data breaches

Egnyte Launch New Data Security Innovation in the Cloud

New Data Security Innovation

Cisco predicted in their 2016 White Paper, entitled Cisco Global Cloud Index: Forecast and Methodology 2015–2020, that by the end of 2020 annual global cloud IP traffic will reach 14.1 ZB (1.2 ZB per month), up from 3.9 ZB per year (321 EB per month) in 2015. With increasing amounts of sensitive data being stored digitally and transmitted around the world, it becomes increasingly important for companies to invest in data and content protection and governance.

Security Innovation

In 2016 in the United States there were more than 450 data breaches in the United States that led to nearly 12.7 million records being exposed. September of last year saw Yahoo reveal that the data of at least 500 million of their user accounts had been stolen – it’s believed to be the biggest data breach from one site in history. This is not a new phenomenon, in 2012 LinkedIn suffered a major breach when 6.5 million encrypted passwords were posted on a Russian site, whilst just in May of this year, MySpace had the usernames, passwords, and email addresses of 360 million users posted on an online forum. (InformationIsBeautiful.net compiled a fantastic visualization that truly helps you gain perspective on the scale of the issue.)

This week, Egnyte launched Egnyte Protect to the general public, it’s a leading cloud based smart content collaboration and governance tool that can provide real-time analysis of all the content within an organization and present useful insights and suggestions to help administrators protect against potential data breaches. Rather than a more traditional, hardware based solution to data security, Egnyte Protect is purely digital, so requires no investment in cyber security equipment. It is the first piece of software of it’s kind and could potentially revolutionize how we look at data security.

Whilst some data breaches are due to hackers, research has found that around 80 percent of all data breaches occur because of employee negligence or error. As companies grow it can be difficult to put cyber security at the forefront of company policy, but it is critical for the security of a firm’s data to be one of the highest priorities.

Egnyte Protect continuously analyzes the entire content environment and picks out the most sensitive information, such as credit card or social security numbers. The ability to identify vulnerabilities in real-time, alert administrators, and remedies to any issues, is a key part of what makes this product the first of it’s kind.

As organizations are transforming their digital workplace and rapidly growing their content, we identified an urgent need for a governance solution that could provide protection across a wide range of apps and repositories,” CEO Vineet Jain and CloudTweaks contributor commented upon launch, “With Egnyte Protect we took a new approach, building a cloud-based solution that can be easily deployed and create value for organizations within minutes, versus the traditional approach which typically involved deploying additional hardware and incurring professional services costs.”

Prior to it’s full commercial release the service has been utilized by Buzzfeed. Jason Reich, director of global security at BuzzFeed, stated that, “At BuzzFeed our teams are working on a wide range of content at a fast pace, much of which includes information that is timely and sensitive in nature… It is our top priority to protect that content, its sources, and our team without interrupting their workflow. We chose to deploy Egnyte Protect because it actively monitors our content from the inside out, checking for potential issues twenty-four seven, and allowing us to rest assured knowing our content is properly protected at all times while our employees work freely.”

So Egnyte Protect has already been trialed by one of the biggest sites on the internet, a ringing endorsement for any cyber security firm. We shall have to wait to see if this is truly a revolutionary moment for cyber security.

By Josh Hamilton

Josh Hamilton

​Josh Hamilton ​is an aspiring journalist and writer who has written for a number of publications​ involving Cloud computing, Fintech and Legaltech​. ​Josh has a Bachelor’s Degree in Political Law​ from ​Queen's University in Belfast​​.
Studies included, Politics of Sustainable Development, European Law, Modern Political Theory and Law of Ethics​.

View Website
GDPR Compliance: A Network Perspective

GDPR Compliance: A Network Perspective

GDPR Compliance Regulations can be a tricky thing. For the most part, they’re well thought out in terms of mandating ...
Cloud Architecture

Cloud Architecture – The Multi-Tenant Versus Multi-Instance Debate

Cloud Architecture Winston Churchill quotes, “We shape our buildings; thereafter they shape us”. We can truly extend this analogy to ...
Blockchain ≠ Bitcoin: Demystifying Blockchain's Business Value in Oil and Gas

Blockchain ≠ Bitcoin: Demystifying Blockchain’s Business Value in Oil and Gas

Demystifying Blockchain's Business Value This is part 1 of a 2-part series on blockchain technology. Blockchain was developed almost a ...
Turn to the Cloud as Part of Your Data Breach Strategy

Turn to the Cloud as Part of Your Data Breach Strategy

Data Breach Strategy The latest Verizon Data Breach Investigations Report is out, and the verdict is in: data breaches are ...
Part 2 - Connected Vehicles: Paving the Way for IoT on Wheels

Part 2 – Connected Vehicles: Paving the Way for IoT on Wheels

Connected Vehicles: IoT on Wheels As vehicles become the hottest “thing” in IoT, the automotive, heavy equipment, and machinery industries ...
The Smart Cloud - Microsoft Wants to Streamline AI Adoption

The Smart Cloud – Microsoft Wants to Streamline AI Adoption

Microsoft Streamline AI Adoption Artificial intelligence, or AI, has begun to see incorporation into more and more of the technologies ...
How the Cloud Is Improving DNA Sequencing

How the Cloud Is Improving DNA Sequencing

DNA Sequencing For many of us, the cloud is part of our daily lives. We use these virtual storage servers ...
Three Essential Ways to Keep your Cloud Infrastructure Secure and Reliable

Three Essential Ways to Keep your Cloud Infrastructure Secure and Reliable

Keeping Your Cloud Infrastructure Secure Companies of all sizes are now truly embracing cloud computing according to research from IDC with spending ...
Analytics Will Revolutionize Supply Chains In 2018

Analytics Will Revolutionize Supply Chains In 2018

Supply Chains In 2018 While 94% of supply chain leaders say that digital transformation will fundamentally change supply chains in ...
Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

The Malware Cloud Concern This year we’ve had two cyber attacks in which malware was used to cripple government computer ...