SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
Vaultize Cloud
Technical Details
Vaultize – Quick View
Enterprise Platform for Secure File Sharing (EFSS)
and Anywhere Access with:
• Mobile Content Management (MCM)
• Data Protection
• Data Loss Prevention (DLP)
• Mobile Device Management (MDM) feaures
‘Innovation Leadership in Enterprise File Sync and
Share (EFSS)’ – 2013
‘Innovation Leadership in Enterprise Mobility
Security’ - 2014
Vaultize, What it is…
Enterprise Platform for Enabling Secure Sharing,
Anywhere Access and Mobile Collaboration
with
End-to-End Data Security
and
Flexible Deployment Options
Enables a variety of solutions:
File Sharing & Sync, Managed Data Mobility,
BYOD, Secure Anywhere Access, Data Loss
Protection, …
VPN not required
Choice of Appliance, On-premise,
Private Cloud or Public Cloud –
All highly scalable and available
How Vaultize Differentiates
Why Vaultize? Part I
Large enterprises including those in regulated and security
conscious verticals across the globe trust Vaultize
Unmatched End-to-end Security
•  Encryption and de-duplication together at source (on user devices) for on-
transit data, - patent pending technology
•  The most secure and efficient solution – VPN-free
•  Others either perform encryption at or de-duplication on user device (and not
both) – compromising either security or efficiency
Privacy and Compliance
•  Corporate IT can own and manage keys - Data Privacy Option (DPO)
o  Regulatory compliance (data residency or data sovereignty)
o  Data in-transit and while stored in the cloud/server is risk-free (Complete privacy)
o  No risk of the vendor giving out your data to authorities without your consent
(Subpoena)
How Vaultize Differentiates
Why Vaultize? Part II
Enterprise Platform
•  Architected from the ground up as an enterprise platform
•  Complete end-to-end regulator-level enhanced security and privacy
•  Competitors are built as point products
Complete Administrative Control and Visibility
•  Devices can be fenced off, features disabled, or contents securely wiped
out, if the users go beyond a pre-defined geography or IP range
•  MCM controls - copy/paste, printing and emailing
How Vaultize Differentiates
Why Vaultize? Part III
Efficiency – Optimized for Mobility
•  VPN-free
o  builds a secure channel using patent-pending at-source encryption technology,
SSL and OAuth-based authorization
•  Global content-aware de-duplication
o  as high as 90% reduction in network bandwidth
Flexible Deployment Options
•  Cloud-in-a-Box - Appliance
•  Private Cloud – Software Only
o  Perpetual License
o  Annual Subscription
•  Public Cloud - SaaS
Vaultize Architectural Components
•  This presentation covers Vaultize Public Cloud hosted on
Amazon Web Services
•  Private cloud deployments follow a similar architecture
•  Vaultize Cloud
•  Load Balancers
•  API (REST) Servers
•  Meta-data (Database) Servers
•  Content Store (Amazon S3)
•  WebUI Servers
•  Client Components
•  Vaultize Agent (Windows, Mac, Linux)
•  Vaultize Apps (iOS, Android)
•  Centralized Web-based Administration
•  Web GUI
Architectural Components
Copyright © 2011-14 Vaultize Technologies. All Rights Reserved.
Content
Store
Vaultize
Clients
API
Load Balancers
WebUI
Load Balancers
API
Servers
WebUI
Servers
Meta-data
Servers
SSL + Oauth
HTTPS
Encryption
De-duplication
Compression
Versioning
Vaultize Load Balancers
•  Ensures high availability & responsiveness of servers
•  Routes traffic to API and WebUI servers (separate LBs)
•  Weighted least connections algorithm
•  Health check of servers
•  HTTPS monitoring
•  Application-level monitoring
Vaultize API Servers (1)
  Vaultize API servers expose a JSON-based REST-ful API
  Stateless servers – load balancing is easy
  Clients make secure API calls to server
  Using HTTPS – 256-bit SSL
  Each API call has to be authorized using Oauth
  Unauthorized calls rejected, but recorded
  Repeated unauthorized calls result in investigation and/or ban
  Server platform
  Typically virtual machine based
  Multiple NICs
  Stateless, so storage could be normal disks
  Firewalled to allow only API traffic
  Customized and hardened CentOS 6.x
  Continuously auto-monitored (see next slide)
Vaultize API Servers (2)
  Web server is nginx
  Lightweight, high-performance and robust
  Application server is in web.py framework
  Interaction with nginx using WSGI
  Some modules are in pure C for performance reasons
  Monitoring & Statistics
  Internal - using monit, cron scripts etc.
  External - using health monitor in Load Balancers and other
servers
  Third-party - using partner services
  Also used for automatic load handling (see below)
  Dynamic load handling and provisioning
  Additional servers provisioned when load increases
  Bad servers restarted
  Amazon Cloudwatch in AWS
Vaultize Database Servers
  Vaultize meta-data is stored in MongoDB
  Scalable & high performance “document” database
  Built-in replication and high availability
  Auto-sharding for load balancing
  Cluster of database servers
  Servers added as database grows
  Each server in a 3-way replica set
  Periodically backed up
Vaultize Content Store
  Data chunks are stored in Amazon S3 in public cloud
  Additional encryption using Vaultize secret keys before storing
  High-performance online storage (increase on-demand)
  Redundant (minimum 3-way) storage
  At-least 3 different devices across multiple zones
  Support for Azure Block Storage, Rackspace CloudFiles
and file systems too
Vaultize Cloud Web UI
  Web-based UI servers
o  Powerful administration interface
o  Simple end-user UI for accessing and sharing their data
  System & hardware configuration similar to API servers
  Pages are standards-compliant
  Generated using Mako Templating Engine
  HTML,CSS and JavaScript (jQuery)
  Tested/debugged using Firebug, Google Page Speed, etc.
  Some pages use AJAX
  E.g. Files Browser, validations
  Data exchanges in JSON (and not XML)
Vaultize Client Components
  Vaultize Agent
  Talks to API Servers over HTTPS and Oauth
  Maintains access rights and restrictions
  Keeps device in sync for configuration, policies etc.
  Performs encryption, smart de-duplication, versioning and
compression
  256-bit AES encryption at source (on client device itself) using unique
customer keys
  Chunking is variable-sized using sliding window technique
  Signatures are HMAC (SHA-256) keyed using unique customer tokens
  Compression using zlib
  Predictive Caching (for instant restore of important data)
  Monitors changes to data under sync, collaboration, sharing
  Book keeping done using SQLite
  Platform Independent
  Written in Python and pure C
  Windows, Mac and Linux
Vaultize Compatibility
  Works on laptops, desktops and servers
  Supported on Windows (XP SP2 onwards), Mac and Linux
  iOS and Android Apps
Vaultize
Solution Details
Vaultize Solutions
Secure Enterprise File Sharing & Sync (EFSS)
Sharing using secure links
•  Easy sharing with outside party
•  No FTP sites or email attachments
•  Passwords, auto expiry, notifications
•  Online document viewer – control download/printing etc.
•  Geo, IP and time based access control
Outlook Plug-in
•  Replace attachments with secure link
•  Policy-based – size of attachments, recipients, sender, etc.
•  Monitoring, Revoking
Group sharing – with individual access rights
Sync data anywhere, selectively
Automatic versioning
Vaultize Solutions
VPN-free Secure Anywhere Access
(File Server Access)
•  Securely access File Servers and NAS from anywhere
•  Access with CIFS semantics
•  Pass-through Mode – secure relaying of files
•  Access control on server
•  Geo, IP, time based
•  No VPN required!
•  Support for SharePoint and other repositories coming soon
Vaultize Solutions
Mobile Content Management (MCM)
Challenges with Mobile Device Management (MDM)
•  Complex
•  Costly
•  Heavy handed – controls device (privacy intrusion)
Vaultize Secures Corporate Contents through Mobile Content
Management (MCM)
•  Control copy-paste, print, email, sharing with other apps, etc.
•  Built-in document editor – MS office and PDF annotation
Mobile Data Containerization
•  Corporate data in secure container
•  Segregate corporate data from personal data
•  Encryption and remote wiping of container
•  Auto-wiping based on Geo, IP, time-expiry
Vaultize Solutions
Data Protection (Endpoint Backup)
  Protection policies to automatically backup files and folders
Group-based policies
•  Powerful Exclude and Include filters
  Efficient backup of endpoints over WAN without VPN
•  Smart De-duplication saves up to 90% bandwidth
  Continuous or Scheduled backup with pause and resume
  Web and Mobile access
  Self-restore
•  a version, a folder or a point in time copy and move all data from an old
device to a new device
  Support for open files (including Outlook PST)
•  Optimized backup of large size PST
Vaultize Solutions
Google Apps
Backup Google Apps Accounts – Emails and Documents
•  Secure Google Apps data (emails/documents) from malicious
destruction, hacking, user/software errors
•  Automatic Backup
•  Backup once-a-day (default) or as scheduled
•  Retention Policy
•  Super saving (de-dup across endpoints + Google Apps)
Easy Download
•  Download/restore a mail, document or a complete account
Migration
•  Migrate accounts within a domain or across domains
Vaultize Solutions
Data Loss Prevention (DLP)
Endpoint Encryption
•  Policy-based on files and folders on user devices
•  Transparent to users
•  Selective - more efficient than full disk encryption which is
•  Leverages time-proven technology of
Windows Encrypting File System (EFS)
Tracking
•  Geo tracking - IP addresses and geo-locations
Wiping
•  Secure remote wiping of data in case of device loss or user leaving the
organization
•  Policy-based automatic wiping if device leaves a pre-defined geography or IP
range (Geo fencing)
•  Military-grade techniques
•  Selective wiping of files and folders based on patterns and types
Selective encryption and wiping make it very easy to do BYOD
through data containerization
Vaultize Solutions
Data Privacy Option (DPO)
Compliance of Data Privacy, Data Residency
and Data Protection Regulations
No Need of Any Special Hardware On-Premise
(like Gateway Appliances)
Enterprise Customer Retains the Full Control Over Encryption
Keys
•  Keys are never stored on any infrastructure not under enterprise control
•  Data is secured while in motion and at rest in the cloud
•  Ability to access data remains solely with the customer
Vaultize is the only solution that provides this option
•  Other solutions encrypt data at server
Enterprise-class Administration
Administrative Controls
•  Manage company-wide policies, settings and data
•  User provisioning – Active Directory, LDAP or Google Apps
based
•  Push policies from a centralized place
•  Authentication and SSO using AD and LDAP
•  Privacy
Quick and Easy Deployment Across Organization
•  Active Directory GPO based push installation
•  AD and LDAP authentication support
Reporting and Dashboard
Monitoring, Audit Trail and Alerts
Flexible Deployment Options
Cloud-in-a-box Appliance
•  Fully integrated hardware + software – “plug and play”
•  Support for HA and DR
•  Licensed by number of users and storage capacity
On premise / Private Cloud
•  Vaultize software on customer’s hardware or private cloud
•  Single or Multi-server
•  HA, DR and large scale cloud
•  Flexibility to choose storage (DAS, SAN, NAS, Cloud Storage)
•  Option of Perpetual license or Annual subscription
•  Licensing based on number of users
Vaultize as a Hosted Service / Public Cloud
•  Fully hosted - No hardware or software to manage
•  Highly available, highly scalable and disaster proof
•  Subscription based on users and storage capacity
How Vaultize Works in a Corporate Network
Agent-based
Agent-less
• File Sharing & Sync
• Group sharing
• Sharing using links
• Auto Expiry
• Passwords
• Mobility & Mobile Content Mgmt
• Anywhere Access
• File Servers & NAS
• Access Control
• Geo, IP & time
• File/folder patterns
• BYOD
• Data Loss Protection
• Backup, Encryption
• Remote Wiping
• Centralized Admin Console
• Reporting
• Monitoring
• Alerts
Mobiles
Intranet or
Internet
Versioning Encryption Dedupe MCM
NAS Roaming Devices
End-to-End Security
(VPN not required)
Encryption
At Source
Decryption
At Destination
Firewall+VPN
sales@vaultize.com
http://www.vaultize.com
THANK YOU!
Questions?

Más contenido relacionado

La actualidad más candente

Cloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMSCloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMSMorgan Simonsen
 
Globus High Assurance for Protected Data (GlobusWorld Tour - Columbia Univers...
Globus High Assurance for Protected Data (GlobusWorld Tour - Columbia Univers...Globus High Assurance for Protected Data (GlobusWorld Tour - Columbia Univers...
Globus High Assurance for Protected Data (GlobusWorld Tour - Columbia Univers...Globus
 
AWS Summit Auckland - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland  - Running your Enterprise Windows Workload on AWSAWS Summit Auckland  - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland - Running your Enterprise Windows Workload on AWSAmazon Web Services
 
Building Multi-tenant SaaS Applications using WSO2 Private PaaS
Building Multi-tenant SaaS Applications using WSO2 Private PaaSBuilding Multi-tenant SaaS Applications using WSO2 Private PaaS
Building Multi-tenant SaaS Applications using WSO2 Private PaaSSameera Jayasoma
 
Log insight 3.3 customer presentation
Log insight 3.3 customer presentationLog insight 3.3 customer presentation
Log insight 3.3 customer presentationDavid Pasek
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudNeelkamal Gaharwar
 
History of Windows Server
History of Windows ServerHistory of Windows Server
History of Windows Serversundas Shabbir
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud SecurityMongoDB
 
Building a Cloud Offering: Perspectives from Two MSPs
Building a Cloud Offering: Perspectives from Two MSPsBuilding a Cloud Offering: Perspectives from Two MSPs
Building a Cloud Offering: Perspectives from Two MSPsCA Nimsoft
 
Azure with citrix by bipeen sinha
Azure with citrix by bipeen sinhaAzure with citrix by bipeen sinha
Azure with citrix by bipeen sinhaBipeen Sinha
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
Informix into the future13 july2017
Informix into the future13 july2017Informix into the future13 july2017
Informix into the future13 july2017Shawn Moe
 
Tokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, AugustTokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, AugustKanio Dimitrov
 
Azure Storage – Foundation for Building Secure, Scalable Cloud Applications
Azure Storage – Foundation for Building Secure, Scalable Cloud ApplicationsAzure Storage – Foundation for Building Secure, Scalable Cloud Applications
Azure Storage – Foundation for Building Secure, Scalable Cloud ApplicationsMicrosoft Tech Community
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataAidan Finn
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Amazon Web Services
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsBizTalk360
 
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloudKoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloudTobias Koprowski
 

La actualidad más candente (20)

Cloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMSCloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMS
 
Globus High Assurance for Protected Data (GlobusWorld Tour - Columbia Univers...
Globus High Assurance for Protected Data (GlobusWorld Tour - Columbia Univers...Globus High Assurance for Protected Data (GlobusWorld Tour - Columbia Univers...
Globus High Assurance for Protected Data (GlobusWorld Tour - Columbia Univers...
 
Azure security
Azure  securityAzure  security
Azure security
 
AWS Summit Auckland - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland  - Running your Enterprise Windows Workload on AWSAWS Summit Auckland  - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland - Running your Enterprise Windows Workload on AWS
 
Building Multi-tenant SaaS Applications using WSO2 Private PaaS
Building Multi-tenant SaaS Applications using WSO2 Private PaaSBuilding Multi-tenant SaaS Applications using WSO2 Private PaaS
Building Multi-tenant SaaS Applications using WSO2 Private PaaS
 
Log insight 3.3 customer presentation
Log insight 3.3 customer presentationLog insight 3.3 customer presentation
Log insight 3.3 customer presentation
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloud
 
History of Windows Server
History of Windows ServerHistory of Windows Server
History of Windows Server
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud Security
 
Building a Cloud Offering: Perspectives from Two MSPs
Building a Cloud Offering: Perspectives from Two MSPsBuilding a Cloud Offering: Perspectives from Two MSPs
Building a Cloud Offering: Perspectives from Two MSPs
 
Azure with citrix by bipeen sinha
Azure with citrix by bipeen sinhaAzure with citrix by bipeen sinha
Azure with citrix by bipeen sinha
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Security OF The Cloud
Security OF The CloudSecurity OF The Cloud
Security OF The Cloud
 
Informix into the future13 july2017
Informix into the future13 july2017Informix into the future13 july2017
Informix into the future13 july2017
 
Tokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, AugustTokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, August
 
Azure Storage – Foundation for Building Secure, Scalable Cloud Applications
Azure Storage – Foundation for Building Secure, Scalable Cloud ApplicationsAzure Storage – Foundation for Building Secure, Scalable Cloud Applications
Azure Storage – Foundation for Building Secure, Scalable Cloud Applications
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s Assets
 
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloudKoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
 

Similar a Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)

DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTION
DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTIONDELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTION
DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTIONiSAP Solutions Pvt. Ltd.
 
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)Michael Fork
 
Enterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataEnterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataSoftControl.net Ltd.
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...ILYA ROITMAN
 
The Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft AzureThe Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft AzureMicrosoft Azure
 
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...Amazon Web Services
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterStorage Switzerland
 
Modernize Your Network Shares
Modernize Your Network SharesModernize Your Network Shares
Modernize Your Network SharesAxway
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
hcp-anywhere-enterprise-customer-v2.pptx
hcp-anywhere-enterprise-customer-v2.pptxhcp-anywhere-enterprise-customer-v2.pptx
hcp-anywhere-enterprise-customer-v2.pptxAbhishek Vachher
 
Introduction to Globus for New Users (GlobusWorld Tour - Columbia University)
Introduction to Globus for New Users (GlobusWorld Tour - Columbia University)Introduction to Globus for New Users (GlobusWorld Tour - Columbia University)
Introduction to Globus for New Users (GlobusWorld Tour - Columbia University)Globus
 
Introduction to Globus for New Users (GlobusWorld Tour - UCSD)
Introduction to Globus for New Users (GlobusWorld Tour - UCSD)Introduction to Globus for New Users (GlobusWorld Tour - UCSD)
Introduction to Globus for New Users (GlobusWorld Tour - UCSD)Globus
 
SoftLayer Storage Services Overview
SoftLayer Storage Services OverviewSoftLayer Storage Services Overview
SoftLayer Storage Services OverviewMichael Fork
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing OverviewSean Connolly
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesPT Datacomm Diangraha
 
AWS Webcast - Amazon work spaces public sector webinar
AWS Webcast - Amazon work spaces public sector webinarAWS Webcast - Amazon work spaces public sector webinar
AWS Webcast - Amazon work spaces public sector webinarAmazon Web Services
 
Storage and Archiving Options on AWS
Storage and Archiving Options on AWS Storage and Archiving Options on AWS
Storage and Archiving Options on AWS Amazon Web Services
 
Introduction to Azure for SMB partners
Introduction to Azure for SMB partnersIntroduction to Azure for SMB partners
Introduction to Azure for SMB partnersRobert Crane
 

Similar a Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS) (20)

DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTION
DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTIONDELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTION
DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTION
 
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
 
Enterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataEnterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing data
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
 
The Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft AzureThe Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft Azure
 
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
 
IT Resilience Use Case
IT Resilience Use CaseIT Resilience Use Case
IT Resilience Use Case
 
Modernize Your Network Shares
Modernize Your Network SharesModernize Your Network Shares
Modernize Your Network Shares
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
hcp-anywhere-enterprise-customer-v2.pptx
hcp-anywhere-enterprise-customer-v2.pptxhcp-anywhere-enterprise-customer-v2.pptx
hcp-anywhere-enterprise-customer-v2.pptx
 
Iaas storage-170302090824
Iaas storage-170302090824Iaas storage-170302090824
Iaas storage-170302090824
 
Introduction to Globus for New Users (GlobusWorld Tour - Columbia University)
Introduction to Globus for New Users (GlobusWorld Tour - Columbia University)Introduction to Globus for New Users (GlobusWorld Tour - Columbia University)
Introduction to Globus for New Users (GlobusWorld Tour - Columbia University)
 
Introduction to Globus for New Users (GlobusWorld Tour - UCSD)
Introduction to Globus for New Users (GlobusWorld Tour - UCSD)Introduction to Globus for New Users (GlobusWorld Tour - UCSD)
Introduction to Globus for New Users (GlobusWorld Tour - UCSD)
 
SoftLayer Storage Services Overview
SoftLayer Storage Services OverviewSoftLayer Storage Services Overview
SoftLayer Storage Services Overview
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing Overview
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
AWS Webcast - Amazon work spaces public sector webinar
AWS Webcast - Amazon work spaces public sector webinarAWS Webcast - Amazon work spaces public sector webinar
AWS Webcast - Amazon work spaces public sector webinar
 
Storage and Archiving Options on AWS
Storage and Archiving Options on AWS Storage and Archiving Options on AWS
Storage and Archiving Options on AWS
 
Introduction to Azure for SMB partners
Introduction to Azure for SMB partnersIntroduction to Azure for SMB partners
Introduction to Azure for SMB partners
 

Último

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Último (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)

  • 2. Vaultize – Quick View Enterprise Platform for Secure File Sharing (EFSS) and Anywhere Access with: • Mobile Content Management (MCM) • Data Protection • Data Loss Prevention (DLP) • Mobile Device Management (MDM) feaures ‘Innovation Leadership in Enterprise File Sync and Share (EFSS)’ – 2013 ‘Innovation Leadership in Enterprise Mobility Security’ - 2014
  • 3. Vaultize, What it is… Enterprise Platform for Enabling Secure Sharing, Anywhere Access and Mobile Collaboration with End-to-End Data Security and Flexible Deployment Options Enables a variety of solutions: File Sharing & Sync, Managed Data Mobility, BYOD, Secure Anywhere Access, Data Loss Protection, … VPN not required Choice of Appliance, On-premise, Private Cloud or Public Cloud – All highly scalable and available
  • 4. How Vaultize Differentiates Why Vaultize? Part I Large enterprises including those in regulated and security conscious verticals across the globe trust Vaultize Unmatched End-to-end Security •  Encryption and de-duplication together at source (on user devices) for on- transit data, - patent pending technology •  The most secure and efficient solution – VPN-free •  Others either perform encryption at or de-duplication on user device (and not both) – compromising either security or efficiency Privacy and Compliance •  Corporate IT can own and manage keys - Data Privacy Option (DPO) o  Regulatory compliance (data residency or data sovereignty) o  Data in-transit and while stored in the cloud/server is risk-free (Complete privacy) o  No risk of the vendor giving out your data to authorities without your consent (Subpoena)
  • 5. How Vaultize Differentiates Why Vaultize? Part II Enterprise Platform •  Architected from the ground up as an enterprise platform •  Complete end-to-end regulator-level enhanced security and privacy •  Competitors are built as point products Complete Administrative Control and Visibility •  Devices can be fenced off, features disabled, or contents securely wiped out, if the users go beyond a pre-defined geography or IP range •  MCM controls - copy/paste, printing and emailing
  • 6. How Vaultize Differentiates Why Vaultize? Part III Efficiency – Optimized for Mobility •  VPN-free o  builds a secure channel using patent-pending at-source encryption technology, SSL and OAuth-based authorization •  Global content-aware de-duplication o  as high as 90% reduction in network bandwidth Flexible Deployment Options •  Cloud-in-a-Box - Appliance •  Private Cloud – Software Only o  Perpetual License o  Annual Subscription •  Public Cloud - SaaS
  • 7. Vaultize Architectural Components •  This presentation covers Vaultize Public Cloud hosted on Amazon Web Services •  Private cloud deployments follow a similar architecture •  Vaultize Cloud •  Load Balancers •  API (REST) Servers •  Meta-data (Database) Servers •  Content Store (Amazon S3) •  WebUI Servers •  Client Components •  Vaultize Agent (Windows, Mac, Linux) •  Vaultize Apps (iOS, Android) •  Centralized Web-based Administration •  Web GUI
  • 8. Architectural Components Copyright © 2011-14 Vaultize Technologies. All Rights Reserved. Content Store Vaultize Clients API Load Balancers WebUI Load Balancers API Servers WebUI Servers Meta-data Servers SSL + Oauth HTTPS Encryption De-duplication Compression Versioning
  • 9. Vaultize Load Balancers •  Ensures high availability & responsiveness of servers •  Routes traffic to API and WebUI servers (separate LBs) •  Weighted least connections algorithm •  Health check of servers •  HTTPS monitoring •  Application-level monitoring
  • 10. Vaultize API Servers (1)   Vaultize API servers expose a JSON-based REST-ful API   Stateless servers – load balancing is easy   Clients make secure API calls to server   Using HTTPS – 256-bit SSL   Each API call has to be authorized using Oauth   Unauthorized calls rejected, but recorded   Repeated unauthorized calls result in investigation and/or ban   Server platform   Typically virtual machine based   Multiple NICs   Stateless, so storage could be normal disks   Firewalled to allow only API traffic   Customized and hardened CentOS 6.x   Continuously auto-monitored (see next slide)
  • 11. Vaultize API Servers (2)   Web server is nginx   Lightweight, high-performance and robust   Application server is in web.py framework   Interaction with nginx using WSGI   Some modules are in pure C for performance reasons   Monitoring & Statistics   Internal - using monit, cron scripts etc.   External - using health monitor in Load Balancers and other servers   Third-party - using partner services   Also used for automatic load handling (see below)   Dynamic load handling and provisioning   Additional servers provisioned when load increases   Bad servers restarted   Amazon Cloudwatch in AWS
  • 12. Vaultize Database Servers   Vaultize meta-data is stored in MongoDB   Scalable & high performance “document” database   Built-in replication and high availability   Auto-sharding for load balancing   Cluster of database servers   Servers added as database grows   Each server in a 3-way replica set   Periodically backed up
  • 13. Vaultize Content Store   Data chunks are stored in Amazon S3 in public cloud   Additional encryption using Vaultize secret keys before storing   High-performance online storage (increase on-demand)   Redundant (minimum 3-way) storage   At-least 3 different devices across multiple zones   Support for Azure Block Storage, Rackspace CloudFiles and file systems too
  • 14. Vaultize Cloud Web UI   Web-based UI servers o  Powerful administration interface o  Simple end-user UI for accessing and sharing their data   System & hardware configuration similar to API servers   Pages are standards-compliant   Generated using Mako Templating Engine   HTML,CSS and JavaScript (jQuery)   Tested/debugged using Firebug, Google Page Speed, etc.   Some pages use AJAX   E.g. Files Browser, validations   Data exchanges in JSON (and not XML)
  • 15. Vaultize Client Components   Vaultize Agent   Talks to API Servers over HTTPS and Oauth   Maintains access rights and restrictions   Keeps device in sync for configuration, policies etc.   Performs encryption, smart de-duplication, versioning and compression   256-bit AES encryption at source (on client device itself) using unique customer keys   Chunking is variable-sized using sliding window technique   Signatures are HMAC (SHA-256) keyed using unique customer tokens   Compression using zlib   Predictive Caching (for instant restore of important data)   Monitors changes to data under sync, collaboration, sharing   Book keeping done using SQLite   Platform Independent   Written in Python and pure C   Windows, Mac and Linux
  • 16. Vaultize Compatibility   Works on laptops, desktops and servers   Supported on Windows (XP SP2 onwards), Mac and Linux   iOS and Android Apps
  • 18. Vaultize Solutions Secure Enterprise File Sharing & Sync (EFSS) Sharing using secure links •  Easy sharing with outside party •  No FTP sites or email attachments •  Passwords, auto expiry, notifications •  Online document viewer – control download/printing etc. •  Geo, IP and time based access control Outlook Plug-in •  Replace attachments with secure link •  Policy-based – size of attachments, recipients, sender, etc. •  Monitoring, Revoking Group sharing – with individual access rights Sync data anywhere, selectively Automatic versioning
  • 19. Vaultize Solutions VPN-free Secure Anywhere Access (File Server Access) •  Securely access File Servers and NAS from anywhere •  Access with CIFS semantics •  Pass-through Mode – secure relaying of files •  Access control on server •  Geo, IP, time based •  No VPN required! •  Support for SharePoint and other repositories coming soon
  • 20. Vaultize Solutions Mobile Content Management (MCM) Challenges with Mobile Device Management (MDM) •  Complex •  Costly •  Heavy handed – controls device (privacy intrusion) Vaultize Secures Corporate Contents through Mobile Content Management (MCM) •  Control copy-paste, print, email, sharing with other apps, etc. •  Built-in document editor – MS office and PDF annotation Mobile Data Containerization •  Corporate data in secure container •  Segregate corporate data from personal data •  Encryption and remote wiping of container •  Auto-wiping based on Geo, IP, time-expiry
  • 21. Vaultize Solutions Data Protection (Endpoint Backup)   Protection policies to automatically backup files and folders Group-based policies •  Powerful Exclude and Include filters   Efficient backup of endpoints over WAN without VPN •  Smart De-duplication saves up to 90% bandwidth   Continuous or Scheduled backup with pause and resume   Web and Mobile access   Self-restore •  a version, a folder or a point in time copy and move all data from an old device to a new device   Support for open files (including Outlook PST) •  Optimized backup of large size PST
  • 22. Vaultize Solutions Google Apps Backup Google Apps Accounts – Emails and Documents •  Secure Google Apps data (emails/documents) from malicious destruction, hacking, user/software errors •  Automatic Backup •  Backup once-a-day (default) or as scheduled •  Retention Policy •  Super saving (de-dup across endpoints + Google Apps) Easy Download •  Download/restore a mail, document or a complete account Migration •  Migrate accounts within a domain or across domains
  • 23. Vaultize Solutions Data Loss Prevention (DLP) Endpoint Encryption •  Policy-based on files and folders on user devices •  Transparent to users •  Selective - more efficient than full disk encryption which is •  Leverages time-proven technology of Windows Encrypting File System (EFS) Tracking •  Geo tracking - IP addresses and geo-locations Wiping •  Secure remote wiping of data in case of device loss or user leaving the organization •  Policy-based automatic wiping if device leaves a pre-defined geography or IP range (Geo fencing) •  Military-grade techniques •  Selective wiping of files and folders based on patterns and types Selective encryption and wiping make it very easy to do BYOD through data containerization
  • 24. Vaultize Solutions Data Privacy Option (DPO) Compliance of Data Privacy, Data Residency and Data Protection Regulations No Need of Any Special Hardware On-Premise (like Gateway Appliances) Enterprise Customer Retains the Full Control Over Encryption Keys •  Keys are never stored on any infrastructure not under enterprise control •  Data is secured while in motion and at rest in the cloud •  Ability to access data remains solely with the customer Vaultize is the only solution that provides this option •  Other solutions encrypt data at server
  • 25. Enterprise-class Administration Administrative Controls •  Manage company-wide policies, settings and data •  User provisioning – Active Directory, LDAP or Google Apps based •  Push policies from a centralized place •  Authentication and SSO using AD and LDAP •  Privacy Quick and Easy Deployment Across Organization •  Active Directory GPO based push installation •  AD and LDAP authentication support Reporting and Dashboard Monitoring, Audit Trail and Alerts
  • 26. Flexible Deployment Options Cloud-in-a-box Appliance •  Fully integrated hardware + software – “plug and play” •  Support for HA and DR •  Licensed by number of users and storage capacity On premise / Private Cloud •  Vaultize software on customer’s hardware or private cloud •  Single or Multi-server •  HA, DR and large scale cloud •  Flexibility to choose storage (DAS, SAN, NAS, Cloud Storage) •  Option of Perpetual license or Annual subscription •  Licensing based on number of users Vaultize as a Hosted Service / Public Cloud •  Fully hosted - No hardware or software to manage •  Highly available, highly scalable and disaster proof •  Subscription based on users and storage capacity
  • 27. How Vaultize Works in a Corporate Network Agent-based Agent-less • File Sharing & Sync • Group sharing • Sharing using links • Auto Expiry • Passwords • Mobility & Mobile Content Mgmt • Anywhere Access • File Servers & NAS • Access Control • Geo, IP & time • File/folder patterns • BYOD • Data Loss Protection • Backup, Encryption • Remote Wiping • Centralized Admin Console • Reporting • Monitoring • Alerts Mobiles Intranet or Internet Versioning Encryption Dedupe MCM NAS Roaming Devices End-to-End Security (VPN not required) Encryption At Source Decryption At Destination Firewall+VPN