Egnyte

Aug 19, 2018
2007
Mountain View, CA, USA
Apr 10, 2019   |  By Willy Picard
Egnyte Protect relies heavily on Machine Learning technology to defend you against insider attacks. Powered by the Google Document Understanding AI which was just announced at Google Next 2019 – our advanced insider attack detection identifies access anomalies that could potentially be a data leakage.
Apr 3, 2019   |  By Niamh Conlon
Picture this. You are a young and thriving architecture and engineering firm with over 160 employees in 13 offices across the US. You handle national rollouts for some of the most recognizable restaurants, big box chain retail stores, banks, and grocery stores.
Mar 14, 2019   |  By Kris Lahiri
Earlier this week security firm Adversis published an article that exposed a vulnerability with a consumer-grade file sharing provider, which was created by the use of public links. For those who may not be familiar, many content collaboration solutions allow users to create links to one or more files or folders that can easily be shared internally or externally via text, email, social media, etc. (more info on links).
Mar 12, 2019   |  By Willy Picard
Machine learning (ML) technology has the potential to generate tremendous value for businesses. It is already proving itself in the market and powering a growing number of tools across virtually every industry. In order to discuss the current capabilities of ML, we must first examine how it relates to artificial intelligence (AI). Then, we can explore where ML software is today, its real-world applications, and how it’s transforming business.
Feb 28, 2019   |  By Kris Lahiri
It’s no secret that your digital footprint is growing. Whether your business has 10 employees in one office or 2,000 employees in offices all over the world, you’re creating more content today than you did two years ago—or 2 months ago for that matter. Along with increased volume, content itself has evolved to encompass much richer media, like HD videos and CAD files.
Aug 19, 2018   |  By Egnyte
Understand how Egnyte offers end-to-end data protection through the five stages of security (physical, network, transmission, access, and data).
Aug 1, 2018   |  By Egnyte
Understand the five essential elements for securing data in the cloud. This white-paper provides a checklist for CSOs to ensure secure data migration to the cloud.
Aug 1, 2018   |  By Egnyte
Moving to the cloud represents a significant IT investment for a business. Learn what CIOs need to look for in a cloud storage provider.
Oct 1, 2017   |  By Egnyte
Are you struggling to manage the mountain of data created by your company? This research report discusses how to tackle the enterprise data management gap. It all starts with data visibility.
Sep 1, 2017   |  By Egnyte
What are the opportunities and advantages associated with content collboration platforms? Learn more about content governance challenges organizations face as data becomes further decentralized.
Mar 28, 2019   |  By Egnyte
Is there one easy way to protect your most critical data? Naaah! But check out this video to see what you can do.
Oct 9, 2018   |  By Egnyte
Advanced classification methods like OCR identifies sensitive information within scanned documents making data protection a priority.
Oct 9, 2018   |  By Egnyte
Save email attachments directly into your Egnyte Connect folders without ever leaving your Gmail inbox. Save files to a shared folder and they are automatically accessible to your co-workers, vendors or partners – anyone with whom you’ve shared the folder. Now you’re all on the same page.
Jul 25, 2018   |  By Egnyte
Egnyte eases Bio-Techne's acquisition process while maintaining HIPAA, FDA, GDPR, and SOX compliance.
Jul 25, 2018   |  By Egnyte
See how Egnyte helped A.S. Roma streamline its media operations without sacrificing data security or content visibility.