Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Easily Find and Secure Sensitive Data in Gmail with Egnyte

Gmail is an immensely popular service, with nearly 2 billion active accounts. And as the service has grown, businesses have turned to it for all kinds of things it was never meant to do: user authentication, password recovery, and perhaps most problematic, the passing of sensitive or regulated data between parties.

Locate and Protect GDPR-Related Sensitive Data in SharePoint

The General Data Protection Regulation (GDPR) established rules for handling personal information in the EU. And with strict penalties for noncompliance, it puts the onus on businesses like yours to know where all their GDPR-related data is located and how it’s treated.

How Subcontractors Can Identify CUI Data in Google Workspace

The US federal government has increasingly focused on supply chain security in recent years, which puts added pressure on subcontractors to not be the weakest link. Due to the nature of federal contracts, government contractors typically possess data called Controlled Unclassified Information, or CUI, if they supply goods or services directly to the federal government.

6 Ways Biotechs Can Use AI, Automation to Maximize Data at Scale

For years, biotechs have been hampered by the administrative burden of seemingly endless amounts of diverse, siloed data, slow data ingestion, and security threats coming from internal and external sources. And yet, the life sciences industry continues to see double-digit growth. It’s now worth $285 billion a year, with no signs of slowing down.

November Release Rollup: Dark Mode, Confidence Scores, and More

As we enter the holiday season, Egnyte is excited to share a number of updates to its platform, including user experience improvements, new governance functionality, and enhancements to search on mobile. Check out some of our top product releases for November below.

How Egnyte Got Its Engineers to Use a New Configuration System

You can build the best system in the world, but it won’t matter if no one uses it. That might sound obvious, but it’s often overlooked. Getting your users to buy into a new system is not as easy as flipping a switch. It takes planning, initiative, and reinforcement to make sure your software is broadly adopted.

Get the Most Out of the Desktop App with Search, Recents

Egnyte users want to get the files they need as fast as possible. Less time spent scouring folders means more time doing the work that really matters, and one of the best ways to do that is with the Egnyte Desktop App. With the Egnyte Desktop App you get real-time access to all your files and folders stored in the cloud, directly from your computer.

Discover PII Data in Microsoft Exchange Online With Egnyte

Your organization runs on information, and much of that information is sensitive. You need consistent governance policies to protect users and data, but just protecting files is not enough. You also need to be able to scan your documents quickly and easily to find personally identifiable information (PII). More than three-quarters of companies have files housed in email repositories, and these often contain customer PII, health records, and other sensitive information.

3 Trends in eTMF Adoption After COVID-19

The TMF Summit, a clinical documentation management conference hosted by industry observer Fierce Biotech, was held in late October in New Orleans. There was plenty of talk about familiar topics such as data quality and integrity, as well as data submission workflows and monitoring. But what stood out this year was how the pandemic continues to reshape the industry.

Why You Should Build an Agile, Integrated Construction Tech Stack

When it comes to construction technology, one size doesn’t necessarily fit all. Businesses often have different needs that require different tools to automate established processes, or standard operating procedures (SOPs). This creates a problem, however, because decision makers have to sift through the available technologies—and the depth and breadth of what processes they can cover—to find the right solution.