data breaches

Egnyte Launch New Data Security Innovation in the Cloud

New Data Security Innovation

Cisco predicted in their 2016 White Paper, entitled Cisco Global Cloud Index: Forecast and Methodology 2015–2020, that by the end of 2020 annual global cloud IP traffic will reach 14.1 ZB (1.2 ZB per month), up from 3.9 ZB per year (321 EB per month) in 2015. With increasing amounts of sensitive data being stored digitally and transmitted around the world, it becomes increasingly important for companies to invest in data and content protection and governance.

Security Innovation

In 2016 in the United States there were more than 450 data breaches in the United States that led to nearly 12.7 million records being exposed. September of last year saw Yahoo reveal that the data of at least 500 million of their user accounts had been stolen – it’s believed to be the biggest data breach from one site in history. This is not a new phenomenon, in 2012 LinkedIn suffered a major breach when 6.5 million encrypted passwords were posted on a Russian site, whilst just in May of this year, MySpace had the usernames, passwords, and email addresses of 360 million users posted on an online forum. (InformationIsBeautiful.net compiled a fantastic visualization that truly helps you gain perspective on the scale of the issue.)

This week, Egnyte launched Egnyte Protect to the general public, it’s a leading cloud based smart content collaboration and governance tool that can provide real-time analysis of all the content within an organization and present useful insights and suggestions to help administrators protect against potential data breaches. Rather than a more traditional, hardware based solution to data security, Egnyte Protect is purely digital, so requires no investment in cyber security equipment. It is the first piece of software of it’s kind and could potentially revolutionize how we look at data security.

Whilst some data breaches are due to hackers, research has found that around 80 percent of all data breaches occur because of employee negligence or error. As companies grow it can be difficult to put cyber security at the forefront of company policy, but it is critical for the security of a firm’s data to be one of the highest priorities.

Egnyte Protect continuously analyzes the entire content environment and picks out the most sensitive information, such as credit card or social security numbers. The ability to identify vulnerabilities in real-time, alert administrators, and remedies to any issues, is a key part of what makes this product the first of it’s kind.

As organizations are transforming their digital workplace and rapidly growing their content, we identified an urgent need for a governance solution that could provide protection across a wide range of apps and repositories,” CEO Vineet Jain and CloudTweaks contributor commented upon launch, “With Egnyte Protect we took a new approach, building a cloud-based solution that can be easily deployed and create value for organizations within minutes, versus the traditional approach which typically involved deploying additional hardware and incurring professional services costs.”

Prior to it’s full commercial release the service has been utilized by Buzzfeed. Jason Reich, director of global security at BuzzFeed, stated that, “At BuzzFeed our teams are working on a wide range of content at a fast pace, much of which includes information that is timely and sensitive in nature… It is our top priority to protect that content, its sources, and our team without interrupting their workflow. We chose to deploy Egnyte Protect because it actively monitors our content from the inside out, checking for potential issues twenty-four seven, and allowing us to rest assured knowing our content is properly protected at all times while our employees work freely.”

So Egnyte Protect has already been trialed by one of the biggest sites on the internet, a ringing endorsement for any cyber security firm. We shall have to wait to see if this is truly a revolutionary moment for cyber security.

By Josh Hamilton

Josh Hamilton

​Josh Hamilton ​is an aspiring journalist and writer who has written for a number of publications​ involving Cloud computing, Fintech and Legaltech​. ​Josh has a Bachelor’s Degree in Political Law​ from ​Queen's University in Belfast​​.
Studies included, Politics of Sustainable Development, European Law, Modern Political Theory and Law of Ethics​.

View Website
The Path to the Cloud: A Look at Different Approaches to Cloud Migration

The Path to the Cloud: A Look at Different Approaches to Cloud Migration

Different Approaches to Cloud Migration The public cloud has gained considerable momentum this past decade. Concerns about cost and security have largely been put to rest as AWS, Azure and newcomers like Google have surged ...
blcokchain contributor

Cryptographic Key Generation – It’s Time To Pay Attention

Cryptographic Key Generation When we think about cryptographic keys, we tend to think about closely guarded secrets. Keys are the only thing that keeps the attacker away from your encrypted data. Some keys are usually treated ...
Machine Learning Explained: Understanding Supervised, Unsupervised, and Reinforcement Learning

Machine Learning Explained: Understanding Supervised, Unsupervised, and Reinforcement Learning

Machine Learning Explained Once we start delving into the concepts behind Artificial Intelligence (AI) and Machine Learning (ML), we come across copious amounts of jargon related to this field of study. Understanding this jargon and ...
How Automation is Changing the Digital Revolution

How Automation is Changing the Digital Revolution

Automated Digital Revolution While the exact moment it began is up for debate (opinions vary wildly on the matter, from the late 1940s to the early 1980s), the digital revolution continues to have a profound ...
Over 100 New Ransomware Families Discovered Last Year

Over 100 New Ransomware Families Discovered Last Year

100 New Ransomware Families The world in 2016 sees a rapid rise of ransomware attacks that are increasingly targeting specific businesses and entire industries. A report by David Balaban for privacy-pc.com shows that ransomware attacks ...
The Lighter Side Of The Cloud - The Backup Reminder
The Lighter Side Of The Cloud - Hydro Cancellation
The Lighter Of The Cloud - Virtual Lunch Break
The Lighter Side Of The Cloud - F96qL#5
The Lighter Side Of The Cloud - Due Diligence
The Lighter Side Of The Cloud - Going Viral
The Lighter Side Of The Cloud - Fear Of Heights
The Lighter Side Of The Cloud - Dial-up Speeds
The Lighter Side Of The Cloud - Easter Egg Hunt

CLOUDBUZZ NEWS

Rackspace Launches Kubernetes-as-a-Service with Fully Managed Operations

Rackspace Launches Kubernetes-as-a-Service with Fully Managed Operations

SAN ANTONIO – May 16, 2018 – Rackspace today announced Rackspace Kubernetes-as-a-Service, a highly-available managed service that transforms the way enterprises can utilize new container technologies, accelerating their digital transformation. Rackspace is focused on delivering true transformation ...
Worldwide Services Revenue Posts Steady Year-Over-Year Growth in the Second Half of 2017, According to IDC

Worldwide Services Revenue Posts Steady Year-Over-Year Growth in the Second Half of 2017, According to IDC

FRAMINGHAM, Mass. May 15, 2018 – Worldwide revenues for IT Services and Business Services totaled $502 billion in the second half of 2017 (2H17), an increase of 3.6% year over year (in constant currency), according to ...
Security in the Cloud—A Little Known Advantage, Actually

Security in the Cloud—A Little Known Advantage, Actually

Okay, I’ll go ahead and say it: Public cloud infrastructures are more secure, and the security is more cost-effective, than the majority of on-premises data centers. That should get the blood flowing. With the word ...