Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Content Management

Why You Should Build an Agile, Integrated Construction Tech Stack

When it comes to construction technology, one size doesn’t necessarily fit all. Businesses often have different needs that require different tools to automate established processes, or standard operating procedures (SOPs). This creates a problem, however, because decision makers have to sift through the available technologies—and the depth and breadth of what processes they can cover—to find the right solution.

Defending Against Insider Threats with Egnyte

An insider threat is perhaps the most difficult threat to deal with for most organizations. It occurs when someone uses legitimate access to copy, expose, damage, or delete sensitive information. It can be accidental, such as when a sensitive file is placed in a folder accessible to all employees. Or, it can be intentional, such as when an employee preparing to resign copies sensitive files to take with them. It can even be malicious, such as when a disgruntled employee intentionally deletes critical files.

The 5 Reasons Private Equity Firms Use Egnyte

Private equity firms understand the threat of cyberattacks all too well, but they don’t always know the best way to proactively address this growing problem. According to a recent report by global consulting firm Deloitte, worldwide private equity assets under management (AUM) are anticipated to reach $5.8 trillion by 2025.

Top Findings and Insights from Egnyte's New Data Governance Trends Report

Learn about the latest research on cloud security, data governance, and how IT leaders are preparing for the future of digital work. The Egnyte Data Governance Trends Report is based on responses from 400 CIOs and CISOs regarding the state of their data governance programs and the threats that keep them up at night. We'll dissect some of the most surprising and revealing findings, and share real-world examples that underscore their implications for IT teams of all sizes.

Detect & Mitigate Your Ransomware Risk with Egnyte

In this video, Egnyte’s Chief Governance Officer Jeff Sizemore & Senior Manager of Governance Marketing Neil Jones discuss recent trends in ransomware detection and how you can mitigate potential attacks. A brief demo is provided at the end, where you will learn how to recover from a ransomware attack. Ransomware attacks continue to proliferate. We want users to understand the current state of ransomware attacks and to be able to prepare for attacks and manage them more effectively.

How To Transfer Point Cloud Data Faster From the Jobsite

Which is staler: 14-day-old bread or your point cloud data? Affordable, reality-capture technologies are rapidly changing how AEC firms conceive of, design, and build structures today. Companies are using laser scanners, 360-degree cameras, drones, smartphones, and more to capture high-fidelity data that details every dimension throughout a project. Stakeholders can then use that data to collaboratively visualize, plan, build, adjust, and complete projects faster and more accurately.

Whitelist Sensitive Content Locations

Whitelist sensitive data locations so you are notified about what matters most. To keep content in your repository secure and compliant, Egnyte scans all of your folder locations for sensitive content. However, there are often folders where sensitive content is intentionally allowed to live. To whitelist sensitive content by location or policy, first select the Sensitive Content tab.

Egnyte Releases Open Source Bandwidth Limiting Plugin

Bandwidth pricing is a major component of the cloud services model. And for a content-heavy service like a video or document store, egress costs can quickly spiral out of control. To mitigate this, it is important to put limits on the amount of data that can be downloaded in a given interval. However, bandwidth limiting for a multi-tenant SaaS product adds a few interesting challenges.

October Release Rollup: New Anomaly Detection, UX Features

We’re excited to share several recent user experience improvements we’ve made across the platform, including multivariate anomaly detection and other new features aimed at improving content governance. Continue reading to learn about some of our top product releases for October.

The Fastest Way to Put Large Data Sets to Work

The use by AEC firms of reality capture devices, like drones and 3D cameras, has exponentially increased the amount of data that they collect in the field but to unlock its value and be actionable it must go through a time and computing-intensive process that is easier said than done. Transferring that data to an office or the public cloud can take hours, days or weeks, significantly impacting project timelines.