UPDATED 08:10 EST / JUNE 13 2016

NEWS

What you missed in Cloud: Security takes center stage

The top cloud providers go through great lengths to ensure that the user data stored on their infrastructure is secure, but for enterprises with strict compliance requirements, the built-in controls are often insufficient. The gap is being filled by vendors like Egnyte Inc., which last week introduced a tool aimed at preventing unauthorized access to files kept in services such as Box and Google Docs.

Egnyte Protect, as the offering is called, makes it possible to apply a set of restrictions to a document that are enforced regardless of where it’s stored. Administrators can thus ensure that sensitive files is only viewable by authorized personnel and prevent them from sharing the data with third parties who might pose a security risk. The service even provides the ability to have information automatically deleted after a certain time period, which should be useful in regulated industries where companies aren’t allowed to hold onto customer records for too long.

Egnyte Protect was launched against the backdrop of Qadium Inc. raising $20 million from investors to address another security pain point in the enterprise: Connected devices. Like the files that companies keep in the cloud, connected devices are becoming too numerous to effectively secure using traditional means. The startup offers an alternative in the form of a managed search engine that provides the ability to centrally discover all the malfunctioning firewalls, unpatched phones and other vulnerable endpoints in a network. Administrators can then use the information that the service uncovers up to to shore up their defenses.

Carbon Black Inc. is looking to help customers achieve a similar goal with the threat intelligence network that it launched last week, which provides an environment for sharing information about hacker activity. The platform attempts to set itself apart from the numerous alternatives out there by focusing on high-value data like the tactics used in a breach and malware propagation paths. It’s already being used by more than 600 of the endpoint protection vendor’s customers and partners. 

Image via Pixabay

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU