Meeting NIST Standards for Zero Trust Data Access & Sharing
March 24, 2021 | 31:49
ECA webinar that discusses the standards set by NIST for zero trust, and how they apply to zero trust for remote data access and sharing.
- What is NIST and how do they define zero trust
- What are the NIST standards for a zero trust architecture
- How to meet NIST standards for zero trust regarding remote data access and sharing of files and folders
How Zero Trust Data Access Extends Office 365 Functionality into a Hybrid IT Infrastructure
December 2, 2020 | 30:21
Edge Computing Association webinar on how Zero Trust Data Access extends Office 365 functionality into a modern hybrid-IT infrastructure.
Today’s modern organization has a hybrid-IT infrastructure – that is a combination of on-premises and cloud-hosted servers and storage. The problem is that Office 365 only provides remote access to one of these many places your files might be – that is OneDrive. That forces your users to either copy and sync their important files to OneDrive or to use OneDrive as their primary storage.
The challenge comes when you want to remotely access or share files stored on your hybrid-IT infrastructure other than on your own OneDrive or when you need to maintain privacy and confidentiality over files. Is a VPN the only route?
Zero Trust Data Access (ZTDA) is a fantastic new technology that will extend your Office 365 functionality into all of your hybrid-IT infrastructure. That is because of the mechanisms and technology that enables zero trust. The use of encrypted tunnels to micro-segmented storage will allow users from a single-pane-of-glass to remotely access, share and edit an Office 365 file located anywhere on your hybrid-IT infrastructure – from on-premises storage such as a NAS, SAN, DAS, PC or on-premises implementation of SharePoint, to cloud-hosted infrastructure such as Amazon, Azure, Google, to enterprise-grade, private and public cloud storage. It provides access to all of these over an ordinary internet connection, without the need for a VPN. And it does so with the highest levels of security available – through a zero-trust platform.
Traditionally, a website usually hosted by a third-party vendor, a virtual data room enables colleagues, clients, partners, associates, vendors and other authorized people both internal and external to your company to upload, view, download and edit confidential documents in a controlled environment.
Zero Trust Data Access (ZTDA) is a fantastic new technology created for security that will also enable you to host virtual data rooms on your hybrid-IT infrastructure. That is because of the mechanisms and technology that enables zero trust. The use of encrypted tunnels to micro-segmented storage will allow users from a single-pane-of-glass to remotely access, share, edit and upload files to a folder located anywhere on your hybrid-IT infrastructure – from on-premises storage such as a NAS, SAN, DAS, PC or on-premises implementation of SharePoint, to cloud-hosted infrastructure such as Amazon, Azure, Google, to enterprise-grade cloud storage such as Box to public cloud storage such as Dropbox, Google Drive and OneDrive.
The ability to use micro tunnel technology to upload files to a folder gives zero trust technology the ability to create virtual data rooms. It enables this over an ordinary internet connection, without the need for a VPN. And it does so with the highest levels of security available – through a zero-trust platform – and it provides both users and IT granular permissions levels to a user-by-user basis.
In this webinar we will discuss:
- What is a Virtual Data Room and how is it used
- What is zero trust
- How does zero trust enable the creation of virtual data rooms
- How does zero trust provide granular permissions to a virtual data room on a user-by-user basis
- Demonstration of a zero trust virtual data room
Zero Trust Sharing of On Premises Implementations of SharePoint
November 6, 2020 | 31:24
Edge Computing Association webinar on how to use Zero Trust Data Access to share with external parties and provide remote access to an on-premises implementation of SharePoint.
If you have an on-premises implementation of SharePoint you know that even though it is a great Intranet tool, it does not allow sharing with external parties, it is not easy to access remotely (without a VPN) and it is a separate silo of information. However, Zero Trust Data Access (ZTAA) is a fantastic new technology that will revive your on-premises implementation of SharePoint. That is because the zero trust platform secures access and sharing from the source locations including an onsite implementation of SharePoint eliminating the need to duplicate to a cloud server or need to migrate to the cloud-hosted implementation of SharePoint – even to external parties such as contractors and gig workers.
Securely Enable Your Remote Workforce with Zero Trust Data Access and no VPN
September 24, 2020 | 29:03
Edge Computing Association webinar on how to use Zero Trust to securely enable your remote workforce to remotely share and access your entire hybrid-IT infrastructure over the internet without using a VPN.
Looks at the problems of perimeter-based security today and how VPN remote access is being replaced by zero trust. Short lesson on what zero trust is, the components of zero trust, how it is applied into organizations and how it is applied to remote data access and sharing.
Zero Trust Data Collaboration for Remote Workers
April 21, 2020 | 30:09
Edge Computing Association webinar on zero trust data collaboration for remote workers.
Edge Computing Association webinar on zero trust data collaboration for remote workers.
Looks at today’s major technology inflections – rise of the distributed workforce, emergence of hybrid-IT, movement to zero trust and importance of data governance. Then looks at a practical solution that addresses these inflections to enable your remote workforce with zero trust access to your organization’s storage.
Understanding and Addressing Vectors of Attack
January 28, 2020 | 21:19
Edge Computing President Phil Bliss interviews Tom Ward – VP of Qnext Corp – about vectors of attack and how they are addressed with FileFlex Enterprise.
Edge Computing president Phil Bliss interviews Tom Ward – VP of Qnext Corp – about vectors of attack and how they are addressed with FileFlex Enterprise.
Looks at the embedding of malware in an email spear-phishing attack, man-in-the-middle, unauthorized access and storing of files on the servers of third-parties and how these vectors of attack are addressed with FileFlex Enterprise.
Increase Security Through Remote Data Access & Sharing of On Premises Storage
October 1, 2019 | 27:37
Edge Computing Association hosted webinar on providing remote data access and sharing to on-premises storage of servers, server-attached, NAS and SharePoint to protect confidentiality and increase security vs duplicating files to third-party servers.
Edge Computing Association hosted webinar on providing remote data access and sharing to on-premises storage of servers, server-attached, NAS and SharePoint to protect confidentiality and increase security vs duplicating files to third-party servers (ie Cloud storage).
Michelle Drolet, CEO of Towerwall looks at the option of using third-party cloud vendors and issues such as loss of control, regulations, unexpected cost creep, single point of failure and then the on-premises alternative.
Tom Ward, VP Marketing of Qnext takes a deeper dive into providing remote data access and sharing to your on-premises storage and how to turn your entire corporate storage structure into a virtual resident cloud. This new alternative is the best way to protect confidentiality, increase control and security and lower costs for the remote data access and sharing for your workforce.
The Next Evolution in Secure Computing Architecture
March 27, 2019 | 43:26
Global research firm Markets and Markets discusses the next evolution in secure computing architecture with the Edge Computing Association.
Global research firm Markets and Markets discusses the next evolution in secure computing architecture with the Edge Computing Association.
Vivek Gautam, head of digitization and blockchain practice at global research firm Markets and Markets looks at the up and coming technologies in secure computing architecture over the 18 months and in particular the movement back to on-premises edge devices.
Tom Ward, VP of marketing at Qnext Corp then expands on how this next generation of secure architecture is applied to remote access and sharing to address privacy, security and productivity.