Using hybrid cloud and encryption for secure file sharing

Mar 07, 2014

2014-05-29 Laptop User.jpgSecurity is the top priority for many organizations using file sharing solutions, but protecting business data isn’t always easy to accomplish. Decision makers must be able to guarantee that their information will be safe within the program without limiting the capabilities of the system. To do this, organizations must look at cloud-based file transfer options to deploy a solution that fits overarching demands.

Organizations across a variety of industries are increasingly searching for programs that will allow employees to collaborate in a secure environment without compromising the integrity of their information. However, many businesses are still hesitant to take on online file sharing services. Research by the Enterprise Strategy Group revealed that as vendors layer new features onto existing offerings, companies are investing more in file sharing solutions because of the value the services can bring, CMSWire reported. Many decision makers are showing interest in hybrid systems that provide security and functionality to ensure that users get the most out of their available tools. A majority of respondents noted that they would be open to options that included storing data on premises for better control over information monitoring.

“For large enterprises there is also the additional fact that many of them have invested heavily in data storage in recent years, and it would make economic sense to keep that data in-house, even if the price of data storage in public clouds is cheap and getting cheaper,” according to the source.

Securing the cloud
Hosting sensitive information in the cloud still has significant risks attached to it that could affect the bottom line. The first step to take would be to integrate an enterprise-grade solution, rather than one geared toward consumer needs. Secure file sharing systems will often provide encryption capabilities that will encode the document and prevent unauthorized users from accessing the information. Employees can heighten the protection by deploying double-blind encryption, which allows subscribers to lock information locally with a private key, then sending it to the cloud, where it’s given an outer encryption package by the host, according to Business 2 Community contributor Joe Schwartz. This method makes it significantly more difficult for unapproved individuals to view, effectively securing sensitive data.

“Only the owner of the data, the subscriber or those he or she chooses to share with, can unlock that inner encryption envelope,” Schwartz wrote. “If the data is copied or moved from the server by a unauthorized party, they will need two keys to unlock it.”

Category: Data Security