Mountain View, CA, USA
Apr 10, 2019 | By Willy Picard
Egnyte Protect relies heavily on Machine Learning technology to defend you against insider attacks. Powered by the Google Document Understanding AI which was just announced at Google Next 2019 – our advanced insider attack detection identifies access anomalies that could potentially be a data leakage.
Apr 3, 2019 | By Niamh Conlon
Picture this. You are a young and thriving architecture and engineering firm with over 160 employees in 13 offices across the US. You handle national rollouts for some of the most recognizable restaurants, big box chain retail stores, banks, and grocery stores.
Mar 14, 2019 | By Kris Lahiri
Earlier this week security firm Adversis published an article that exposed a vulnerability with a consumer-grade file sharing provider, which was created by the use of public links. For those who may not be familiar, many content collaboration solutions allow users to create links to one or more files or folders that can easily be shared internally or externally via text, email, social media, etc. (more info on links).
Mar 12, 2019 | By Willy Picard
Machine learning (ML) technology has the potential to generate tremendous value for businesses. It is already proving itself in the market and powering a growing number of tools across virtually every industry. In order to discuss the current capabilities of ML, we must first examine how it relates to artificial intelligence (AI). Then, we can explore where ML software is today, its real-world applications, and how it’s transforming business.
Feb 28, 2019 | By Kris Lahiri
It’s no secret that your digital footprint is growing. Whether your business has 10 employees in one office or 2,000 employees in offices all over the world, you’re creating more content today than you did two years ago—or 2 months ago for that matter. Along with increased volume, content itself has evolved to encompass much richer media, like HD videos and CAD files.
Aug 19, 2018 | By Egnyte
Understand how Egnyte offers end-to-end data protection through the five stages of security (physical, network, transmission, access, and data).
Five Essential Elements of Cloud Security: Understanding The Risks And Requirements To Deploy Secure File Services In The Cloud
Aug 1, 2018 | By Egnyte
Understand the five essential elements for securing data in the cloud. This white-paper provides a checklist for CSOs to ensure secure data migration to the cloud.
Meeting Data Governance Requirements Starts with Data Visibility: Tackling the Enterprise Data Management Gap.
Oct 1, 2017 | By Egnyte
Are you struggling to manage the mountain of data created by your company? This research report discusses how to tackle the enterprise data management gap. It all starts with data visibility.
Sep 1, 2017 | By Egnyte
What are the opportunities and advantages associated with content collboration platforms? Learn more about content governance challenges organizations face as data becomes further decentralized.
Oct 9, 2018 | By Egnyte
Save email attachments directly into your Egnyte Connect folders without ever leaving your Gmail inbox. Save files to a shared folder and they are automatically accessible to your co-workers, vendors or partners – anyone with whom you’ve shared the folder. Now you’re all on the same page.