SHARESYNC SECURITY FEATURES



Similar documents
Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

OPINION PIECE. It s up to the customer to ensure security of the Cloud

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

Project Management Basics

Products and Services

Warehouse Security System based on Embedded System

ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators.

RISK MANAGEMENT POLICY

CASE STUDY BRIDGE.

naifa Members: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS

License & SW Asset Management at CES Design Services

CASE STUDY ALLOCATE SOFTWARE


Cluster-Aware Cache for Network Attached Storage *

TRID Technology Implementation

Emergency, Standby and Backup Power Connection Solutions

MARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Systems)

Free Enterprise, the Economy and Monetary Policy

Digifort Enterprise The most complete Digifort solution for camera and alarm monitoring.

Insurance Solutions

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

FileCloud Security FAQ

Change Management Plan Blackboard Help Course 24/7

A Review On Software Testing In SDlC And Testing Tools

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

A Novel Web-Based Student Academic Records Information System

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

Development Progress

Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards

Third Party Technical Guidelines

Secure and control how your business shares files using Hightail

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :

Security Overview Enterprise-Class Secure Mobile File Sharing

Projectplace: A Secure Project Collaboration Solution

Nimble Storage Exchange ,000-Mailbox Resiliency Storage Solution

Production Management II. Product Life-Cycle Management II

Security Architecture Whitepaper

INSIDE REPUTATION BULLETIN

Intermedia: A Worry-Free Transition to the Cloud

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc.

Forest Lake Local Plan

The Cash Flow Statement: Problems with the Current Rules

All you need to know about becoming an owner-builder. Owner-builder. Application Kit and Information Statement

Comparing Alternatives for Business-Grade File Sharing. intermedia.net CALL US US ON THE WEB

A Supply Chain Paradox

Client Security Risk Assessment Questionnaire

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

The Essential Security Checklist. for Enterprise Endpoint Backup

Security Considerations

your Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products

Cloud Web Portal User Guide Version 2.0

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Thank you for attending the MDM for the Enterprise Seminar Series!

Strategic Plan of the Codex Alimentarius Commission

IaaS Clouds: Which Security for VMs and Hypervisors? Marc Lacoste Orange Labs

Performance of a Browser-Based JavaScript Bandwidth Test

! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Performance of Multiple TFRC in Heterogeneous Wireless Networks

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO

A technical guide to 2014 key stage 2 to key stage 4 value added measures

Corrigendum to RFP for Implementation of Payment Gateway Solution & Access Control Server Solution under Outsourced Model

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Report b Measurement report. Sylomer - field test

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

Tips For Success At Mercer

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Encrypted TCP chat using RSA and AES algorithm

CITY OF SAINT PAUL FUNDING & TECHNICAL RESOURCES FOR BUSINESSES

Transcription:

www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over end-uer activity with Audit Log and Admin Management Utilize remote wipe capabilitie in cae of lot or tolen device Keep content afe with at-ret and in-tranit encryption Aure reliability with a 99.999% financially backed uptime guarantee Leverage enterprie-cla datacenter with redundant torage cluter and connection to multiple Internet provider Protect content integrity with feature that guard againt accidental deletion or verion conflict Keep content in the right hand with permiion and acce that are trictly controlled and eaily amended ENCRYPTION ShareSync data i encrypted both when it at ret a well a when it in tranit. At-ret data i encrypted with 256-bit AES encryption, while in-tranit data i encrypted uing 256-bit SSL/HTTPS encryption. Additionally, ShareSync generate a unique encryption key every account, creating an even greater degree of protection through data iolation. The following chart compare ShareSync encryption feature to other provider: Skybox Box Dropbox Office App ShareSync Enterprie Buine Starter Peronal Buine Peronal One Buine In-tranit encryption At-ret encryption with unique account-level encryption key

PASSWORD PROTECTION Each time a uer activate a new ShareSync device or accee ShareSync from the web, they mut login uing their uername and paword. ShareSync paword policie are imported from Active Directory and utilize trong parameter, helping to eliminate the poibility that external partie will gue paword. Thi Active Directory integration require uer to ue the ame paword ShareSync that they ue all their cloud ervice. Becaue there are no additional paword to remember, it reduce the poibility that they will write their paword down where other might ee it. For mobile device, an additional layer of ecurity can be added by configuring a pacode that mut be entered each time the app i launched. DEVICE MANAGEMENT AND REMOVE WIPE Uing the Control Panel, adminitrator get complete viibility acro all the ShareSync device enabled on their account. Each time a new device i configured by an end uer, the adminitrator i notified, and all uer device are catalogued in the Control Panel. ShareSync i one of jut a few collaboration olution that allow adminitrator to wipe data remotely. In cae of a lot or tolen laptop, tablet, or mobile phone, or when facing a peronnel iue, corporate data can generally be quickly removed, helping to minimize potential data leakage.

Skybox Box Dropbox Office App ShareSync Enterprie Buine Starter Peronal Buine Peronal One Buine Device managem ent with remote wipe Mobile device only AUDIT LOG The Audit Log i a Control Panel feature that allow adminitrator to view all the ShareSync activitie on their account. Whenever file or folder are added, updated, hared, or deleted, the event i logged and available tracking and auditing purpoe, providing a greater level of adminitrative control over ShareSync. There are multiple way to ue the Audit Log: Browe by event type Search by uer, file name, or folder name Filter by event type or date range

ADMIN FILE MANAGEMENT Admin file management let account owner maintain adminitrative control overall end uer file and folder. Once account owner enable thi feature through the control panel, they can manage all ShareSync content acro the environment. Thi feature need to be explicitly enabled each admin. Admin Management increae the ability adminitrator to monitor and manage end uer content. Uing Admin Management, account owner can Adjut haring permiion Add, delete and retore file Search acro the ShareSync folder and file tructure. Skybox Box Dropbox Office App ShareSync Enterprie Buine Starter Peronal Buine Peronal One Buine Admin Management USER CONTROL OVER SHARING PERMISSIONS When a uer hare a ShareSync folder, he or he can et permiion each collaborator independently. The configurable haring permiion are Co-Owner, Modify or View permiion. Permiion level can be changed or revoked at any time. SHARING WEB LINKS Web link allow uer to hare individual file with uer both inide and outide of the company, without giving uer permiion to view or edit other document in the ame folder. For additional ecurity, web link can be protected with paword.

EXTERNAL COLLABORATORS Adminitrator can configure external haring policie to allow uer to eaily hare with virtually anyone. External ShareSync uer can edit file, ync file, and acce all content in the folder that have been hared with them. Thi i a ueful feature if collaborating on file and folder with another company on an ongoing bai. External ShareSync uer are able to acce the complete et of ShareSync feature and functionality. Adminitrator can track external uer activity in the audit log and control data with remote wipe. DATA PROTECTION ShareSync wa deigned to enure a high ecurity of data, to help reduce the chance of data being accidentally deleted, and to help provide eay way to retore and recover data hould it be lot. Every ShareSync file i replicated to redundant torage cluter to help minimize the rik of data lo. Additionally, each uer data i fully iolated from every other uer data. In the unlikely event of a ervice outage, uer can till acce all their locally-ynced data. ShareSync co-editing feature help to prevent file overwrite and conflict. verioning allow uer to eaily retore previou verion of all file tored in ShareSync. If a file i deleted, it i moved to a recycle bin, where it can be retored. Adminitrator can retore deleted file and prevent permanent deletion.

INFRASTRUCTURE ShareSync i backed by a 99.999% uptime guarantee. No other file collaboration ervice offer a comparable uptime guarantee. Skybox Box Dropbox Office App ShareSync Enterprie Buine Starter Peronal Buine Peronal One Buine 99.999 % SLA 99.9 ShareSync i delivered through a data infratructure compried of: Multi-tenant platm ecured with redundant firewall, multiple Intruion Prevention Sytem Facilitie with dedicated, full-time certified ecurity peronnel and rigorou phyical ecurity meaure

COMPLIANCE ShareSync take trict ecurity meaure to reach regulatory compliance acro indutry and vertical-pecific tandard. Data Privacy, Integrity and Security Standard SOC 1 SOC 1 are pecific aurance buinee that ue ShareSync a their internal control over financial reporting. Thee regulatory guarantee are neceary Sarbane-Oxley (SOX) compliance. SOC 2 Type II - ShareSync ha a SOC 2 Type II audit report from an independent auditor who ha validated that, in their opinion, our control and procee were effective in auring ecurity during the evaluation period. ShareSync i audited company-wide, not jut at the datacenter level. Additionally, while ome ervice provider may only chooe to be audited againt one or two of the five trut ervice principle (ecurity, availability, proceing integrity, confidentiality and privacy), ShareSync ha been audited againt all five. US-EU & US-Swi Safe Harbor - ShareSync i regitered and certified with the US Department of Commerce privacy under the Safe Harbor program. Thi tringent et of requirement enure any certified provider ha etablihed an in-houe program, identified a privacy officer, met all the proviion proper dicloure of it privacy practice, and offer mechanim feedback, opting out, and dipute reolution. PCI Data Security Standard (PCI DSS) - The payment proceing ytem utilized by ShareSync ha paed the trict teting procedure neceary to be compliant with the PCI Data Security Standard (PCI DSS). Thi help enure that your payment inmation will not be acceed by unauthorized partie or hared with uncrupulou vendor. Vertical-Specific Compliance: HIPAA - The Health Inurance Portability and Accountability Act mandate a et of regulation protecting the privacy and ecurity of patient confidential health inmation, including when and with whom that inmation can be hared. Skybox Box Dropbox Office App ShareSync Enterprie Buine Starter Peronal Buine Peronal One Buine HIPAA CONCLUSION Thee ecurity feature make ShareSync a highly-ecure, highly-reliable, buine-grade file ync and hare ervice. 888.238.2262 ale@kyboxinnovation.com Complexity i obolete.