PALO ALTO, CA — (Marketwired) — 04/14/16 — , the leading provider of private cloud solutions for secure file sharing and collaboration that ensures data security and compliance, today announced the addition of several key security features to its kiteworks secure content platform to further safeguard enterprise data from a costly data breach.
These features, including a number of “industry first” offerings, better enable enterprise employees to handle enterprise content securely. It does not matter whether employees are working remotely or onsite, collaborating with colleagues or external partners, or accessing content that is stored on premises or in the cloud; enterprise content can be retrieved, edited and shared securely within kiteworks.
“As data breaches become more frequent, sophisticated and damaging, cybersecurity technology has to respond and, ideally, stay ahead of the hackers,” commented Jim Lundy of Aragon Research. “Having several mechanisms in place to protect PII and other sensitive data is therefore not just advantageous but absolutely critical. Accellion has an enviable track record of innovation when it comes to securing enterprise content and these new features make kiteworks one of the more secure options available.”
“As more and more enterprise employees create and share increasing amounts of sensitive content, the risk of a data leak, whether accidental or intentional, grows too,” said Yorgen Edholm, CEO of Accellion. “Therefore, having a number of safeguards in place that allow employees to access and share content securely is critical for enterprises. kiteworks is singularly positioned to enable secure access to enterprise content, from a single pane of glass, ensuring the highest levels of data security and adhering to the most rigorous industry compliance requirements.”
Accellion–s new security features include the following key capabilities:
Enable leak proof editing within restricted folders that allow file editing but prevent file downloading or forwarding. A first for the industry, restricted folders significantly reduce the risk of a data leak in that collaborators cannot share sensitive documents with unauthorized people.
Set desktop clients to encrypt synced data when not in use and delete data remotely. A first for the industry, this capability minimizes the risk of a data leak should a laptop be stolen or when an employee leaves an organization with work files still on a personal PC.
Whether originating from kiteworks or Microsoft Outlook, users can ensure the contents of an email – both text and attachments – are secure. Recipients receive a secure link to retrieve an email and must authenticate to access the content in the email body.
Restrict email upload of certain file types that are very large or are popular vehicles for malware, including .exe, .mov, and .mp4. In fact, kiteworks not only checks the file extension name but also the content to prevent users from simply renaming a file with a different file extension.
Enable Touch ID authentication on iOS (iPhone 5S or later) devices, providing an alternative to traditional PIN authentication.
Customize the kiteworks platform to maintain consistent corporate brand identity. A first for the industry, multi-branding provides enterprises with custom branding capabilities for each of their subsidiaries to ensure a consistent user experience and eliminate any concerns about phishing.
Configure (enable or disable) collaboration permissions based on a user–s profile to prevent unauthorized sharing of files and folders with people outside the company that could pose a security risk or licensing violation.
Support for Kerberos, an industry standard network authentication protocol that enables secure mutual authentication between users and servers, adding another single sign-on capability.
All of these features are currently available and complement the many security features already provided in kiteworks, including:
Encryption: All files are encrypted at-rest and in-motion and organizations retain full ownership of the encryption keys.
Full Auditing: Every user action in the system is logged, and audit reports can be easily created to provide full visibility and demonstration of compliance.
DLP integration: Monitor shared documents and quarantine those containing sensitive data to prevent data leakage. Integrates with Symantec, WebSense, RSA, and others.
eDiscovery: Collect relevant documents and metadata, archive all relevant content, retain auditable logs, and easily export content tagged for eDiscovery to legal teams.
Policy-based Content Retention: Enforce corporate-defined content retention policies to ensure appropriate preservation and deletion of documents.
Data Sovereignty: Geographic policies can be enforced to restrict user content to storage physically located in specific countries to meet data residency requirements.
App Whitelisting: Establish and enforce which applications and content sources are accessible via kiteworks on the web or via kiteworks mobile.
User-friendly DRM: Establish view-only roles to prevent file downloads, deter unauthorized forwarding and printing via watermarking, and withdraw files even after they have been sent.
To learn more about these security features, as well as a number of new productivity and collaboration capabilities, please attend Accellion–s upcoming webinar on Wednesday April 27, 2016 at 11AM PT / 2PM ET by registering .
For more information about Accellion and the kiteworks secure content platform, please visit: .
About Accellion
Accellion, Inc. provides the leading secure content platform that increases enterprise productivity and ensures data security and compliance. More than 12 million users and 2,000 of the world–s leading corporations and government agencies use Accellion to enable secure access to enterprise content from any device, thereby increasing business productivity and ensuring enterprise security and compliance. For more information please visit or call (650) 485-4300. Follow , , and .
Accellion and kiteworks are registered trademarks of Accellion, Inc. in the US and other countries. All other trademarks contained herein are the property of their respective owners.
You must be logged in to post a comment Login