Egnyte Launch New Data Security Innovation

New Data Security Innovation

Cisco predicted in their 2016 White Paper, entitled Cisco Global Cloud Index: Forecast and Methodology 2015–2020, that by the end of 2020 annual global cloud IP traffic will reach 14.1 ZB (1.2 ZB per month), up from 3.9 ZB per year (321 EB per month) in 2015. With increasing amounts of sensitive data being stored digitally and transmitted around the world, it becomes increasingly important for companies to invest in data and content protection and governance.

Security Innovation

In 2016 in the United States there were more than 450 data breaches in the United States that led to nearly 12.7 million records being exposed. September of last year saw Yahoo reveal that the data of at least 500 million of their user accounts had been stolen – it’s believed to be the biggest data breach from one site in history. This is not a new phenomenon, in 2012 LinkedIn suffered a major breach when 6.5 million encrypted passwords were posted on a Russian site, whilst just in May of this year, MySpace had the usernames, passwords, and email addresses of 360 million users posted on an online forum. (InformationIsBeautiful.net compiled a fantastic visualization that truly helps you gain perspective on the scale of the issue.)

This week, Egnyte launched Egnyte Protect to the general public, it’s a leading cloud based smart content collaboration and governance tool that can provide real-time analysis of all the content within an organization and present useful insights and suggestions to help administrators protect against potential data breaches. Rather than a more traditional, hardware based solution to data security, Egnyte Protect is purely digital, so requires no investment in cyber security equipment. It is the first piece of software of it’s kind and could potentially revolutionize how we look at data security.

Whilst some data breaches are due to hackers, research has found that around 80 percent of all data breaches occur because of employee negligence or error. As companies grow it can be difficult to put cyber security at the forefront of company policy, but it is critical for the security of a firm’s data to be one of the highest priorities.

Egnyte Protect continuously analyzes the entire content environment and picks out the most sensitive information, such as credit card or social security numbers. The ability to identify Vulnerabilities in real-time, alert administrators, and remedies to any issues, is a key part of what makes this product the first of it’s kind.

As organizations are transforming their digital workplace and rapidly growing their content, we identified an urgent need for a governance solution that could provide protection across a wide range of apps and repositories,” CEO Vineet Jain and CloudTweaks contributor commented upon launch, “With Egnyte Protect we took a new approach, building a cloud-based solution that can be easily deployed and create value for organizations within minutes, versus the traditional approach which typically involved deploying additional hardware and incurring professional services costs.”

Prior to it’s full commercial release the service has been utilized by Buzzfeed. Jason Reich, director of global security at BuzzFeed, stated that, “At BuzzFeed our teams are working on a wide range of content at a fast pace, much of which includes information that is timely and sensitive in nature… It is our top priority to protect that content, its sources, and our team without interrupting their workflow. We chose to deploy Egnyte Protect because it actively monitors our content from the inside out, checking for potential issues twenty-four seven, and allowing us to rest assured knowing our content is properly protected at all times while our employees work freely.”

So Egnyte Protect has already been trialed by one of the biggest sites on the internet, a ringing endorsement for any cyber security firm. We shall have to wait to see if this is truly a revolutionary moment for cyber security.

By Josh Hamilton

Gilad David Maayan
What Is Application Dependency Mapping? Modern software development teams use fast-paced DevOps work processes. However, the complexity of modern software applications often gets in the way. A typical enterprise software project has thousands of components, ...
Gary Bernstein
Secure Remote Authentication When employees are working remotely, they need to be able to access company resources and applications just as if they were in the office. This means that remote authentication needs to be ...
David Dymko
Working with virtual machines and or Kubernetes A conversation with David Dymko, Director of Engineering for Cloud Native Development at Vultr.com If you work with virtual machines and or Kubernetes, and if you have some ...
Jen Klostermann
The Fintech Landscape The Nitty Gritty Although the COVID-19 pandemic has highlighted its existence, most of us have been using fintech in some form or another for quite some time. It’s a big part of ...
Dana Gardner
Low-code Development Has Entered a Maturity Spurt Closing the gap between the applications and services a company needs -- and the ones they can actually produce -- has long been a missing keystone for attaining ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.