Knowledge management framework
on a leading Data Security Start-up
Data security and EFSS (Enterprise file secure sharing) ADITH DEV AKKARA
E-02
15020441017
The Company
Like drop box with EFSS (enterprise file sharing and security)
End to end data security and sharing
Having control over your data consumption and sharing
Presence
 1 technology office in Pune
 Multiple marketing offices all over the world
Industry practices
There was no solution for end to end back up with built in
sharing controls and at source de – duplication of data.
Companies relied on drop box or similar applications for
sharing data
No control on consumption of data and re sharing of data at
all end points (PC or Mobile)
Data could be shared from source to certain nodes, after
which control on sharing and consumption of data was lost.
The Company improvised
Have a centralised vault controlled by the company
Company controls the sharing and consumption of data, at all
end nodes
Company Improvised (Contd.)
 User has to use company specific software for consumption and sharing
of data
 Use encryptions to store – first encrypt then store policy
 Encryption techniques used are proprietary with minimum bandwidth
consumption at source and destination.
Results
 Adaptive algorithms are used in client software that continuously
monitors the CPU, memory and network utilization on the device and
accordingly controls the speed of backup.
 Therefore when user is actively working on the device, the software
ensures that it does not hamper the user productivity
Results
Because of global de-duplication across all users and devices
the amount of storage required on the server is highly reduced
Policy-based file-level and folder-level encryption of data on
Windows endpoints to protect it
THANK YOU
Adith Dev Akkara
E-02, 15020441017
SYMBIOSIS INSTITUTE OF MANAGEMENT
STUDIES

In data security

  • 1.
    Knowledge management framework ona leading Data Security Start-up Data security and EFSS (Enterprise file secure sharing) ADITH DEV AKKARA E-02 15020441017
  • 2.
    The Company Like dropbox with EFSS (enterprise file sharing and security) End to end data security and sharing Having control over your data consumption and sharing
  • 3.
    Presence  1 technologyoffice in Pune  Multiple marketing offices all over the world
  • 4.
    Industry practices There wasno solution for end to end back up with built in sharing controls and at source de – duplication of data. Companies relied on drop box or similar applications for sharing data No control on consumption of data and re sharing of data at all end points (PC or Mobile) Data could be shared from source to certain nodes, after which control on sharing and consumption of data was lost.
  • 5.
    The Company improvised Havea centralised vault controlled by the company Company controls the sharing and consumption of data, at all end nodes
  • 6.
    Company Improvised (Contd.) User has to use company specific software for consumption and sharing of data  Use encryptions to store – first encrypt then store policy  Encryption techniques used are proprietary with minimum bandwidth consumption at source and destination.
  • 7.
    Results  Adaptive algorithmsare used in client software that continuously monitors the CPU, memory and network utilization on the device and accordingly controls the speed of backup.  Therefore when user is actively working on the device, the software ensures that it does not hamper the user productivity
  • 8.
    Results Because of globalde-duplication across all users and devices the amount of storage required on the server is highly reduced Policy-based file-level and folder-level encryption of data on Windows endpoints to protect it
  • 9.
    THANK YOU Adith DevAkkara E-02, 15020441017 SYMBIOSIS INSTITUTE OF MANAGEMENT STUDIES