Preventing Data Exfiltration in File Sharing and Mobile Collaboration

Posted by Ankur Panchbudhe on September 8 2014

Smartphones and tablets are proliferating at record rate. Across the world, enterprises are embracing workforce mobility via either company-provided devices or via employee-owned devices through formal Bring-Your-Own-Device (BYOD) programs. Both the scenarios increase the risk of data exfiltration because employees get more and more ways to access, store and share sensitive data. These risks are bigger than ever because mobile devices are far less secure than traditional corporate managed desktops and laptops.

In addition to mobility, the use of consumer file sync and share solutions, like Dropbox and Hightail, by corporate users has further increased exfiltration risks. Increasingly, enterprises are now blocking or discouraging these personal services for official use and are deploying enterprise-class file sync and share (Gartner calls it EFSS) for managing sharing and collaboration, and securing data on mobile devices, as an alternative to services like Dropbox. But, most EFSS offerings today lack data access controls and Data Loss Prevention (DLP) capabilities that can be used to mitigate data exfiltration risks.

Vaultize takes a holistic approach towards file sharing, mobile collaboration and remote access. Its built-in Enterprise Mobility Management (EMM) and DLP capabilities ensure end-to-end security, control and visibility – not available in any of the EFSS competition. To prevent data exfiltration, Vaultize allows IT administrators to implement DLP policies and access controls. DLP policies ensure that corporate contents do not go beyond the virtual perimeter of the enterprise. The access control policies will guarantee that only authorized persons have access to the corporate information and that too from authorized devices and/or locations.

Continuing with our holistic approach, Vaultize will be soon adding Digital/Information Rights Management (DRM / IRM) into the platform to further strengthen the control over documents accessed and shared through file sharing and anywhere access methods.

Topics: Solutions, Product

Subscribe To The Blog