where they reside. Files are not dumbly replicated but are securely made available to access or share from any data store. IT remains in control and the user remains productive.
DataPipe™ is the most secure way to move data between machine end-points. This Secure Fabric element enables secure optimized transfer of any type of data to a remote location. Now, POS transactions, medical device data, or any point-to-point data transfer can have unmatched security that goes far beyond encryption.
GeoSecure™ adds a new dimension to data security—location. This Secure Fabric element uses GPS and IP geolocation to give you a powerful way to secure data based on a user’s location. Administrators can restrict access to files and data in a Secrata Workspace when access is attempted from a restricted location. Now, you can ensure that sensitive assets cannot be downloaded, shared, or even viewed from dangerous locations such as foreign countries, unsecure WiFi networks, or outside a company location.
StoreSecure™ allows the enterprise to shred and encrypt files at rest. This Secure Fabric element goes beyond encryption and introduces shredding with unique encryption keys for each resulting shred. The enterprise now has a way to further mitigate the risks to its files assets.
The Embedded Client™ allows Secure Fabric to be integrated into devices and applications through the inclusion of a library containing a micro client for Secure Fabric. This micro client provides all the secure access and transfer of data like a full client, but with a reduced footprint and entirely programmatic control.
Integration with third-party applications is also secure using the Connecting Fabric™ integration module and software APIs. Connecting Fabric allows integration with Secrata, CloudView, or other Secure Fabric elements, free from the threat of malware, both to the enterprise and to the external integration platform.
As connectivity expands with the introduction of IPV6, SecureIOT enables secure transfer from emerging categories of network enabled devices. By shredding and encrypting data between these devices, your Internet of things can expand with unmatched security.
TOPIA TECHNOLOGY JOINS MCAFEE SECURITY INNOVATION ALLIANCE
February 25, 2014
Customers to benefit from powerful new insight into the access, sharing, transfer, and storage of individual files across enterprise borders.
TACOMA, WA—February 25, 2014—Topia Technology, today announced that it has joined the McAfee® Security Innovation Alliance™ (SIA) partner program. Under the McAfee SIA program, Topia Technology will integrate its Secure Fabric Platform with McAfee Enterprise Security Manager providing customers with event information, analysis, auditing, and reporting on file data as files are shared or synced within and beyond traditional enterprise borders.
Secrata with Secure Fabric, extends McAfee Enterprise Security Manager beyond the enterprise firewall. It adds file- and event-level auditing and reporting for data access, sharing, and storage using mobile devices and cloud services and when data is shared with non-enterprise users.
“We are delighted to add Topia Technology to the select list of Technology Partners in the McAfee Security Innovation Alliance (SIA) program,” said Ed Barry, vice president of the Security Innovation Alliance, at McAfee. “We expect our joint solution to stimulate powerful new workflows for security and compliance, a key goal of the (SIA) program.”
“As enterprises struggle to control and secure their assets across internal file stores, an ever-increasing universe of mobile devices, and a plethora of non-secure cloud storage services,” said Janine Terrano, CEO of Topia Technology, “they are searching for solutions that allow them to identify and quickly isolate noncompliant data sharing and prevent unauthorized access to sensitive information. The Secure Fabric Platform combined with the McAfee ESM gives customers the tools to secure their valuable data assets.”
McAfee Enterprise Security Manager enables businesses with true, real-time situational awareness and the speed and scale required to identify critical threats, respond intelligently, and ensure continuous compliance monitoring. For more information on the McAfee SIA and McAfee Enterprise Security Manager please visit: http://www.mcafee.com.
Founded in 1999, Topia Technology's products, services, and solutions help overcome the challenges inherent to complex distributed systems. Topia's world-class engineers specialize in security, mobile object technology, systems engineering, and distributed architectures, including SOA and cloud computing. Having spent the last decade designing solutions for the federal government, Topia builds everything with security from the ground up. With expertise in secure movement and management of data across the open Internet, Topia engineered solutions also maximize performance and usability—and security remains paramount. No exceptions.
Get more information, see product demos, and more.
Copyright © 2014, . All rights reserved.