Security and Privacy

Empowering IT to have Complete Control

Security and privacy are the top concerns of businesses when adopting new file sharing platforms. With growing data and users, comes additional risks of unprotected file sharing and data leaks.

As the industry leader of enterprise file sharing, Egnyte provides world-class security and control for all its customers. In addition to providing maximum protection for data storage, sharing and access, Egnyte also adheres to strict government compliances and privacy regulations.

  • Access Controls

    Access Controls

    No matter what access method (web browser, map drive, FTP, mobile apps), all users must go through an authentication process before accessing their files. IT has complete control over user login behavior with password policy management and can set additional levels of authentication with multi-step login verification. Even after logging in with the correct credentials, user permissions are granularly enforced at every folder and sub-folder level, ensuring only the right users have access to the right files. Egnyte also integrates with any existing AD/LDAP/SSO system, making it easy for IT to centrally manage users and permissions.

  • Storage Layers

    Storage Layers

    Egnyte offers multiple storage deployment models for files of every security classification. Sensitive files, such as financial documents or protected health information, can be stored behind the firewall on local storage. Employees can securely access private files without using VPN or cloud storage. Collaborative files on the other hand can be stored in the cloud, easily accessible by internal and external collaborators. Having multiple storage options allows IT to keep data where it belongs, without sacrificing security and privacy.

  • Real-time Auditing

    Real-time Auditing

    One of the core benefits of having centralized administration is the ability to monitor and track account activities regardless of where files are stored. With Egnyte, IT can generate real-time reports on usage activities, file actions, permission changes and mobile device access. With these reports, IT can understand usage behaviors, monitor suspicious activities, and gain insight into potential security concerns.

  • Data during Transmission

    Data during Transmission

    Egnyte has adopted the transmission practices of the most secure institutions in the world by using 256-bit AES encryption to encode data during transmission. 256-bit AES encryption is the strictest standard applied by the US Government for TOP SECRET documentation and ensures that even if company data were intercepted, it would be impossible to decipher. Even in the event an employee device is lost or stolen, company files are encrypted locally and can be remotely wiped at any time.

  • Data at Rest

    Data at Rest

    Egnyte also encrypts data at rest. All files stored on Egnyte RAID6 servers are automatically encrypted using AES 256-bit encryption. If someone were to gain access to data on the servers, the data would be impossible to read. The encryption key is stored in a secure key vault that is a separate database decoupled from the raw storage layer. As a final precaution, administrators have the option to replicate their data to a secondary Tier II, SSAE 16 compliant facility where it is again replicated on RAID6 servers.

  • Network Security

    Network Security

    In order to police traffic between public networks and the servers where company data resides, Egnyte employs ICSA-certified firewalls. These firewalls are built to recognize and handle multiple synchronous threats (e.g. DDoS attacks) without performance degradation. The network uses SSL encryption and a Network Intrusion Detection System that monitors and blocks hackers, worms, phishing, and all other infiltration methods.

  • Physical Security

    Physical Security

    Egnyte houses all file servers in industry-leading Tier II, SSAE 16 compliant colocation facilities that feature 24-hour manned security, biometric access control, and video surveillance. All servers reside in private cages that require physical keys to open. The servers are never equipped with USB ports or CD/DVD drives, ensuring that data cannot be copied or removed from the devices. All data centers hosting these servers are audited annually for potential risks and limitations. 

Privacy and Compliance

  • FINRA logo

    Financial Services

    Egnyte offers FINRA compliant online storage solution with complete end-to-end data protection. Egnyte enables full compliance under SEC 17a, 31a, 204 Recordkeeping regulations for confidential data storage, retention, digitalization and accessibility.
    Download Financial Services Security White Paper

  • HIPAA logo

    Healthcare

    Egnyte understands the importance of the confidentiality and protection of an individual's Protected Health Information (PHI). Egnyte's comprehensive data security enables HIPAA compliance for Payer, Provider, pharmaceutical and biomedical businesses.
    Download Egnyte HIPAA Statement
    Download Egnyte HIPAA Business Associate Agreement

  • TrustE Logo

    EU Customers

    Egnyte complies with the EU Safe Harbor framework as set forth by the Department of Commerce regarding the collection, use, and retention of data from the European Union. Unlike other providers, Egnyte does not store EU data in US datacenters. All EU data is stored in local storage at the customer's EU location or in Egnyte's EU datacenter.

  • Skyhigh

    Skyhigh

    Skyhigh Networks performs objective and thorough evaluations of the enterprise-readiness of cloud service based on a detailed set of criteria developed in conjunction with the Cloud Security Alliance (CSA). Services designated as Skyhigh Enterprise-Ready are the services receiving the highest CloudTrust™ Ratings, which fully satisfy the most stringent requirements for data protection, identity verification, service security, business practices, and legal protection.
    Cloud Trust Program

Security White Paper

Want to learn more? Download the Egnyte Security Architecture White Paper.