• 1.877.734.6983
  • Log in

Egnyte Security Architecture

Comprehensive Data Protection and Privacy for Enterprises

Watch Video

With BYOD policies, proliferation of consumer cloud applications, and increased privacy and data-residency regulations, data breaches and compliance failures are becoming real concerns.

Egnyte has a comprehensive approach to security that offers complete control (choice of storage – cloud or on premises), data protection (at end points, in transit, and storage) and universal visibility (over all data, users and activities).

User Security with Granular Access Controls

User Security

Authentication, authorization, and access controls

Device Security with Remote Wipe and Device Pinning

Device Security

Data protection at the end points

  • Password enforcement and authentication policies
  • 256-bit on-device encryption for local files
  • Native Mobile Device Management (MDM) capabilities, such as remote wipe and device pinning
Network Security with 256-bit encryption

Network Security

Confidentiality and protection for data while in transit

  • HTTPS or FTP-ES used for secure communication
  • SSL protocol used for all data transfer sessions
  • 256-bit encryption applied to all data in transit
SSAE-16 Tier II complaint data centers

Data Center Security

Confidentiality, integrity and availability of data at rest

  • SSAE-16 Type II compliant data centers
  • Physical security with 24-hour surveillance and biometric access controls
  • Disaster recovery policies and continuous threat assessment
Content Security with Data Loss Prevention

Content Security

Data breach prevention and isolation

  • 256-bit AES encryption at rest with key hand-off options
  • Data discovery and real-time Data Loss Prevention (DLP) assessment
  • Domain-level data isolation (unique keys per customer)
  • Granular link-sharing controls
Strong security framework and compliance

Governance, Risk and Compliance

Strong institutionalized security framework