4. What we do for you?
ISP: Launch Own Branded Enterprise File Fabric Offering with any storage
combination.
Education establishment: Provides controlled secure access to federated on-
cloud and on-premises data.
For Enterprise: Unify and protect data. Set common policies and audit points.
Share files securely. Search across files. Protect files on-cloud and on-premises
using encryption. Use an a means for federation and digital transformation
For companies embracing Object Storage: Can be used to transition legacy
storage assets to Object Storage in the context of a wider infrastructure
modernisation project.
Why SME?
Centralized access to multiple on-premises
and cloud-based systems through a unified,
“single-pane-of-glass” view, from any device
and any location enhancing user productivity
Promotes Security and Compliance across all
data sets through policies
Enterprise-grade security and encryption for
rigorous data security and compliance needs.
Enable users to collaborate as a team and with
external companies easily and effectively
Same folder access across geographic regions
using SME Cluster technology
5. The Solution
• Use OpenIO SDS with mobile & desktop apps
• Centralize Data Governance & Security Policies
• In-House Enterprise File Sync and Share
• Multi-provider Data Access and Migration
Storage Made Easy provides a File Fabric across local and
cloud storage for governance & collaboration.
Google
Dropbox
9. Subject Access Requests
• Rules changed
• 30 days to comply
• No charge
Consent
• Must be explicit / verifiable
• Is not forever
Privacy / Consent notices
• Must be updated
• Must be explicit
Data Breach
• New breach notification
requirement
• Breach reporting failure
results in a fine also
Processing Data
• What is legal basis?
• Explain in Privacy notice
• Explain in Subject
Access requestIndividual Rights
Rights erase / correct
GDPR – what else?
15. Unified Policy enforcement across corporate data
• Company data is spread across silos
- On premise in filesystems and corporate apps
- And now in cloud storage and SaaS applications
• GDPR Challenge
- Vendors control data security
- No control over physical location of data
- Difficult for IT to enforce policies
• Control of data shared outside of company
- 65% of users use unsanctioned file sharing tools
- How does IT enforce encryption, sharing or retention policies?
- How do companies track who shared or downloaded assets?
Google
Dropbox
Private
cloud
16. Secure File Sharing
• Password protected
• Time Expiry
• Limit downloads
User Controlled encryption
• AES-256
• VaultAudit
• Excel Compliance hand-off
• Output to Syslog format
• Folder & action monitoring
Cloud Governance
• Set Policies
• Control all sharing features
• GEO IP Controls
File versioning, Locking,
Trash
Legal Hold
DLP
Governance and Compliance features for all data