Worldwide
FileCloud
13785 Research Blvd, Suite 125Austin TX 78750, USA
Fax: +1 (866) 824-9584
Europe
FileCloud Technologies Limited
Hamilton House 2,Limerick, Ireland
Industry-first set of capabilities that enable a Zero Trust security posture for collaboration and file sharing.
*National Security Agency (NSA) Cybersecurity Information Sheet: “Advancing Zero Trust Maturity Throughout the User Pillar”
https://media.defense.gov/2023/Mar/14/2003178390/-1/-1/0/CSI_Zero_Trust_User_Pillar_v1.1.PDF
Continually authenticate, access, and monitor user activity patterns to govern users’ access and privileges while protecting and securing all interactions.
Understand the health and status of devices to inform risk decisions. Real time inspection, assessment and patching informs every access request.
Secure everything from applications to hypervisors, to include protection of containers and virtual machines.
Data transparency and visibility is enabled and secured by enterprise infrastructure, applications, standards, robust end-to-end encryption, and data tagging.
Segment, isolate and control (physically and logically) the network environment with granular policy and access controls.
Automate security response based on defined processes and security polices enabled by AI, e.g., blocking actions or forcing remediation based on intelligent decisions.
Analyze events, activities and behaviours to derive context and apply AI/ML to achieve a highly personalised model that improves detection and reaction time in making real-time access decisions.
FileCloud is an enterprise-grade file sharing and sync solution:
Use dynamic and static attributes to inform contextual, consistent, and conditional access to resources.
Treat all users, devices, applications, environments, and NPEs as untrusted.
Consciously operate and defend resources with the assumption that an adversary has presence within the environment.
Deny access by default; authenticate every device, user, application/workload, and data flow (with least privilege).
Apply unified analytics for Data, Applications, Assets, Services (DAAS) to include behavioristics; log each transaction.
“The network location is no longer seen as the prime component to the security posture of the resource.”
Zero Trust moves cybersecurity beyond the static network perimeters – this paradigm focuses on securing users, assets, and resources over the network edge or segments.