data breaches

Egnyte Launch New Data Security Innovation in the Cloud

New Data Security Innovation

Cisco predicted in their 2016 White Paper, entitled Cisco Global Cloud Index: Forecast and Methodology 2015–2020, that by the end of 2020 annual global cloud IP traffic will reach 14.1 ZB (1.2 ZB per month), up from 3.9 ZB per year (321 EB per month) in 2015. With increasing amounts of sensitive data being stored digitally and transmitted around the world, it becomes increasingly important for companies to invest in data and content protection and governance.

Security Innovation

In 2016 in the United States there were more than 450 data breaches in the United States that led to nearly 12.7 million records being exposed. September of last year saw Yahoo reveal that the data of at least 500 million of their user accounts had been stolen – it’s believed to be the biggest data breach from one site in history. This is not a new phenomenon, in 2012 LinkedIn suffered a major breach when 6.5 million encrypted passwords were posted on a Russian site, whilst just in May of this year, MySpace had the usernames, passwords, and email addresses of 360 million users posted on an online forum. (InformationIsBeautiful.net compiled a fantastic visualization that truly helps you gain perspective on the scale of the issue.)

This week, Egnyte launched Egnyte Protect to the general public, it’s a leading cloud based smart content collaboration and governance tool that can provide real-time analysis of all the content within an organization and present useful insights and suggestions to help administrators protect against potential data breaches. Rather than a more traditional, hardware based solution to data security, Egnyte Protect is purely digital, so requires no investment in cyber security equipment. It is the first piece of software of it’s kind and could potentially revolutionize how we look at data security.

Whilst some data breaches are due to hackers, research has found that around 80 percent of all data breaches occur because of employee negligence or error. As companies grow it can be difficult to put cyber security at the forefront of company policy, but it is critical for the security of a firm’s data to be one of the highest priorities.

Egnyte Protect continuously analyzes the entire content environment and picks out the most sensitive information, such as credit card or social security numbers. The ability to identify vulnerabilities in real-time, alert administrators, and remedies to any issues, is a key part of what makes this product the first of it’s kind.

As organizations are transforming their digital workplace and rapidly growing their content, we identified an urgent need for a governance solution that could provide protection across a wide range of apps and repositories,” CEO Vineet Jain and CloudTweaks contributor commented upon launch, “With Egnyte Protect we took a new approach, building a cloud-based solution that can be easily deployed and create value for organizations within minutes, versus the traditional approach which typically involved deploying additional hardware and incurring professional services costs.”

Prior to it’s full commercial release the service has been utilized by Buzzfeed. Jason Reich, director of global security at BuzzFeed, stated that, “At BuzzFeed our teams are working on a wide range of content at a fast pace, much of which includes information that is timely and sensitive in nature… It is our top priority to protect that content, its sources, and our team without interrupting their workflow. We chose to deploy Egnyte Protect because it actively monitors our content from the inside out, checking for potential issues twenty-four seven, and allowing us to rest assured knowing our content is properly protected at all times while our employees work freely.”

So Egnyte Protect has already been trialed by one of the biggest sites on the internet, a ringing endorsement for any cyber security firm. We shall have to wait to see if this is truly a revolutionary moment for cyber security.

By Josh Hamilton

Josh Hamilton

​Josh Hamilton ​is an aspiring journalist and writer who has written for a number of publications​ involving Cloud computing, Fintech and Legaltech​. ​Josh has a Bachelor’s Degree in Political Law​ from ​Queen's University in Belfast​​.
Studies included, Politics of Sustainable Development, European Law, Modern Political Theory and Law of Ethics​.

View Website

CONTRIBUTORS

5 Simple Tips to Help Avoid Ransomware

5 Simple Tips to Help Avoid Ransomware

5 Tips to Avoid Ransomware Ransomware is a particularly pernicious form of malware: unsatiated by simply using your system as ...
Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

The Malware Cloud Concern This year we’ve had two cyber attacks in which malware was used to cripple government computer ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
GDPR Compliance: A Network Perspective

GDPR Compliance: A Network Perspective

GDPR Compliance Regulations can be a tricky thing. For the most part, they’re well thought out in terms of mandating ...
Part 1 - Identity Assurance by Our Own Volition and Memory

Part 1 – Identity Assurance by Our Own Volition and Memory

In an earlier article we discussed what technology can displace the password. The proposition of Expanded Password System (EPS) that ...
10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent ...
IoT Trends

The Internet of Attacks: Disturbing Online IoT Trends

Disturbing Online IoT Trends If you thought the worst thing to come out of the Internet of Things (IoT) trend ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
How Big Data Is Aiding Police And Security Officers

How Big Data Is Aiding Police And Security Officers

Big Data Is Aiding Police Officers Big data has become a trusted resource for people in industries ranging from health ...
The Future For Cyber Security Looks Uncertain

The Future For Cyber Security Looks Uncertain

Future For Cyber Security From the inception of the internet, cyber security has become increasingly more important. As the internet ...