{"id":34582,"date":"2022-11-14T09:27:43","date_gmt":"2022-11-14T15:27:43","guid":{"rendered":"https:\/\/www.filecloud.com\/blog\/?p=34582"},"modified":"2022-11-14T10:55:41","modified_gmt":"2022-11-14T16:55:41","slug":"air-gapped-networks-and-filecloud","status":"publish","type":"post","link":"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/","title":{"rendered":"Air-Gapped Networks and FileCloud Secure Sensitive Data"},"content":{"rendered":"<h2><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-34584\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/11\/Air-Gapped-Networks-Banner.png\" alt=\"\" width=\"2560\" height=\"1440\" srcset=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/11\/Air-Gapped-Networks-Banner.png 2560w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/11\/Air-Gapped-Networks-Banner-1024x576.png 1024w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/11\/Air-Gapped-Networks-Banner-768x432.png 768w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/11\/Air-Gapped-Networks-Banner-1536x864.png 1536w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/11\/Air-Gapped-Networks-Banner-2048x1152.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\"><\/h2>\n<p>For companies, organizations, and governments that require absolute security for data, air-gapped networks seem like an obvious choice. This is especially true with the rising rates of cyberattacks, which are becoming ever more costly (think billions of dollars globally) between lost profits over frozen assets and ransoms paid.<\/p>\n<p>This is where an air-gapped network comes into play. Simply put, you can store your data on an internal network that is physically separated from other networks (air is between the servers and other network hardware). There are also no wireless connections to other networks (especially the internet).<\/p>\n<p>An air-gapped network is a compelling solution for organizations handling confidential or sensitive information, like health data, bank records, or defense supply chain schematics.<\/p>\n<p>With this physical separation, your data should stay safe in your isolated network \u201cisland.\u201d<\/p>\n<p>Right?<\/p>\n<p>Well, no actually. Let\u2019s dig into what an air-gapped network actually is \u2013 then we can understand the challenges that come with using them to secure data in our modern, ultra-connected network landscape.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_63 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#What_is_an_Air-Gapped_Network\" title=\"What is an Air-Gapped Network?\">What is an Air-Gapped Network?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#An_Air-Gapped_Network_that_Protects_and_Connects_a_Paradox\" title=\"An Air-Gapped Network that Protects and Connects: a Paradox?\">An Air-Gapped Network that Protects and Connects: a Paradox?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#Solution_1_%E2%80%93_Create_Your_Own_Software_Solution\" title=\"Solution #1 \u2013 Create Your Own Software Solution\">Solution #1 \u2013 Create Your Own Software Solution<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#Solution_2_%E2%80%93_Opt_for_an_Integrated_Cloud_Solution\" title=\"Solution #2 \u2013 Opt for an Integrated Cloud Solution\">Solution #2 \u2013 Opt for an Integrated Cloud Solution<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#FileCloud_An_Air-Gapped_Network_Solution_that_is_%E2%80%9CJust_Right%E2%80%9D\" title=\"FileCloud: An Air-Gapped Network Solution that is \u201cJust Right\u201d\">FileCloud: An Air-Gapped Network Solution that is \u201cJust Right\u201d<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#Identity_Authentication\" title=\"Identity Authentication\">Identity Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#Encryption\" title=\"Encryption\">Encryption<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#Granular_Permissions\" title=\"Granular Permissions\">Granular Permissions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#Controlled_Sharing\" title=\"Controlled Sharing\">Controlled Sharing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#Admin_Powers\" title=\"Admin Powers\">Admin Powers<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#Remote_Device_Management\" title=\"Remote Device Management\">Remote Device Management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#Reports_Logs\" title=\"Reports &amp; Logs\">Reports &amp; Logs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#Key_Integrations\" title=\"Key Integrations\">Key Integrations<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_is_an_Air-Gapped_Network\"><\/span>What is an Air-Gapped Network?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>An air-gapped network is a security measure that isolates and limits computer systems from accessing other networks, including unsecured networks such public internet or local area networks. These air-gapped networks are used for systems that require high security to limit breaches and data leakage.<\/p>\n<p>As mentioned above, the traditional air-gapped network is one that physically separates servers from other day-to-day network infrastructure. These servers are usually themselves housed off-site, in a data center or server farm, behind locked doors and gates. This effectively isolates data storage, so that it is safe and secure on this designated \u201cisland.\u201d<\/p>\n<p>Often, these air-gapped networks are used for backups, but they can also be used as primary working spaces for groups that handle confidential, classified, or extremely sensitive information.<\/p>\n<p>This data doesn\u2019t exist just for the sake of itself though \u2013 people need to leverage data to achieve projects, deliver insights, and provide services. So how do you balance the need to access data with the need to secure it? The more access points you provide, the easier it is to leverage data, which is what you want. At the same time, the more access points, the more vulnerabilities.<\/p>\n<p>The problem is that to use data stored in a traditional, air-gapped network, people must physically connect or even quite literally travel to your \u201cisland.\u201d They also can\u2019t leave your island to work on other resources or bring in other data, unless they physically import it. In this case, the import mechanism is likely a dongle or USB drive.<\/p>\n<p>You\u2019re already seeing the problem, aren\u2019t you?<\/p>\n<p>Not only do traditional air-gapped networks create significant access barriers, they also leave the door open for human error or exploitation.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"An_Air-Gapped_Network_that_Protects_and_Connects_a_Paradox\"><\/span>An Air-Gapped Network that Protects and Connects: a Paradox?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The advent of technology has created more modern deployments of an air-gapped network. For example, air-gapping can be achieved within the same network if devices or hardware are physically disconnected. That still invites the issue of people needing to physically access the isolated hardware to view existing data or import new data.<\/p>\n<p>There are also logical air-gapped networks, in which software tools such as role-based access controls and encryption are used to create protected zones within a network. This solution is based on the concept that <em>when<\/em> bad actors break through (not if), they will not be able to make sense of the data or use it against the original owners.<\/p>\n<p>Maintaining control over data is the name of the game. Physical air-gapped networks are no longer the winning solution though. As with most other avenues in the IT world, we have learned that a combination of hardware and software can help create layers of security. In fact, the industry standard has heavily tilted toward software solutions, thanks to the impact of cloud technology.<\/p>\n<p>The problem now is figuring out the right software solution that can either fit into an air-gapped network strategy or that can support one.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Solution_1_%E2%80%93_Create_Your_Own_Software_Solution\"><\/span>Solution #1 \u2013 Create Your Own Software Solution<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>If a company or organization has a whole team of IT specialists, they can create a unique solution from the ground up that meets their exact needs and specifications. That could work for a while.<\/p>\n<p>The downside? It will be incredibly expensive though and likely difficult to handle as software ages. The IT team either has to proactively improve and expand core functionalities or outsource. However, legacy software tends not to play nice with external tools or feature integrations. Over time, this makes the software less useful. The \u201cease of access\u201d erodes.<\/p>\n<p>So, all that effort down the drain, and at the rate of technological development, that timeline could be as little as three years.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Solution_2_%E2%80%93_Opt_for_an_Integrated_Cloud_Solution\"><\/span>Solution #2 \u2013 Opt for an Integrated Cloud Solution<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>You could go with a cloud technology solution, which would handle all the maintenance and upgrading for you. A commercial solution would also have the resources to actively create new functionalities and expand integration potential. Ease of access and maintenance: check.<\/p>\n<p>The convenience and storage fees though will eat up an increasing percentage of your budget. A business could go bankrupt trying to scale operations within a cloud solution, especially if they handle a lot of data.<\/p>\n<p>Not to mention, many of these cloud providers can\u2019t provide air-gapped networks, even logical air-gapped networks, because <em>they own the data<\/em> you store. If it\u2019s in the public cloud, that data is beyond your control. For optimal security and data control, the cloud just isn\u2019t an option.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"FileCloud_An_Air-Gapped_Network_Solution_that_is_%E2%80%9CJust_Right%E2%80%9D\"><\/span>FileCloud: An Air-Gapped Network Solution that is \u201cJust Right\u201d<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>FileCloud is the solution you\u2019re looking for. It combines the best of both worlds as an on-premises, self-hosted solution that can be deployed within an air-gapped network while ensuring ease of access for authorized users.<\/p>\n<p><a href=\"https:\/\/www.filecloud.com\/deploy-filecloud-in-an-air-gapped-network\/\"><strong>Read our white paper<\/strong><\/a> to learn more about air-gapped networks and how to supercharge your hyper-secure access with FileCloud!<\/p>\n<p>We\u2019ve got pro-con lists, we\u2019ve got diagrams, we\u2019ve got technical breakdowns for different scenarios \u2013 it\u2019s all here in the white paper.<\/p>\n<hr>\n<p style=\"text-align: center;\"><strong>Download our <a href=\"https:\/\/www.filecloud.com\/deploy-filecloud-in-an-air-gapped-network\/\">White Paper<\/a> to learn how FileCloud works with Air-Gapped Networks.<\/strong><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-34588\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/11\/Air-Gapped-Networks-2-Figma.jpg\" alt=\"Air-Gapped Networks with FileCloud - Diagram\" width=\"1165\" height=\"759\" srcset=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/11\/Air-Gapped-Networks-2-Figma.jpg 1165w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/11\/Air-Gapped-Networks-2-Figma-1024x667.jpg 1024w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/11\/Air-Gapped-Networks-2-Figma-768x500.jpg 768w\" sizes=\"(max-width: 1165px) 100vw, 1165px\"><\/p>\n<hr>\n<p>If you need more convincing though, here are some of the amazing things you can do in FileCloud. These features can help optimize how you use your data, all while maintaining (and even strengthening) security.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Identity_Authentication\"><\/span>Identity Authentication<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The hyper-secure platform provides identity authentication settings such as two-factor authentication, active directory and LDAP integration, Single Sign-on (SSO), and SIEM support.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Encryption\"><\/span>Encryption<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Even if someone tries to steal data, it doesn\u2019t mean they can view or even use what they\u2019ve taken. 256-bit AES encryption secures data at rest and TLS\/SLL protocols encrypt data in transit. You can also run FileCloud in <a href=\"https:\/\/www.filecloud.com\/blog\/2022\/05\/enable-fips-encryption-in-filecloud\/#.Y2QKInbMK3A\">FIPS mode<\/a>, which uses FIPS-level encryption on a FIPS-enabled operating system, for extra security and compliance with regulations.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Granular_Permissions\"><\/span>Granular Permissions<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Granular file and folder permissions ensure only authorized users can access certain data. Sharing can also be tightly controlled, through public or private sharing, password-protection, and expiry dates.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Controlled_Sharing\"><\/span>Controlled Sharing<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Sharing can be carefully monitored by Admins through <a href=\"https:\/\/www.filecloud.com\/data-leak-prevention\/\">Data Leak Prevention<\/a> (DLP) rules that can override any attempted shares with unauthorized users or alert the admin. Maintain control over data even after sharing with FileCloud\u2019s Digital Rights Management feature.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Admin_Powers\"><\/span>Admin Powers<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Admins can also create Admin-users or modify user permissions with role-based access controls (RBAC). This ensures department heads or directors can manage their teams and data access, even as the Admin maintains <a href=\"https:\/\/www.filecloud.com\/admin-capabilities\/\">global controls<\/a> and protections.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Remote_Device_Management\"><\/span>Remote Device Management<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>This global control extends to connected devices and user accounts. Upon suspicious activity, Admins can block users from access and even remotely wipe devices. No more worrying about that USB you left in the airport or a phone that went missing after being left out on a desk.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Reports_Logs\"><\/span>Reports &amp; Logs<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Admins have maximum visibility over user and file activity through the admin dashboard, where they can run reports, even create custom logs. All activity is captured in comprehensive audit logs that can be exported for internal review or external audit. This feature makes compliance assessments a breeze.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Key_Integrations\"><\/span>Key Integrations<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>FileCloud can even be <a href=\"https:\/\/www.filecloud.com\/third-party-integration\/\">integrated<\/a> with common tools you already use, like Microsoft Word, Excel, PowerPoint, Teams and Outlook, OnlyOffice, Google Docs, Salesforce, Symantec, and ArcSight.<\/p>\n<p>Check out the full FileCloud <a href=\"https:\/\/www.filecloud.com\/filecloud-overview-tour\/\">tour<\/a> or sign up for a <a href=\"https:\/\/www.filecloud.com\/#onpremiseTrial\">demo<\/a>!<\/p>\n<p>\u00a0<\/p>\n<p><strong>Article written by <\/strong><a href=\"https:\/\/www.linkedin.com\/in\/katie-gerhardt-88541791\/\"><strong>Katie Gerhardt<\/strong><\/a><strong>, Jr. Product Marketing Manager<\/strong><\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For companies, organizations, and governments that require absolute security for data, air-gapped networks seem like an obvious choice. This is especially true with the rising rates of cyberattacks, which are becoming ever more costly (think billions of dollars globally) between lost profits over frozen assets and ransoms paid. This is where an air-gapped network comes [&hellip;]<\/p>\n","protected":false},"author":31,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[20,72],"tags":[1803,1804],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Air-Gapped Networks and FileCloud Secure Sensitive Data - FileCloud blog<\/title>\n<meta name=\"description\" content=\"Air-gapped networks are great for securing data but challenging when it comes to using that data. FileCloud can help - learn how!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Air-Gapped Networks and FileCloud Secure Sensitive Data\" \/>\n<meta property=\"og:description\" content=\"Air-gapped networks are great for securing data but challenging when it comes to using that data. FileCloud can help - learn how!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/\" \/>\n<meta property=\"og:site_name\" content=\"FileCloud blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tonidopage\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-14T15:27:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-14T16:55:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/11\/Air-Gapped-Networks-Banner.png\" \/>\n<meta name=\"author\" content=\"Katie Gerhardt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:site\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katie Gerhardt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/\"},\"author\":{\"name\":\"Katie Gerhardt\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/ea3506ea3e9eb7bb2036e6c7c8fc05ea\"},\"headline\":\"Air-Gapped Networks and FileCloud Secure Sensitive Data\",\"datePublished\":\"2022-11-14T15:27:43+00:00\",\"dateModified\":\"2022-11-14T16:55:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/\"},\"wordCount\":1412,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"keywords\":[\"air-gap\",\"air-gapped networks\"],\"articleSection\":[\"FileCloud\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/\",\"name\":\"Air-Gapped Networks and FileCloud Secure Sensitive Data - FileCloud blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\"},\"datePublished\":\"2022-11-14T15:27:43+00:00\",\"dateModified\":\"2022-11-14T16:55:41+00:00\",\"description\":\"Air-gapped networks are great for securing data but challenging when it comes to using that data. FileCloud can help - learn how!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.filecloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Air-Gapped Networks and FileCloud Secure Sensitive Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"name\":\"FileCloud blog\",\"description\":\"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing\",\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\",\"name\":\"FileCloud\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"contentUrl\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"width\":155,\"height\":40,\"caption\":\"FileCloud\"},\"image\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/tonidopage\",\"https:\/\/twitter.com\/getfilecloud\",\"https:\/\/www.linkedin.com\/company\/codelathe\",\"https:\/\/www.pinterest.com\/filecloud\/filecloud\/\",\"https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/ea3506ea3e9eb7bb2036e6c7c8fc05ea\",\"name\":\"Katie Gerhardt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/07bbf4097008eebfdc680520a6973c6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/07bbf4097008eebfdc680520a6973c6e?s=96&d=mm&r=g\",\"caption\":\"Katie Gerhardt\"},\"description\":\"Product Marketing Manager\",\"sameAs\":[\"1\",\"https:\/\/www.linkedin.com\/in\/katie-gerhardt-88541791\/\"],\"url\":\"https:\/\/www.filecloud.com\/blog\/author\/katie\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Air-Gapped Networks and FileCloud Secure Sensitive Data - FileCloud blog","description":"Air-gapped networks are great for securing data but challenging when it comes to using that data. FileCloud can help - learn how!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/","og_locale":"en_US","og_type":"article","og_title":"Air-Gapped Networks and FileCloud Secure Sensitive Data","og_description":"Air-gapped networks are great for securing data but challenging when it comes to using that data. FileCloud can help - learn how!","og_url":"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/","og_site_name":"FileCloud blog","article_publisher":"https:\/\/www.facebook.com\/tonidopage","article_published_time":"2022-11-14T15:27:43+00:00","article_modified_time":"2022-11-14T16:55:41+00:00","og_image":[{"url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/11\/Air-Gapped-Networks-Banner.png"}],"author":"Katie Gerhardt","twitter_card":"summary_large_image","twitter_creator":"@getfilecloud","twitter_site":"@getfilecloud","twitter_misc":{"Written by":"Katie Gerhardt","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#article","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/"},"author":{"name":"Katie Gerhardt","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/ea3506ea3e9eb7bb2036e6c7c8fc05ea"},"headline":"Air-Gapped Networks and FileCloud Secure Sensitive Data","datePublished":"2022-11-14T15:27:43+00:00","dateModified":"2022-11-14T16:55:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/"},"wordCount":1412,"commentCount":0,"publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"keywords":["air-gap","air-gapped networks"],"articleSection":["FileCloud","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/","url":"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/","name":"Air-Gapped Networks and FileCloud Secure Sensitive Data - FileCloud blog","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/#website"},"datePublished":"2022-11-14T15:27:43+00:00","dateModified":"2022-11-14T16:55:41+00:00","description":"Air-gapped networks are great for securing data but challenging when it comes to using that data. FileCloud can help - learn how!","breadcrumb":{"@id":"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.filecloud.com\/blog\/air-gapped-networks-and-filecloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.filecloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Air-Gapped Networks and FileCloud Secure Sensitive Data"}]},{"@type":"WebSite","@id":"https:\/\/www.filecloud.com\/blog\/#website","url":"https:\/\/www.filecloud.com\/blog\/","name":"FileCloud blog","description":"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing","publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.filecloud.com\/blog\/#organization","name":"FileCloud","url":"https:\/\/www.filecloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","contentUrl":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","width":155,"height":40,"caption":"FileCloud"},"image":{"@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tonidopage","https:\/\/twitter.com\/getfilecloud","https:\/\/www.linkedin.com\/company\/codelathe","https:\/\/www.pinterest.com\/filecloud\/filecloud\/","https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g"]},{"@type":"Person","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/ea3506ea3e9eb7bb2036e6c7c8fc05ea","name":"Katie Gerhardt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/07bbf4097008eebfdc680520a6973c6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/07bbf4097008eebfdc680520a6973c6e?s=96&d=mm&r=g","caption":"Katie Gerhardt"},"description":"Product Marketing Manager","sameAs":["1","https:\/\/www.linkedin.com\/in\/katie-gerhardt-88541791\/"],"url":"https:\/\/www.filecloud.com\/blog\/author\/katie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/34582"}],"collection":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/comments?post=34582"}],"version-history":[{"count":8,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/34582\/revisions"}],"predecessor-version":[{"id":34667,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/34582\/revisions\/34667"}],"wp:attachment":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/media?parent=34582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/categories?post=34582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/tags?post=34582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}