New Methods to Stop Ransomware Attacks,Security and Storage Finally Create a Sensible Union,Backup's Two-Pronged Response to R

Total Page:16

File Type:pdf, Size:1020Kb

New Methods to Stop Ransomware Attacks,Security and Storage Finally Create a Sensible Union,Backup's Two-Pronged Response to R New Methods to Stop Ransomware Attacks Ransomware represents one of the primary threats every size organization currently faces. The latest surveys reveal the percentage of businesses experiencing ransomware attacks may be higher than anyone initially thought. These statistics suggest it is only matter of when, not if, an organization experiences a ransomware attack. While organizations may first turn to cybersecurity and backup software to prevent and recover from these attacks, new options exist. Among them, email data protection software and object-based networked storage offer organizations new and better ways to respond. The Inevitability of a Ransomware Attack Any organization that assumes (or hopes) it will never experience a ransomware attack better re-think that position. Recent reports reveal as many as 50 percent or more of US organizations have already experienced a ransomware attack. An April 2020 survey published by the Safety Detectives found over 50 percent of US organizations experienced an attack in the past 12 months. A separate Cyber Insurance Claims Report by Coalition found a lower, but still disturbingly high, number of ransomware attacks. It estimated, based upon the number of claims, that 20 percent of all US businesses experienced a ransomware attack. Whether one believes the higher percentage or the lower one, they both illustrate the high number of ransomware attacks. These serve to put organizations on notice to take steps to defend against them. Cybersecurity and Backup Software Good First Steps Cybersecurity and backup software represent two first steps every organization should take. Cybersecurity software may take the form of anti-virus software, firewalls, security incident and event management (SIEM) software. All these forms of cybersecurity software help to detect and prevent a ransomware attack from occurring in the first place. Unfortunately, due to its rapidly changing nature, cybersecurity software cannot catch every strain of ransomware. Odds are some new strain of ransomware will elude detection and detonate. In this scenario, organizations should have backup software in place as a second line of defense to recover encrypted files. The Lingering Challenges The lingering challenges with these two common methods used to defeat ransomware are as follows: Ransomware frequently enters an organization through an email message. Cybersecurity software may not always detect which attachments or links in an email message contain ransomware. Further, many email messages appear to come from legitimate sources. These include banks, government agencies, technology providers, and even from people within the organization. All it takes is one person to inadvertently open a file or click on a link and the ransomware launches. Backups typically only run once a day. Many organizations only back up their data once a day so any data created since the last backup may be lost. Further, depending on the solution, it can take some time to locate and recover the original data. Closing the Data Protection Gap In response to these challenges, organizations now have access to new technologies that help close this data protection gap. They may find these in the following two forms: Email backup software that contains anti-ransomware capabilities. Organizations may deploy email backup software such as SpinOne that detects ransomware, stops it, and even restores encrypted files and emails. Designed to protect G Suite and Office 365 environments, SpinOne represents one of the first solutions to bring together email backup and anti-ransomware capabilities. By deploying it, organizations may detect and stop ransomware at the point where it most likely enters their organization: their email system. Use network attached, object-based storage systems. Organizations of almost all sizes use network attached storage (NAS) for file sharing and data storage. Recently, object-based storage has entered this market offering CIFS and NFS interfaces to facilitate easy and fast deployment. Sometimes perceived as slower than NAS systems, object- based systems have significantly increased their performance in recent years using flash drives. Using flash-powered object-based storage in lieu of NAS systems gives organizations access to some of object-based storage’s more attractive features. Its data immutability and snapshots specifically stand out. These two features help ensure that should ransomware attack, organizations may recover data since the system stores the data in an immutable format. Nasuni stands out as such a solution that enterprises may deploy at scale. Respect Ransomware’s Threat, Do Not Fear It Ransomware rightfully causes concern for organizations of all sizes and they should respect the harm it can do. However, the threat ransomware presents should serve as a motivation for organizations to act. Implementing best practices of cybersecurity and backup software along with these two new technologies from Nasuni and SpinOne equip organizations with a robust defense against ransomware. By implementing these techniques, organizations may move from fearing a ransomware attack to confidently knowing that they are positioned to stop it and recover from it should one occur. Security and Storage Finally Create a Sensible Union Storage and security represent two technologies that have circled each for nearly two decades with negligible success in coming together. That may have finally changed this week. StorMagic’s acquisition of KeyNexus represents a union of security and storage that finally makes sense for everyone involved. Security and Storage: A Dubious History The technology industry has talked about – and attempted to – unite security and storage for at least the past 20 years. In almost all cases, those efforts went mostly for naught. The last few years alone saw providers that once attempted to merge security and storage go their separate ways. The rationale for them uniting in the first place never really panned out. Initially, they envisioned heightened synergies between security and storage. Yet, ultimately, these synergies never came to fruition. Different people in enterprises made the final decisions on each that inhibited their integration. Further, storage technologies often ran in secure, isolated environments, and security solutions did not properly address key management for every environment or workflow. As a result, security did not provide enough value-add to storage or vice versa for them to ever fully unite. Different Environment, Different Requirements Despite security and storage’s problematic past, StorMagic’s acquisition of KeyNexus suddenly makes sense. The logic behind this acquisition stems from the respective environments in which each one operates. The StorMagic SvSAN storage technology operates primarily in edge computing environments. Edge environments differ significantly from core data center environments where enterprises have traditionally deployed storage technologies. In these edge environments, enterprises want their storage to have all the attributes that their core data center technologies possess. They include high availability, reliability, recoverability, manageability, simplicity and scalability, among others. However now, unlike the past, they also include security among the “other” features that they want storage solutions in edge environments to possess. Enterprise Key Management an Edge Storage Requirement Storing data in an edge environment presents a unique security challenge that rarely exists in data center environments. I cannot think of a single instance where I heard of someone walking out of a data center with a server or storage array. Even if it has occurred, it is a rarity. The exact opposite situation exists in edge locations. SvSAN may be deployed into edge environments that have minimal or no security. Further, SvSAN requires only nominal amounts of server hardware to operate – as little as two 1U servers. As a result, anyone can potentially and literally walk off with the entire edge solution – servers, storage and the software within (hypervisor, SvSAN, applications, etc…). While StorMagic SvSAN offers data encryption as an optional feature, that only partially solves the security problem. StorMagic did not natively offer any key management functionality. Further exacerbating the problem, SvSAN often gets deployed into enterprises with dozens, hundreds, or even thousands of locations. Trying to create and manage separate keys in all these locations makes it challenging if not impossible for enterprises to properly implement and manage. Enter SvKMS This situation explains why a storage company’s StorMagic( ) acquisition of a security company (KeyNexus) finally makes sense. The KeyNexus Unified Key Manager, now available as SvKMS, provides enterprises with the key management functionality that their edge locations need. Rather than each edge location needing to assign and manage its own encryption keys, enterprises can centrally deploy SvKMS. Once deployed, they can use it to assign keys to all their SvSAN-based edge locations. Used this way, they can confidently turn on SvSAN’s encryption feature. Using SvKMS, they know they can decrypt data at any of the sites since they have the keys to unlock it. StorMagic’s SvKMS simultaneously solves a larger industry challenge. Encryption is everywhere these days – at the edge, in the datacenter, and in the cloud. StorMagic SvKMS is an Enterprise Key Management system that can manage encryption keys in any and all
Recommended publications
  • Mobile First: Securing Information Sprawl
    Mobile First: Securing Information Sprawl January 2014 Contents: Introduction: Addressing Information Sprawl – The Next Mobile First Challenge 2 1. Mobile First Platform: About Enterprise Mobility Management 4 2. Getting Down to Business: Managing Applications and Content 6 3. Identifying the Right Mobile Content Management Partner 7 4. Securing Information Sprawl Efficiently, Without Compromise 10 5. Designing your solution 11 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 References 15 Fax +1.650.919.8006 [email protected] 1 COPYRIGHT © 2014 MOBILEIRON. ALL RIGHTS RESERVED. Introduction: Addressing Information Sprawl – The Next Mobile First Challenge In a recent survey, “The Mobile Trust Gap,” MobileIron reported that of the 3000 respondents, 80% claimed they are using personal smartphones and tablets for work. In November 2013, 451 Research reported that 41% of enterprises increased spending on Mobile Device Management (MDM) in 2013, with 46% planning to do so in 2014. It’s clear; the question is no longer if but rather when and how businesses will bring mobile devices under management. (For a detailed discussion of how to support a multi-OS mobile device environment, please see our whitepaper: Simplifying the move from BlackBerry to Multi-OS.) So you’ve secured the device. What about the content? Once you have implemented mobile device management (MDM), the next mobile problem to address is information sprawl. Because they increasingly want access to more than just email, business users are taking advantage of the sharing and access capabilities of consumer mobile devices, including app-based cloud services. Workers now use smartphones and tablets as their primary computing endpoints and have high expectations for mobile collaboration capabilities.
    [Show full text]
  • Apps Para Empresas Guía De Primeros Pasos Descubre Apps | Compra Apps | Distribuye Apps | Apps En Acción | Recursos Adicionales
    Apps para empresas Guía de primeros pasos Descubre apps | Compra apps | Distribuye apps | Apps en acción | Recursos adicionales Contenido Miles de apps para el iPad y el iPhone ya están ofreciendo prestaciones revolucionarias que transforman la manera de trabajar de los empleados. El propósito de esta guía es ayudarte a descubrir y seleccionar las apps que pueden aumentar la productividad en tu empresa. También incluye información sobre las opciones para comprar y distribuir apps. Descubre apps 3 Apps en acción 21 Identifica apps para el iPad y Averigua cómo usan las apps otras el iPhone que se adaptan a las empresas para cambiar su forma de necesidades de tu empresa. trabajar. Compra apps 15 Recursos 24 Infórmate sobre las opciones Obtén más información mediante para comprar apps para tu empresa. recursos online. Distribución de aplicaciones 19 Encuentra la mejor forma de distribuir las apps entre tus empleados. Apps para empresas Guía de primeros pasos 2 Descubre apps | Compra apps | Distribuye apps | Apps en acción | Recursos adicionales Descubre apps Explora las siguientes categorías para conocer algunas de las mejores apps para empresas y descubrir las más adecuadas para tus necesidades. Acceso a archivos Gestión de clientes Edición de documentos Análisis de informes Creación de formularios Lluvias de ideas Colaboración Presentaciones Toma de notas Gestión de viajes y gastos Seguimiento, facturación y ventas Consejo rápido Diseñada para el iPad y el iPhone iPad l iPhone Versiones distintas para el iPad y el iPhone Descubre apps | Compra apps | Distribuye apps | Apps en acción | Recursos adicionales Acceso a archivos Cuando estés fuera de la oficina, usa apps para descargar archivos desde un equipo de mesa, un servicio alojado online o un sistema de gestión de contenido corporativo.
    [Show full text]
  • 5 Things You Need to Know About Ipad® in the Enterprise
    WHITE PAPER 5 Things You Need to Know About iPad® in the Enterprise Introduction Without a doubt, iPads® are one of the fastest adopted computing platforms in history. And, not just for consumers desiring to play Angry Birds. These tablets, with an entirely new browsing and usability paradigm, are rapidly making inroads into the enterprise, being used, according to Apple®, by nearly all of the Fortune 500.1 Aside from direct acquisition of the devices by the enterprises themselves, end-users are bringing them to work and using them in a variety of ways, intent on increasing productivity and making their work lives—and their personal lives—more efficient through easily accessible information away from a computer. While iPad presents the potential to bring a wealth of measurable and profitable benefits to the enterprise as well as happier, and, hence, more productive employees, it also brings a number of challenges and risks that threaten to lead to security breaches and compliance violations, regardless of industry. In this white paper, we’ll the discuss the top 5 Things you NEED to know about iPads and integrating them into an enterprise environment so you can protect and maximize existing IT and corporate assets, mitigate security and compliance risks, and keep IT in control, all while ensuring employees are happy and at their most productive. WHITE PAPER WHITE PAPER 1 - iPads are Already in the Enterprise (like it or not) With or without IT’s blessing, iPad users are using their devices for work purposes (95% of employees say they use personally purchased devices for work use).2 That means without a native file system on the device and enterprise security and management capability, users are employing the “work around,” putting the enterprise and its assets at risk and compromising compliance efforts.
    [Show full text]
  • Organisation Name
    Organisation Name Domain Askern Medical Practice The White Wings Centre Spa Pool Road, Askern Doncaster, S-Yorkshire DN6 0HZ askernmedicalpractice.nhs.uk Buckinghamshire County Council sexualhealthbucks.nhs.uk Gloucestershire Care Services hopehouse.nhs.uk Orchard Family Practice Rainham Healthy Living Centre 103-107 High Street Rainham Kent, ME8 8AA Orchardfamilypractice.nhs.uk Orchard Family Practice Rainham Healthy Living Centre 103-107 High Street Rainham Kent, ME8 8AA orchardfamilypracticerainham.nhs.uk St Clements Surgery GP practice D82105 St Clements Surgery 105 Churchgate Way Terrington St Clements Kings Lynn Norfolk PE344LZ stclementssurgery.nhs.uk St Johns Way Medical Centre 96 St. John's Way Archway London N19 3RN stjohnsway.nhs.uk. The Flying Scotsman Health Centre The Flying Scotsman Health Centre St. Sepulchre Gate West Doncaster DN1 3AP heflyingscotsmanhealthcentre nhs.uk The Practice Lincoln Green The Practice Lincoln Green Burmantofts Health Centre Lincoln Green Leeds LS9 7TA hepracticelincolngreen.nhs.uk University Hospitals of North Midlands NHS Trust (Name change fro: University Hospital Of North Staffordshire NHS Trust) myipfcheck.uhns.nhs.uk University Hospitals of North Midlands NHS Trust (Name change fro: University Hospital Of North Staffordshire NHS Trust) uhnm.nhs.uk University Hospitals of North Midlands NHS Trust (Name change fro: University Hospital Of North Staffordshire NHS Trust) uhnmdawn.uhns.nhs.uk University Hospitals of North Midlands NHS Trust (Name change fro: University Hospital Of North Staffordshire
    [Show full text]
  • Mobile Security Top Five Security Threats for the Mobile Enterprise
    WHITE PAPER Mobile Security Top Five Security Threats for the Mobile Enterprise and How to Address Them WHITE PAPER WHITE PAPER Today’s countless mobile devices present tangible opportunities to drive measurable and substantial value for the enterprise. Field service workers, executives on the go, sales reps, project managers and others all have a need for mobile access to applications and enterprise files. It’s no question that the advent of the iPad® and other mobile computing devices brings substantial benefits to the enterprise. However, these benefits also come with new security risks that enterprise IT departments must be ever vigilant about, lest critical data be compromised. The consumerization of IT and BYOD (bring your own device) programs in the workplace make mobile file management (MFM) solutions more important than ever before.1 In this white paper, we’ll cover the latest security threats to the mobile enterprise, as well as solutions to overcome them. Solutions that allow enterprises to make the most of the benefits iPads and other mobile devices bring to the company while safeguarding security, and help to foster happy employees, increased productivity, and streamlined, managed workflows are increasingly critical in today’s enterprise IT landscape. Security threats include: 1. Unsecure File Transfer 2. Lost/Stolen Devices 3. Open Wi-Fi Networks and Public Hotspots 4. Malware and Viruses 5. Unclear Corporate Policies WHITE PAPER WHITE PAPER Unsecure File Transfer Problem: iPads and other tablets make mobile file management a bigger issue than ever before due to the lack of native file storage on the devices. Employees typically opt for consumer-driven workarounds and synching solutions, which, according to recent filings with the FTC, do not live up to their guarantees of secure, encrypted file transfer and storage.2 Solution: Mobile file management provides simple, secure and managed access to enterprise files on mobile devices.
    [Show full text]
  • Mobilecho® Overview
    OVERVIEW mobilEcho® Overview Secure Mobile File Management for Enterprise Mobility Users mobilEcho® enables enterprise IT to provide mobile users with secure access mobilEcho Benefits to enterprise file servers and SharePoint files, eliminating the headaches of employees using unsafe and non-compliant alternatives such as consumer-based services and applications. Key features: • Simple for the end-user; no mobilEcho ensures that all corporate files and assets can be securely accessed training required by the right people. mobilEcho drives business value in several ways, including: • Centralized Management • Enterprise Security • Mitigated Risk: mobilEcho ensures mobile file access adheres to your • Secure PDF Annotation corporate security policies and files are properly protected. • Two-way sync and offline file • Regulatory Compliance: mobilEcho helps organizations meet compliance access regulations regarding data and file access. This eliminates costly fines and embarrassing PR exposure. Empower Your Mobile Employees: • Reduced IT Management Cost: mobilEcho provides simple yet comprehensive • Senior Executives on-the-go tools for your IT team to ensure they meet their security, compliance and enabled to make quick management objectives in a cost-effective manner. decisions with anytime, anywhere access • Improved Employee Productivity: Mobile devices allow greater access • Sales Executives in front of to information which can improve decision-making, increase customer customers are speeding up satisfaction, and improve profitability. mobilEcho allows enterprises to the sales process with instant support both corporate-owned and employee-owned devices. access to collaterals • Field Service Workers have • Competitive Differentiation: Meet security needs and arm your employees secure access to critical docs, with the devices they want and need to better complete their tasks and meet improving productivity and SLA operational objectives that set you apart from competitors.
    [Show full text]
  • Leading Green Institution Employs Mobilecho® to Reduce Waste and Streamline Productivity for Senior Staff
    SUCCESS STORY Leading Green Institution Employs mobilEcho® to Reduce Waste and Streamline Productivity for Senior Staff “mobilEcho is revolutionary in the way that it enables the iPad, which was originally designed as a non-corporate product, to be used in a corporate landscape” Iain Reeman, ICT Systems Director at University of East Anglia Challenge: Key Challenges: Empower Staff to Leverage the iPad for File Access and Enable employees to leverage the iPad’s mobile More Efficient Workflow capabilities with easy access to corporate files on the university’s servers—without interfering with the In the spring of 2012, the University of East Anglia, a top-ranked university’s existing infrastructure or security standards. university in Norwich, U.K., purchazed iPads for members of some of the university’s senior management teams, in an effort to provide a Key Benefits: more efficient workflow and significantly reduce the amount of paper generated by department meetings. While the iPads made remote • mobilEcho gives employees the ability to easily email access and other browser-based tools easy enough, without on- access their files on the university server using device storage options, the university couldn’t offer employees a way their iPads without compromising university security and privacy protocols. to access files from the iPads® safely and securely. • No extra log-ins, passwords or applications are With a secure file service in place that did not support file access via required. mobile devices, the IT department simply needed to find a solution • Use of paper for the university’s senior staff has that would work within their existing infrastructure.
    [Show full text]
  • Grouplogic Introduces Mobilecho 4.0, Giving Access to Sharepoint Servers
    prMac: Publish Once, Broadcast the World :: http://prmac.com GroupLogic Introduces mobilEcho 4.0, Giving Access to SharePoint Servers Published on 07/31/12 GroupLogic, announces the latest version of its Mobile File Management solution, mobilEcho. mobilEcho client management improvements offer users more flexibility to edit and access files from the device of their choice. With mobilEcho 4.0, users now have access to corporate content via enterprise file servers, Network Attached Storage, and SharePoint. In addition to SharePoint integration, mobilEcho 4.0 also contains updates to client management and an administration console enhancement. Arlington, Virginia - GroupLogic(R), the industry's leading provider of software products that unlock the power of new enterprise platforms, announced today the latest version of its Mobile File Management (MFM) solution, mobilEcho. With mobilEcho 4.0, users now have access to corporate content via enterprise file servers, Network Attached Storage (NAS), and SharePoint. In addition to SharePoint integration, mobilEcho 4.0 also contains updates to client management and an administration console enhancement. "Enterprise investment in content and document management is continuing to grow, which means the use of corporate files and documents on smartphones and tablets is also increasing," said Chris Hazelton, research director, mobile & wireless, at 451 Research. "At the same time, it is necessary to keep these devices secure, especially when accessing and editing documents. Organizations need to marry the user's need for easy and convenient access to documents with the IT department's need to exhibit a level of control that ensures policies remain intact." "mobilEcho has enabled us to access documents from wherever our employees happen to be, changing how we do business and enabling us to work more efficiently," said Brandon Covert, director of information technology for the Cleveland Browns.
    [Show full text]
  • 451 Group 1 Context
    GroupLogic extends mobile sync support with new activEcho product Analyst: Chris Hazelton Kathleen Reidy 27 Mar, 2012 GroupLogic has released activEcho, which is aimed at the mobile file-sharing and -synchronization market (aka 'Dropbox for the enterprise'). The company intends to sell activEcho directly to IT departments and position it as an alternative to consumer- and SMB-oriented file-sharing and -sync services delivered from the public cloud. ActivEcho is a companion to the mobilEcho product that GroupLogic released in May 2011. MobilEcho enables file sharing and sync for tablets and other mobile devices, while activeEcho brings in support for desktops. Both products help IT gain control of data movement in the age of 'bring your own device' (BYOD). GroupLogic faces a number of potential competitors in this market, although none is yet well established with enterprise IT departments, which are now just beginning to find alternatives to the rampant use of consumer services by employees. The 451 Take Controlling the movement of data across devices in the enterprise has always been of paramount importance, but it has become increasingly difficult to deal with in the age of BYOD. As employees demand access to corporate data on any type and number of devices, at any time, mobile file sharing and synchronization becomes a key tool for tracking and managing the movement of a company's key data. GroupLogic is building on its history of supporting Apple devices in the enterprise to deliver its own enterprise-grade synchronization service. With enterprise computing going through significant changes in the types of devices and the manner in which data is stored, GroupLogic is well positioned.
    [Show full text]
  • Frequently Asked Questions
    Frequently Asked Questions What is mobilEcho? mobilEcho is the industry’s first Mobile File Management (MFM) software for enterprise IT and mobile device users. mobilEcho enables enterprises to provide mobile device users with secure access to enterprise file servers, SharePoint servers, and NAS storage, eliminating the need for workarounds and third-party mobile applications that compromise the security of enterprise files and assets. Configurable and deployable across the enterprise within minutes, mobilEcho promotes efficient IT Management while ensuring corporate security and compliance standards are met. Enterprise end-users of mobilEcho can access, browse, search and interact with corporate files as well as sync files for offline access, improving overall mobile worker productivity regardless of job function. Who uses mobilEcho? Any enterprise that needs to provide secure file access from mobile devices -- from the small and medium size businesses to Fortune 1000 companies. Who benefits from mobilEcho being deployed in the Enterprise? • Employees with mobile devices will prefer mobilEcho for its speedy browsing and lightning--fast search of file names and content, all of which can be remotely administered, making their out of the box experience instantly gratifying. • IT System Administrators will prefer mobilEcho for its centralized management and easy integration into existing Windows-based tools and processes. • Businesses will benefit from mobilEcho enabling greater productivity and satisfaction from their employees while ensuring the security and compliance policies of the corporation are met. What are the key features? • Access, Browse, Preview, Sync & Search Files on corporate file servers, SharePoint servers, and NAS Devices Same, seamless and secure file access as on a PC and from your iOS or Android mobile devices.
    [Show full text]
  • Enterprise Security with Mobilecho Enterprise Security from the Ground Up
    Enterprise Security with mobilEcho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the rst topics on the table. So it should come as no surprise that mobilEcho, GroupLogic’s Mobile File Management (MFM) product, was designed from the ground up to combine mobile le access with enterprise security. mobilEcho is the industry’s rst and only mobile MFM software for enterprise iPad users. mobilEcho enables enterprises to provide secure access to enterprise le servers for iPad users, eliminating the need for work-arounds and third-party mobile applications that compromise the security of corporate les and assets. Congurable and deployable across the enterprise within minutes, mobilEcho promotes ecient IT management while ensuring corporate security and compliance standards are met. Enterprise end-users of mobilEcho can access, browse, search and interact with corporate les as well as cache les for oine access, improving overall mobile worker productivity regardless of job function. Specic to security, mobilEcho takes into consideration three critical components that need to be secured when remotely accessing les from corporate servers: the server itself, the network and the mobile client. In addition, the various stakeholders - the end-user, the IT administrator, and the security team - each have dierent requirements. mobilEcho addresses each of them independently and collectively. This document describes how mobilEcho enables simple, secure and managed mobile le access. Security on the Server mobilEcho security starts on your corporate servers. Unlike consumer and cloud-based solutions for the iPad, mobilEcho allows the IT organization to stay in charge since your valuable business content and les remain on corporate-controlled servers.
    [Show full text]
  • Smart Card Authentication
    SMART CARD AUTHENTICATION Smart Card Authentication Secure CAC/PIV Mobile File Management Acronis mobilEcho® for iOS meets the needs of US DoD, Federal, State and Local governments and corporate iPhone and iPad users for simple and straightforward two-factor authenticated CAC, PIV, PIV-I and CIV smart card access to files. mobilEcho empowers employees who choose iPhones & iPads with secure, managed access to documents stored on enterprise storage including file servers, NAS such as NetApp, EMC or Isilon and SharePoint sites with built in editing for Microsoft Office files including Microsoft Word, Excel and PowerPoint. mobilEcho supports the common use of searching for a document on a server, opening and editing that document and saving the edited version back to the server, all from an iPhone or iPad. Authenticate to access files on: • Windows and any file servers accessible by SMB/CIFS • Microsoft SharePoint sites, including Office 365 hosted sites • Network Attached Storage (NAS) such as NetApp, Isilon, EMC and Western Digital Thursby Inside The Secure CAC/PIV technology is licensed from Thursby Software, Inc. The smart card technology is the same code used by the Pentagon, Army, Navy, White House, NIH and SEC across tens of thousands of Mac users since the mid 2000s. Smart Card Reader Support mobilEcho supports a variety of smart card readers including: • Thursby • Indentive iAuthenticate • Precise Biometrics Reader hardware and card are not included. Protecting the App When mobilEcho’s primary authentication is configured to use Smart Cards, the mobilEcho app will require that the user’s Smart Card is inserted into the reader before the user can use the app.
    [Show full text]