Cyber Risk Product Update: May 2018
It's been a busy month for the CyberRisk product team! We're proud of this release, and can't wait to share the details with you. All these new features are immediately available to CyberRisk customers.
It's been a busy month for the CyberRisk product team! We're proud of this release, and can't wait to share the details with you. All these new features are immediately available to CyberRisk customers.
If you’re involved in IT risk or security, you’ve probably encountered BitSight. It is one of a wave of promised solutions to a growing problem: how to manage the risks posed by your IT vendors in the cloud. The legacy approach to solving this problem is a combination of spreadsheet-based vendor assessments, sporadic penetration tests and vulnerability scans. If you combine this with subjective measurement and scoring of risk, you are probably taking on a lot more risk than you should.
If you haven’t done so recently, visit the Egnyte App Store. We’ve spruced up the user interface just in time for Spring (Northern Hemisphere). Now that there are hundreds of apps working with Egnyte, we offer new tools to help you find what you’re looking for faster.
There’s much talk about the General Data Privacy Regulation (GDPR) taking effect on May 25 and its impact on US companies with European operations. As more and more information has been collected electronically over the years, it’s become necessary to mandate that companies better protect this information from being breached. With this mandate, the days of collecting and storing personal information are gone.
When I was growing up, my father enrolled me in martial arts at an early age. I liked everything about it. I liked the friends I made, I liked the sense of achievement getting the next belt, I liked breaking boards ,but more than anything, I liked to fight. Furthermore, I liked to win.
We’re focused on empowering our end users to locate the content they need, fast. Businesses leverage Egnyte because we fit so seamlessly into day-to-day operations. File access, security management, and permissions control are as important to us as they are to the organizations we serve. We strive to ensure our users can find any file in just three clicks (or taps for mobile) and this blog highlights some of the ways in which we make this possible.