Egnyte's security architecture protects your data at all stages – while being accessed, in transit or at-rest to ensure privacy and data protection for its customers.
Secure Business Collaboration Comprehensive data protection and security
Work better and safer together
Egnyte gives IT a single access point from which to monitor and control files wherever they’re stored. This means full audit capability and data protection for content at end points, in transit, and in storage.
Securing User Accounts
The first line of defense in file security is to specify user access. This starts with built-in controls like password strength, rotation, and two-factor authentication. Egnyte also supports authentication via AD/LDAP/SSO. Next, IT can customize account expiry, easily manage external users, and confirm policies are followed. With full audit capability, IT ensures only the right people have access to the content they need.
Securing User Devices
Set access restrictions based on device type or operating system, with the option to enforce passcode locks on phones and tablets for access to the mobile app. Administrators and end users can also remotely wipe lost or stolen devices to ensure business-critical content never falls into the wrong hands.
Egnyte uses 256-bit AES file encryption and provides customers with unique encryption keys. For added security, Egnyte Enterprise Key Management provides complete control of encryption keys. Additional protection comes from data breach prevention and isolation, with options for data discovery and real-time Data Loss Prevention (DLP) assessment.
Securing Files in Transit
Keep data secure and work confidential during large file transfers. Egnyte uses the SSL protocol with 256-bit encryption for all data transfer sessions. If FTP is enabled, it can be restricted to secure SFTP and FTPES protocols.
Securing Data Centers
We designed our data centers to provide complete confidentiality, integrity and availability for data at rest. They are SSAE-16 Type II compliant, with 24-hour surveillance and biometric access controls. To ensure information is never lost, we’ve implemented N+1 redundancy within each data center, along with additional geographic backups.
5 Security Best Practices
As hackers get smarter, businesses also need to get smarter. Check out these tips to keep your content safe.
Egnyte Security Framework White Paper
Learn how Egnyte delivers end-to-end data protection across each of the security stages.
Egnyte maintains compliance with the strictest standards to ensure privacy and data protection for its customers. See for yourself.