Image Image Image Image Image Image Image Image Image

Blog

By admin / March 10, 2017

The Need for Administrator Control

As more and more organizations flock to the cloud for their file storage and sharing needs, an IT dilemma is beginning to form. The need to access shared documents across users, devices, and locations is quickly presenting a security threat to organizations.

This represents a nightmare for enterprise IT staff. Once upon a time, all of your company’s documents and files were kept in-house, but with the flock to cloud services, BYOD environments, and distributed environments a need is quickly emerging to maintain administrative control over a variety of endpoints and networks.

Secrata Administrators can run audit reports on their systems

Secrata helps to bridge the gap between disparate hardware, systems, or networks. Secrata administrators maintain control over the file service to ensure that only appropriate users can access the Secrata platform. Using Secrata Administrator tools, you can audit a user’s actions to maintain total visibility into your Secrata instance. This level of granular administrative visibility ensures that Secrata admins have a path to audit potential data breaches, security threats, or just to run routine audits.

Increasing administrator controls is a priority for the Secrata team as we develop our product roadmap. Presenting granular permissions controls and enhanced user management tools. Topia Technology would be happy to hear about administrator features that your organization could benefit from.

 

Blog Post Written By: Matt Seto, Secrata Product Manager

By admin / February 3, 2017

Secrata Collaboration Spaces

Team collaboration is a big deal. As a Product Manager at Topia Technology, I work hard to ensure that our entire team is on the same page as we move forward. We write proposals, business requirements, product spec sheets, test plans, deployment strategies, and many more documents for every project that we undertake. Keeping these documents organized is integral to maintaining our release targets.

Secrata is a great tool for keeping your files organized and in one place for your project. Using Secrata workspaces and folders, you can invite all of your project colleagues to manage and store project files in a unified location. Employees can make edits to project files and upload new versions to the workspace to ensure that all of your project documentation is up-to-date and current. No more dealing with multiple document versions on different computers. With Secrata workspaces you always know where the latest document version is, and you can always get a copy of it!

All of your collaborators can access your Secrata workspace to share files and messages

 

The power of Secrata workspaces is multiplied when you consider that workspace can be shared with users outside of your IT infrastructure. Coordinating projects with multiple organizations is streamlined when all users have access to the same collaboration space. With Secrata workspaces, IT departments don’t need to create and manage new user accounts for internal network. If you like, Secrata can exist entirely without the need for IT departments to onboard new users or manage accounts for your collaborators.

Your Secrata workspaces are always secured by Secrata’s patented chunking-and-encrypting technology, which ensures that your data is impervious to SSL and TLS exploits. Have the convenience of sharing all of your files, and rest assured that your sensitive information remains secure with Secrata.

 

Blog Post Written By: Matt Seto, Secrata Product Manager

By admin / January 26, 2017

Secrata Workspaces, More Than Just Files!

Secrata prides itself on being the most secure way to secure and send files to users both inside and outside of your network. Secrata also prides itself on being the easiest way to send those files.

On the surface, you simply create a workspace, invite some friends and share some files. But Secrata is much more powerful once you dig into some of its features. The Topia Technology blog will keep you updated on some of these handy new features, as well as point out some of the use cases that set Secrata apart from the competition.

Secrata Workspaces are more than just folders for holding files. The workspace message board is a great way to communicate with coworkers within the context of your project. More importantly, the messages in the workspace message board are secured with the same encryption as the rest of your Secrata files, meaning you can be assured that nobody is reading your messages.

At Topia Technology, we use Secrata workspaces to communicate with users outside of our IT infrastructure in a secure way. Sometimes our Secrata workspaces are used to send executable files and other programs, using the workspace message board we can give instruction and guidance on how to use these programs. The workspace message board allows you to give guidance in context of the shared files, without having to send separate instruction documents through email or some other communication method.

Workspace messages exist for the entire life of the workspace. You can onboard new employees and share relevant workspaces with them. They can navigate all old workspace messages and get caught up on workspace actions to help for quicker onboarding.

The workspace message board has many other use cases, maybe your organization has found a different workflow that uses the message board in a new and novel way. We would love to hear about any ideas you have.

Blog Post Written By: Matt Seto, Secrata Product Manager

By admin / January 17, 2017

Sharing Sensitive Files Should Be Secure, But Not Hard

Sharing your sensitive files with your coworkers and clients can be dangerous. Every day there are more security flaws discovered that threaten to compromise your data and put your enterprise at risk.

Sharing your sensitive files requires lots of security, but that doesn’t mean it should be hard.

Enterprise file sync and share (EFSS) tools offer a way to share files with other users, and should protect you from those ubiquitous security threats on the internet. There are plenty of options for you to investigate as you transition your organization to an EFSS tool, these are the things that you should look for:

  • Encryption & Security There is no compromise on security. Time and time again we find reports of data breeches and hacks. It is imperative that a company do their due diligence to encrypt data and prevent data loss whenever possible.
  • Reporting and Auditing Proper reporting and auditing services will give administrators total visibility into the file sharing service. Recording user uploads, downloads, invites, and edits means that you can be sure that all file sharing is done within the bounds of your organization’s file sharing directives.
  • Usability Sharing your files should be secure, but that doesn’t mean it should be hard. EFSS tools are there to make your workflow easier, not harder. When finding an EFSS tool to add to your organization, a trial period is the best way to go. Let your users try the product and give you feedback on how well it works for them.

It is important to make sure that you choose the right tool for your organization. If you these features as starting points for your search and you will have a great start for getting your EFSS system up and running!

Blog Post Written By: Matt Seto, Product Manager; Secrata

By admin / January 11, 2017

If You Can’t Beat ‘em…Secure ‘em!

 

The explosive growth of cloud file sync and share services is no mystery. Companies like DropBox, Egnyte and Box have tapped a rich vein of user demand and delivered a solution that does not impose new behaviors or workflows. This has resulted in explosive growth for cloud providers but has created a security nightmare for enterprise IT.

This trend is complicated by the fact that the IT landscape has become far more complex with the rapid adoption of mobile devices like smartphones and tablets driven primarily by the consumer market, but forced upon the enterprise by users who demand to use their cherished mobile devices on corporate networks. The convenience and productivity gains realized through the use of mobile computing are clear. So this means that enterprise IT security must find ways to deliver the same service and user experience without compromising the security or audit capabilities of their file and data assets.

Rather than ban cloud file sync and share solutions from corporate devices, IT is attempting to take control of the data security. If the enterprise could locate, identify, and secure the data & file assets where they reside—whether inside the enterprise or in a private or public cloud—without imposing a new workflow on the end-user, then everybody wins. If you can make every file movement between clouds, between devices, and between users private and secure, then the user is empowered and risk is mitigated. Secrata can make this a reality for your enterprise today.

Topia Technology has ensured unmatched security for Secrata, its data security platform built specifically for the enterprise. Secrata shreds the data first, and then encrypts each shred with unique encryption keys – ensuring your data is impervious to ANY SSL/TLS exploit. It is the most secure way to share files on the wide area internet.
Now the enterprise can join the adoption of file sync and share with the confidence that if it’s Secrata, it is secure.

 

Written By: Janine Terrano, CEO Topia Technology