• 1.877.734.6983
  • Log in

Enterprise File Sync and Share Architecture

Best Performance, Scalability and Security

Egnyte Enterprise Architecture VS Consumer–First Architecture

Benefits of Enterprise Architecture

Egnyte EFSS Architecture Benefits

Egnyte Connect was developed from day one with an enterprise Cloud File Server architecture in mind. Our centralized content repository can be managed by IT, for complete control and security, even for large–scale deployments.

Characteristics:

  • Shared Folder Architecture
  • Granular subfolder level permissions
  • Advanced Reporting for Regulatory Requirements & Compliance

Limitations of Consumer–First Architecture

Consumer-First Architecture Limitations

Consumer–first architectures lack shared content repositories. Instead files are tied to each user, who has control over how and with whom their personal files can be shared. IT admins have little visibility over all users’ content.

Characteristics:

  • Scatters content in individual user accounts due to sprawling folder architecture
  • Creates multiple content siloes difficult for IT to manage and track files
  • Puts sensitive business data at risk when sharing files externally

Shared File Server Architecture

Shared File Server Folder Hierarchy and Permissions

Shared File Server Architecture

  • Implement a cloud file server that maps to a shared and private folder hierarchy
  • Import existing folder hierarchy and permissions from your on-premises file stores
  • Integrate with your directory service (AD) to ensure access to the right set of users or groups

Granular Sub-Folder Level Permissions

  • Import permissions from on-premises file stores
  • Manage user permissions at any folder or sub-folder level
  • Ensure only the right user(s) or group has access to the right files

Granular Sub-Folder Level Permissions

Granular Sub-Folder Level Permissions for Secure File Sharing

Advanced Reporting for Regulatory and Compliance

Advanced Reporting for Regulatory and Compliance

Advanced Reporting for Regulatory Requirements & Compliance

  • Access comprehensive auditing and reporting of all file activity events logins, and permission changes
  • See which users and types of devices modify which content, and how files are being shared
  • Minimize data loss with real-time DLP assessment and compliance reporting
Read our Security Architecture Whitepaper