SlideShare a Scribd company logo
The Enterprise File Fabric
Use Cases
Fabric Services: ACLs, Sharing, Policies, Transfer acceleration, Content
Search, Encryption, Ransomware Protection, Compliance Services
Fabric Connector Interfaces (60+ Supported)
Ingest: Metadata Indexing, Discovery, Antivirus, Streaming
Drives
FTP SFTPREST API
PluginsDesktop Mobile
WebDAVWeb App
Legacy ApplicationsUsers – local/remote
Audit
Object StorageFile Systems
(Filers / NAS /SAN etc.)
Cloud Services
Identity
Provider
Direct Storage
Access
Active Directory
LDAP, SAML
Blockchain
Capable
Access
Company Data
Storage still usable
Directly – no lock in
File Fabric Logical Architecture
Metadata
AI Services
For USERS
Collaborate, manage, search
and share data across all
cloud services securely
For IT
ü Manage cloud sprawl / shadow IT
ü Audit and track shared files
ü Set File Sharing Policies
ü Search across all storage services
Cloud Control
protection fabric
for files
Azure
NAS CIFS FTP
DropBox OpenStack
Sharepoint Salesforce
Office 365 Google Drive/Storage
Amazon S3
A SINGLE
CONTROL POINT
FOR ALL DATA
User Case 1: Single Pane of Glass
Enterprise File Fabric
Users work on files
File Stored in Storage A Seamlessly replicated to
Storage B
File instantly recoverable in the event of a Ransomware attack
Use Case 2: Ransomware Protection
+n
Use Case 3: File Transfer Acceleration
Part 1
Part 2
Part 3
Part 4
Parallel upload/ download streams
= +10x
Or more Increase
Desktop to Cloud
Or
Cloud to Cloud
Tier Data from Tier 1 to Tier 2 storage whether
between racks in the data center or to/from
the Cloud or directly to/from user desktops
Enterprise File Fabric
Users work on files
File Stored in Storage A Seamlessly replicated to
Storage B
If the file is not available in the primary storage it is retrieved from the
secondary storage
Use Case 4: Business Continuity
X
Enterprise File Fabric
Users work on files
Files stream encrypted as transferred to
storage
Remote Storage
If remote storage is breached files still impenetrable
as files are encrypted using FIPS certified encryption
Use Case 5: Security and Protection
Enterprise File Fabric
All unstructured content is indexed and searchable from the File Fabric
client Apps
Use Case 6: Content Search
Enterprise File Fabric
Real Time Content Discovery based on rule templates and Actions
Example: Discover Personal Data and Quarantine
Use Case 7: Content Discovery
Content Index Rules Results Actions
Enterprise File Fabric
• Track / Audit
• Password Protect
• Limit No Downloads
• Time Expire
Any Storage
Embedded into common
productivity Apps:
• Microsoft Outlook
• Mac Mail
• GMail
Use Case 8: Ultra Secure File Sharing
Enterprise File Fabric
• Legacy Apps
• Users
• Systems
• Customers
Examples:
Outsourcing all FTP data to an S3 compatible Cloud but still offering customers FTP
access
Medical Terminal access over SFTP to required data
Use Case 9: Legacy Protocol Gateway
Various Storage
On-Cloud
On-Premises
S3 API
WebDav
FTP / SFTP
Enterprise File Fabric
Exposing a password protected shared folder to external participants to receive or ‘drop’
files is a quick secure way to facilitate collaboration In which all files
are encrypted, audited and tracked
Use Case 10: Drop Folder for external participants
Various Storage
On-Cloud
On-Premises
Password protected shared folder
exposed to external participant
External Users / Company
Audit / Track
Use Case 11: Data Loss Prevention
File Fabric Digital Guardian
DLP
Encrypt
Watermark
Restrict Download
Access Control
Audit / Track
Use Case 12: Object Storage Interface
The File Fabric provide the ‘last mile’ of Object Storage enabling it to be
easily used and consumed by end user over various channels, web,
mobile and through desktop drive and app integrations.
EnterpriseFileFabric
DATA GOVERNANCE AND COMPLIANCE
• Policies to enforce legislative compliance
• Real-time data discovery to enforce policies
• Geo Location Restrictions
• FIPS Certified Data Encryption
• Audit & Track Data
• Data Loss Protection
• Active Archive
Connect Clouds
(Supports 60 + on-cloud and
on-premises storage and
applications)
STEP 1
Index
Index File
Meta-Data
information
STEP 2
SEERVICESBUILTUPONRESTAPI
CONNECT FILE FABRIC PROVIDES
The File Fabric ‘secret ‘sauce’
Enhanced multi-cloud support with over 60+ connectors
Indexing and caching of data provides:
- smart efficient retrieval of large datasets requests
- Metadata retrieval facilitates deep view of data
-
Use Case 13: Data Governance and Compliance
Company moves on-cloud
Users access home
Drive as normal
External Users / Company
Use existing ‘home drive’
To access company docs
That connect to an
Interna lfiler
Use Case 14: File Server Replacement
X
Plugins and integrations into
common productivity Apps such as
Office and Outlook
Use Case 15: Web / Desktop Document Editing
Open on Cloud
Edit on Desktop
With standard Apps
Windows & Mac supported
Office 365 editing on
any supported On-site
on-cloud or 0bject storage
Use Case 18: Multi Cloud Collaboration
BOX
S3
Compatible
DropBox
OpenStack
Google
Drive
SAN
NAS
+ more
Use Case 19: Enhance Existing Cloud Storage
Office 365
One DriveDropBox
Google Drive
+ other Clouds
Ransomware Protection
Active Archive
Content Search
Content Discovery (PII)
FTP / WebDav / S3 access
FIPS Certified encryption
Use Case 20: Connect Site Offices
Site A
Folders can be shared and access from Site A to B and vice-versa
No storage is replicated
Metadata index enables fast on-demand read’s
Data can be uploaded and downloaded
Site B
Local
Storage
Local
Storage
Use Case 21: Remote File Access
Files indexed – not copied or replicated
Non-proprietary no lock-in access to files
Web Scale secure HTTPS SMB access
No Need for Slow VPN or VDI
Local:
NAS / SAN
SMB shares
Windows Filers
Cloud:
Azure Files
Amazon FsX
Azure Netapp Files
Compliant file access for end users
Permissions honored
LDAP / AD integration
Securely access, share and search
Storage Made Easy - File Fabric Use Cases

More Related Content

What's hot

Fantastic Beasts (aka Cloud Audit Issues) and Where to Find Them
Fantastic Beasts (aka Cloud Audit Issues) and Where to Find ThemFantastic Beasts (aka Cloud Audit Issues) and Where to Find Them
Fantastic Beasts (aka Cloud Audit Issues) and Where to Find Them
Suvabrata Sinha
 
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPR
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPRMicrosoft - Policing, Justice and the Law Enforcement Directive & GDPR
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPR
techUK
 
12
1212
Multi Tenancy
Multi TenancyMulti Tenancy
Multi Tenancy
LogicalDOC
 
Secure overlay cloud storage with access
Secure overlay cloud storage with accessSecure overlay cloud storage with access
Secure overlay cloud storage with access
IMPULSE_TECHNOLOGY
 
From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...
From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...
From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...
Edge Pereira
 
KNN Classification Over Semantically secure Encrypt Data
KNN Classification Over Semantically secure Encrypt DataKNN Classification Over Semantically secure Encrypt Data
KNN Classification Over Semantically secure Encrypt Data
Lakshmi Reddy
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
 
LogicalDOC Security Systems
LogicalDOC Security SystemsLogicalDOC Security Systems
LogicalDOC Security Systems
LogicalDOC
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
 
Privacy preserving repositoy
Privacy preserving repositoyPrivacy preserving repositoy
Privacy preserving repositoy
manishajadhav13j
 
Cloud security (domain11 14)
Cloud security (domain11 14)Cloud security (domain11 14)
Cloud security (domain11 14)
Maganathin Veeraragaloo
 
Victoria SPUG - Building Applications with SharePoint Search
Victoria SPUG - Building Applications with SharePoint SearchVictoria SPUG - Building Applications with SharePoint Search
Victoria SPUG - Building Applications with SharePoint Search
Andy Hopkins
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
LeMeniz Infotech
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
Scott Hoag
 
Microsoft Azure Security Infographic
Microsoft Azure Security InfographicMicrosoft Azure Security Infographic
Microsoft Azure Security Infographic
Microsoft Azure
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
javagroup2006
 
Data Integrity proofs in cloud storage
Data Integrity proofs in cloud storageData Integrity proofs in cloud storage
Data Integrity proofs in cloud storage
Sameer Mohd
 
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentAzure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
Roy Kim
 

What's hot (19)

Fantastic Beasts (aka Cloud Audit Issues) and Where to Find Them
Fantastic Beasts (aka Cloud Audit Issues) and Where to Find ThemFantastic Beasts (aka Cloud Audit Issues) and Where to Find Them
Fantastic Beasts (aka Cloud Audit Issues) and Where to Find Them
 
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPR
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPRMicrosoft - Policing, Justice and the Law Enforcement Directive & GDPR
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPR
 
12
1212
12
 
Multi Tenancy
Multi TenancyMulti Tenancy
Multi Tenancy
 
Secure overlay cloud storage with access
Secure overlay cloud storage with accessSecure overlay cloud storage with access
Secure overlay cloud storage with access
 
From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...
From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...
From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...
 
KNN Classification Over Semantically secure Encrypt Data
KNN Classification Over Semantically secure Encrypt DataKNN Classification Over Semantically secure Encrypt Data
KNN Classification Over Semantically secure Encrypt Data
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
LogicalDOC Security Systems
LogicalDOC Security SystemsLogicalDOC Security Systems
LogicalDOC Security Systems
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
Privacy preserving repositoy
Privacy preserving repositoyPrivacy preserving repositoy
Privacy preserving repositoy
 
Cloud security (domain11 14)
Cloud security (domain11 14)Cloud security (domain11 14)
Cloud security (domain11 14)
 
Victoria SPUG - Building Applications with SharePoint Search
Victoria SPUG - Building Applications with SharePoint SearchVictoria SPUG - Building Applications with SharePoint Search
Victoria SPUG - Building Applications with SharePoint Search
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
 
Microsoft Azure Security Infographic
Microsoft Azure Security InfographicMicrosoft Azure Security Infographic
Microsoft Azure Security Infographic
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Data Integrity proofs in cloud storage
Data Integrity proofs in cloud storageData Integrity proofs in cloud storage
Data Integrity proofs in cloud storage
 
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentAzure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
 

Similar to Storage Made Easy - File Fabric Use Cases

Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Amazon Web Services
 
Storage Made Easy Enterprise File Fabric Brochure
Storage Made Easy Enterprise File Fabric Brochure Storage Made Easy Enterprise File Fabric Brochure
Storage Made Easy Enterprise File Fabric Brochure
Hybrid Cloud
 
Spectrum scale object analytics
Spectrum scale object analyticsSpectrum scale object analytics
Spectrum scale object analytics
Smita Raut
 
In Place Analytics For File and Object Data
In Place Analytics For File and Object DataIn Place Analytics For File and Object Data
In Place Analytics For File and Object Data
Sandeep Patil
 
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
Vaultize
 
Consolidating File Servers into the Cloud
Consolidating File Servers into the CloudConsolidating File Servers into the Cloud
Consolidating File Servers into the Cloud
Buurst
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on Cloud
IJMTST Journal
 
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareThe Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
Hybrid Cloud
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)
PT Datacomm Diangraha
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
PT Datacomm Diangraha
 
Analytics with unified file and object
Analytics with unified file and object Analytics with unified file and object
Analytics with unified file and object
Sandeep Patil
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big data
Ulf Mattsson
 
Object Storage Overview
Object Storage OverviewObject Storage Overview
Object Storage Overview
Cloudian
 
Vault 1.4 integrated storage overview
Vault 1.4 integrated storage overviewVault 1.4 integrated storage overview
Vault 1.4 integrated storage overview
Mitchell Pronschinske
 
Bring Object Storage to your Nutanix Cluster with Cloudian HyperStore
Bring Object Storage to your Nutanix Cluster with Cloudian HyperStoreBring Object Storage to your Nutanix Cluster with Cloudian HyperStore
Bring Object Storage to your Nutanix Cluster with Cloudian HyperStore
NEXTtour
 
Spectrum scale-external-unified-file object
Spectrum scale-external-unified-file objectSpectrum scale-external-unified-file object
Spectrum scale-external-unified-file object
Sandeep Patil
 
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
SachinGosavi15
 
Hadoop and Spark Analytics over Better Storage
Hadoop and Spark Analytics over Better StorageHadoop and Spark Analytics over Better Storage
Hadoop and Spark Analytics over Better Storage
Sandeep Patil
 
Liberate Your Files with a Private Cloud Storage Solution powered by Open Source
Liberate Your Files with a Private Cloud Storage Solution powered by Open SourceLiberate Your Files with a Private Cloud Storage Solution powered by Open Source
Liberate Your Files with a Private Cloud Storage Solution powered by Open Source
Isaac Christoffersen
 
The Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud PlatformThe Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud Platform
Hybrid Cloud
 

Similar to Storage Made Easy - File Fabric Use Cases (20)

Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
 
Storage Made Easy Enterprise File Fabric Brochure
Storage Made Easy Enterprise File Fabric Brochure Storage Made Easy Enterprise File Fabric Brochure
Storage Made Easy Enterprise File Fabric Brochure
 
Spectrum scale object analytics
Spectrum scale object analyticsSpectrum scale object analytics
Spectrum scale object analytics
 
In Place Analytics For File and Object Data
In Place Analytics For File and Object DataIn Place Analytics For File and Object Data
In Place Analytics For File and Object Data
 
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
 
Consolidating File Servers into the Cloud
Consolidating File Servers into the CloudConsolidating File Servers into the Cloud
Consolidating File Servers into the Cloud
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on Cloud
 
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareThe Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
Analytics with unified file and object
Analytics with unified file and object Analytics with unified file and object
Analytics with unified file and object
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big data
 
Object Storage Overview
Object Storage OverviewObject Storage Overview
Object Storage Overview
 
Vault 1.4 integrated storage overview
Vault 1.4 integrated storage overviewVault 1.4 integrated storage overview
Vault 1.4 integrated storage overview
 
Bring Object Storage to your Nutanix Cluster with Cloudian HyperStore
Bring Object Storage to your Nutanix Cluster with Cloudian HyperStoreBring Object Storage to your Nutanix Cluster with Cloudian HyperStore
Bring Object Storage to your Nutanix Cluster with Cloudian HyperStore
 
Spectrum scale-external-unified-file object
Spectrum scale-external-unified-file objectSpectrum scale-external-unified-file object
Spectrum scale-external-unified-file object
 
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
 
Hadoop and Spark Analytics over Better Storage
Hadoop and Spark Analytics over Better StorageHadoop and Spark Analytics over Better Storage
Hadoop and Spark Analytics over Better Storage
 
Liberate Your Files with a Private Cloud Storage Solution powered by Open Source
Liberate Your Files with a Private Cloud Storage Solution powered by Open SourceLiberate Your Files with a Private Cloud Storage Solution powered by Open Source
Liberate Your Files with a Private Cloud Storage Solution powered by Open Source
 
The Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud PlatformThe Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud Platform
 

More from Hybrid Cloud

The Enterprise File Fabric for Memset
The Enterprise File Fabric for MemsetThe Enterprise File Fabric for Memset
The Enterprise File Fabric for Memset
Hybrid Cloud
 
The Enterprise File Fabric for Wasabi
The Enterprise File Fabric for WasabiThe Enterprise File Fabric for Wasabi
The Enterprise File Fabric for Wasabi
Hybrid Cloud
 
The Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXThe Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleX
Hybrid Cloud
 
The Enterprise File Fabric for Mirantis
The Enterprise File Fabric for MirantisThe Enterprise File Fabric for Mirantis
The Enterprise File Fabric for Mirantis
Hybrid Cloud
 
The Enterprise File Fabric for Rackspace
The Enterprise File Fabric for RackspaceThe Enterprise File Fabric for Rackspace
The Enterprise File Fabric for Rackspace
Hybrid Cloud
 
The Enterprise File Fabric for IZO Cloud Storage from TATA
The Enterprise File Fabric for IZO Cloud Storage from TATAThe Enterprise File Fabric for IZO Cloud Storage from TATA
The Enterprise File Fabric for IZO Cloud Storage from TATA
Hybrid Cloud
 
The Enterprise File Fabric for Red Hat Ceph Storage
The Enterprise File Fabric for Red Hat Ceph StorageThe Enterprise File Fabric for Red Hat Ceph Storage
The Enterprise File Fabric for Red Hat Ceph Storage
Hybrid Cloud
 
The Enterprise File Fabric for SwiftStack
The Enterprise File Fabric for SwiftStackThe Enterprise File Fabric for SwiftStack
The Enterprise File Fabric for SwiftStack
Hybrid Cloud
 
The Enterprise File Fabric for OpenStack
The Enterprise File Fabric for OpenStackThe Enterprise File Fabric for OpenStack
The Enterprise File Fabric for OpenStack
Hybrid Cloud
 
The Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIOThe Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIO
Hybrid Cloud
 
The Enterprise File Fabric for Leonovus
The Enterprise File Fabric for LeonovusThe Enterprise File Fabric for Leonovus
The Enterprise File Fabric for Leonovus
Hybrid Cloud
 
The Enterprise File Fabric for IBM COS
The Enterprise File Fabric for IBM COSThe Enterprise File Fabric for IBM COS
The Enterprise File Fabric for IBM COS
Hybrid Cloud
 
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
Hybrid Cloud
 
The Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXThe Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleX
Hybrid Cloud
 
The Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIOThe Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIO
Hybrid Cloud
 
The Enterprise File Fabric for Scality
The Enterprise File Fabric for ScalityThe Enterprise File Fabric for Scality
The Enterprise File Fabric for Scality
Hybrid Cloud
 
Enterprise File Fabric for Igneous
Enterprise File Fabric for IgneousEnterprise File Fabric for Igneous
Enterprise File Fabric for Igneous
Hybrid Cloud
 
The Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution BriefThe Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution Brief
Hybrid Cloud
 
Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...
Hybrid Cloud
 
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Hybrid Cloud
 

More from Hybrid Cloud (20)

The Enterprise File Fabric for Memset
The Enterprise File Fabric for MemsetThe Enterprise File Fabric for Memset
The Enterprise File Fabric for Memset
 
The Enterprise File Fabric for Wasabi
The Enterprise File Fabric for WasabiThe Enterprise File Fabric for Wasabi
The Enterprise File Fabric for Wasabi
 
The Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXThe Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleX
 
The Enterprise File Fabric for Mirantis
The Enterprise File Fabric for MirantisThe Enterprise File Fabric for Mirantis
The Enterprise File Fabric for Mirantis
 
The Enterprise File Fabric for Rackspace
The Enterprise File Fabric for RackspaceThe Enterprise File Fabric for Rackspace
The Enterprise File Fabric for Rackspace
 
The Enterprise File Fabric for IZO Cloud Storage from TATA
The Enterprise File Fabric for IZO Cloud Storage from TATAThe Enterprise File Fabric for IZO Cloud Storage from TATA
The Enterprise File Fabric for IZO Cloud Storage from TATA
 
The Enterprise File Fabric for Red Hat Ceph Storage
The Enterprise File Fabric for Red Hat Ceph StorageThe Enterprise File Fabric for Red Hat Ceph Storage
The Enterprise File Fabric for Red Hat Ceph Storage
 
The Enterprise File Fabric for SwiftStack
The Enterprise File Fabric for SwiftStackThe Enterprise File Fabric for SwiftStack
The Enterprise File Fabric for SwiftStack
 
The Enterprise File Fabric for OpenStack
The Enterprise File Fabric for OpenStackThe Enterprise File Fabric for OpenStack
The Enterprise File Fabric for OpenStack
 
The Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIOThe Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIO
 
The Enterprise File Fabric for Leonovus
The Enterprise File Fabric for LeonovusThe Enterprise File Fabric for Leonovus
The Enterprise File Fabric for Leonovus
 
The Enterprise File Fabric for IBM COS
The Enterprise File Fabric for IBM COSThe Enterprise File Fabric for IBM COS
The Enterprise File Fabric for IBM COS
 
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
 
The Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXThe Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleX
 
The Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIOThe Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIO
 
The Enterprise File Fabric for Scality
The Enterprise File Fabric for ScalityThe Enterprise File Fabric for Scality
The Enterprise File Fabric for Scality
 
Enterprise File Fabric for Igneous
Enterprise File Fabric for IgneousEnterprise File Fabric for Igneous
Enterprise File Fabric for Igneous
 
The Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution BriefThe Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution Brief
 
Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...
 
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

Storage Made Easy - File Fabric Use Cases

  • 1. The Enterprise File Fabric Use Cases
  • 2. Fabric Services: ACLs, Sharing, Policies, Transfer acceleration, Content Search, Encryption, Ransomware Protection, Compliance Services Fabric Connector Interfaces (60+ Supported) Ingest: Metadata Indexing, Discovery, Antivirus, Streaming Drives FTP SFTPREST API PluginsDesktop Mobile WebDAVWeb App Legacy ApplicationsUsers – local/remote Audit Object StorageFile Systems (Filers / NAS /SAN etc.) Cloud Services Identity Provider Direct Storage Access Active Directory LDAP, SAML Blockchain Capable Access Company Data Storage still usable Directly – no lock in File Fabric Logical Architecture Metadata AI Services
  • 3. For USERS Collaborate, manage, search and share data across all cloud services securely For IT ü Manage cloud sprawl / shadow IT ü Audit and track shared files ü Set File Sharing Policies ü Search across all storage services Cloud Control protection fabric for files Azure NAS CIFS FTP DropBox OpenStack Sharepoint Salesforce Office 365 Google Drive/Storage Amazon S3 A SINGLE CONTROL POINT FOR ALL DATA User Case 1: Single Pane of Glass
  • 4. Enterprise File Fabric Users work on files File Stored in Storage A Seamlessly replicated to Storage B File instantly recoverable in the event of a Ransomware attack Use Case 2: Ransomware Protection
  • 5. +n Use Case 3: File Transfer Acceleration Part 1 Part 2 Part 3 Part 4 Parallel upload/ download streams = +10x Or more Increase Desktop to Cloud Or Cloud to Cloud Tier Data from Tier 1 to Tier 2 storage whether between racks in the data center or to/from the Cloud or directly to/from user desktops
  • 6. Enterprise File Fabric Users work on files File Stored in Storage A Seamlessly replicated to Storage B If the file is not available in the primary storage it is retrieved from the secondary storage Use Case 4: Business Continuity X
  • 7. Enterprise File Fabric Users work on files Files stream encrypted as transferred to storage Remote Storage If remote storage is breached files still impenetrable as files are encrypted using FIPS certified encryption Use Case 5: Security and Protection
  • 8. Enterprise File Fabric All unstructured content is indexed and searchable from the File Fabric client Apps Use Case 6: Content Search
  • 9. Enterprise File Fabric Real Time Content Discovery based on rule templates and Actions Example: Discover Personal Data and Quarantine Use Case 7: Content Discovery Content Index Rules Results Actions
  • 10. Enterprise File Fabric • Track / Audit • Password Protect • Limit No Downloads • Time Expire Any Storage Embedded into common productivity Apps: • Microsoft Outlook • Mac Mail • GMail Use Case 8: Ultra Secure File Sharing
  • 11. Enterprise File Fabric • Legacy Apps • Users • Systems • Customers Examples: Outsourcing all FTP data to an S3 compatible Cloud but still offering customers FTP access Medical Terminal access over SFTP to required data Use Case 9: Legacy Protocol Gateway Various Storage On-Cloud On-Premises S3 API WebDav FTP / SFTP
  • 12. Enterprise File Fabric Exposing a password protected shared folder to external participants to receive or ‘drop’ files is a quick secure way to facilitate collaboration In which all files are encrypted, audited and tracked Use Case 10: Drop Folder for external participants Various Storage On-Cloud On-Premises Password protected shared folder exposed to external participant External Users / Company
  • 13. Audit / Track Use Case 11: Data Loss Prevention File Fabric Digital Guardian DLP Encrypt Watermark Restrict Download Access Control Audit / Track
  • 14. Use Case 12: Object Storage Interface The File Fabric provide the ‘last mile’ of Object Storage enabling it to be easily used and consumed by end user over various channels, web, mobile and through desktop drive and app integrations. EnterpriseFileFabric
  • 15. DATA GOVERNANCE AND COMPLIANCE • Policies to enforce legislative compliance • Real-time data discovery to enforce policies • Geo Location Restrictions • FIPS Certified Data Encryption • Audit & Track Data • Data Loss Protection • Active Archive Connect Clouds (Supports 60 + on-cloud and on-premises storage and applications) STEP 1 Index Index File Meta-Data information STEP 2 SEERVICESBUILTUPONRESTAPI CONNECT FILE FABRIC PROVIDES The File Fabric ‘secret ‘sauce’ Enhanced multi-cloud support with over 60+ connectors Indexing and caching of data provides: - smart efficient retrieval of large datasets requests - Metadata retrieval facilitates deep view of data - Use Case 13: Data Governance and Compliance
  • 16. Company moves on-cloud Users access home Drive as normal External Users / Company Use existing ‘home drive’ To access company docs That connect to an Interna lfiler Use Case 14: File Server Replacement X Plugins and integrations into common productivity Apps such as Office and Outlook
  • 17. Use Case 15: Web / Desktop Document Editing Open on Cloud Edit on Desktop With standard Apps Windows & Mac supported Office 365 editing on any supported On-site on-cloud or 0bject storage
  • 18. Use Case 18: Multi Cloud Collaboration BOX S3 Compatible DropBox OpenStack Google Drive SAN NAS + more
  • 19. Use Case 19: Enhance Existing Cloud Storage Office 365 One DriveDropBox Google Drive + other Clouds Ransomware Protection Active Archive Content Search Content Discovery (PII) FTP / WebDav / S3 access FIPS Certified encryption
  • 20. Use Case 20: Connect Site Offices Site A Folders can be shared and access from Site A to B and vice-versa No storage is replicated Metadata index enables fast on-demand read’s Data can be uploaded and downloaded Site B Local Storage Local Storage
  • 21. Use Case 21: Remote File Access Files indexed – not copied or replicated Non-proprietary no lock-in access to files Web Scale secure HTTPS SMB access No Need for Slow VPN or VDI Local: NAS / SAN SMB shares Windows Filers Cloud: Azure Files Amazon FsX Azure Netapp Files Compliant file access for end users Permissions honored LDAP / AD integration Securely access, share and search