IT Security

File store control

by Mark Rowe

A case study of how the telecoms research and consultancy firm Analysys Mason’s global workforce have the same access to its file storage, from different locations and devices, in a controlled and secure manner.

Since implementing Varonis Systems, Inc’s Enterprise File Sync and Share solution DatAnywhere, Analysys Mason, an adviser on telecoms, media and technology (TMT), has reduced costs by not having to waste money replicating and storing data offsite – in physical or virtual repositories. The firm was able to roll out DatAnywhere across the organisation to its workforce within hours. Tomasz Foltman, senior network analyst, said: “There isn’t a comparable product as far as I can tell in terms of functionality. The added bonus is that DatAnywhere’s total cost of ownership is much lower than another product we were looking into. Simply speaking, you have your network shares and you put DatAnywhere next to them ­­­− users don’t see any difference so they have no idea that it’s there, but I do and I know it is working.”

Analysys Mason’s research division has access to a massive range of data, content, and intellectual property, and a key requirement from its clients is that data must not leave Analysys Mason’s premises. Unlike other solutions that require data to be stored in off-site repositories, DatAnywhere is deployed alongside Analysys Mason’s existing network sharing. This allows the adviser to retain ownership, and more importantly control, of its files.

DatAnywhere works alongside its existing file shares, which were accessible after implementation. For Tomasz, this offered a number of benefits, as he said: “Getting the solution up and running is quick and painless − it’s as simple as installing Microsoft Office. As the data doesn’t move, there’s no danger of files going missing or not replicating correctly, and user access is provisioned almost automatically.”

Tomasz added: “We knew that employees were storing data for long periods on their laptops, which are vulnerable and at risk of being misplaced. While we had installed strong cryptography to prevent this being an issue, should the device end up in the wrong hands, it would still be an inconvenience if the original data were lost, not to mention potentially expensive to replace.”

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing