ChalkTalk: Deeper Dive on Cloud File Sharing Use Cases

CASB, File Sharing 0 Comments

In part 2 of our Cloud File Sharing ChalkTalk series, watch as Ankur Shah does a deep dive into real-world customer use cases for avoiding the compliance and privacy risks associated with file collaboration services. Full transcript below: Hello. Welcome to one more edition of CipherCloud ChalkTalk. My name is Ankur . I’m head of product at CipherCloud. In today’s …

CipherCloud Unveils NEW Cloud Security Broker at RSA 2016

CASB, File Sharing

RSA 2016 in San Francisco, was all abuzz with CASB and cloud security products galore. CipherCloud seemed to steal the show floor at RSA, while simultaneously amassing over 10 InfoSecurity Magazine awards (including the Grand Trophy) – as we unveiled the NEW Cloud Security Broker and CipherCloud Trust Platform. The film crew from Trilogy Tech Talk noticed the buzz and stopped by to …

Video source missing

ChalkTalk: File Sharing and Collaboration Overview

CASB, File Sharing

ChalkTalk Video: File Sharing and Collaboration – What You Need to Know Back by popular demand, this ChalkTalk video by Ankur Shah, Sr. Director of Products, covers “What you need to know about file sharing and collaboration”. Watch this 3 minute video to learn: What classes of applications must enterprises look to protect? Why is it important to protect these …

Cloud File Sharing: Big Rewards — and Big Risks

CASB

Nearly every business runs 24×7 these days. Employees need to be able to access corporate documents even when they’re not at the office. Projects can’t succeed without a collaborative effort across internal and external participants. So companies need ways to make file sharing both easy and safe. Cloud collaboration is easy, and employees love it: they can access files from …

CASB, PII, PCI

Use a CASB to Protect Your PII and PCI No Matter Where It Is or How It Got There

CASB

Data is everywhere. It’s in databases, both behind your firewalls and in the cloud. It’s in documents downloaded onto employee phones and tablets. It’s in files shared with third-parties via file sharing systems. Personal Identifiable Information (PII) and Payment Card Information (PCI) is found in files and databases and can leak to all these places. And that’s just when it’s …

3 Key Factors for Data Privacy & Enterprise Cloud Adoption

cloud data privacy

When it comes to enterprise cloud adoption, one critical risk area to understand is cloud data privacy. IT and security professionals need to evaluate the relative privacy risk of various cloud solutions in order to select the best option for their organizations. Evaluating a range of cloud data privacy risks associated with the adoption of enterprise clouds for CRM, ITSM …

Why National Borders and Regulations are not Enough to Ensure Cloud Data Privacy

cloud data privacy

Concerns about government agencies’ surveillance of private corporations’ digital data and communications have been top of mind since U.S. government passed the Patriot Act in the wake of the 9/11 terrorist attacks. Add Edward Snowden blowing the lid off National Security Agency (NSA) domestic spying activities in 2013, and cases like the U.S. Department of Justice search warrant seeking access …

4 pillars CASB Checklist

Pillars to Lean On: Self-Evaluation & Checklist When Evaluating CASB

CASB

If you aren’t thinking about deploying a cloud access security broker (CASB), you may be falling behind the technology curve. Gartner predicts that 85% of large enterprises will be using CASB by 2020. That’s because the growth of cloud usage is exponential, along with the associated security risks. While cloud providers offer tools to manage access and a smaller number …

6 steps eu safe harbor

6 Steps to Take Now that EU Safe Harbor Is Not the Only Game In Town

EU Safe Harbor

When the European Court of Justice invalidated the EU Safe Harbor framework, it put all data transfers based on Safe Harbor self-certification in legal limbo. While the ruling doesn’t require that those transfers cease, it means there no longer is any legal authorization for those data transfers. Without Safe Harbor, gaining approval for data transfers from the EU requires approval …

2015 Most Popular Cloud Security Blogs – Keep Up with What’s Hot

Cloud Security

Keeping up with what’s happening in the technology industry is a lot of work – and time-consuming! There’s an endless stream of newsletters, journals, blog posts, and press releases. How do you know what’s important enough to read? One way is to save time and brush up on what everyone elseis reading. At least that way, you can know what they know …