Privacy and Security

Extending Office 365 Functionality into a Hybrid-IT Infrastructure

How to add hybrid-IT zero-trust access, enhanced security, IT control and improved productivity to Office 365   What is Office? Microsoft Office […]

DETAIL

How to Enable Your Remote Workforce with Zero Trust-By-Design

How to Enable Your Remote Workforce with Zero Trust-By-Design Instead of Traditional VPN The movement to enabling the remote workforce has now […]

DETAIL

How to Mitigate Spear-Phishing via FileFlex Enterprise Zero Trust

How to Mitigate Spear-Phishing via the FileFlex Enterprise Zero Trust Platform   FileFlex Enterprise is a remote access, sharing and collaboration platform built [...]
DETAIL

FileFlex Enterprise is the Best Alternative to Varonis DatAnywhere

Varonis DatAnywhere will enter End of Life (EOL) in February 2020.   That means that organizations that use DatAnywhere need to look for [...]
DETAIL

The CLOUD Act and the Importance of Keeping Data On-Premises

The U.S. government has announced its first bilateral agreement of the CLOUD Act with the U.K, This agreement will allow the U.K. […]

DETAIL

What is Centralized vs Decentralized Cloud Storage?

The FileFlex decentralized cloud or edge computing architecture differentiates it from the centralized model used by all other file remote access, sharing […]

DETAIL

How to Prevent Secret Data Exfiltration Inherent to Cloud Storage Solutions

What is the CLOUD Act? In order to combat the international nature of 21st century crime and make investigations by law enforcement […]

DETAIL

Addressing Cloud Computing Security Issues and Challenges – Part 3

Addressing cloud computing security issues and challenges is a complex subject and this series of blog posts barely scratches the surface.  It […]

DETAIL

Addressing Cloud Security Issues – The Better Way – Part 2

Addressing cloud security issues can be daunting. In the first post of this series we saw that the cloud is simply a […]

DETAIL

Addressing Security Issues In Cloud Computing – The Better Way – Part 1

Addressing privacy and security issues in cloud computing is a complex topic, but one thing is for certain – copying your stuff […]

DETAIL