Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How Human Resources Practitioners Use Egnyte

Director of Global HR Operations, Dee DeWinter, showcases how she utilizes Egnyte to make her job easy, simple, and secure. In this video, she shares how to create and manage workflows, share securely through DocuSign, and set folder permissions within a demo environment. Whether your preference is Microsoft or Google products, you can easily create assets within Egnyte, edit as needed, and benefit from autosave features that make changes immediately available for everyone with access to the file or folder.

Folder Notifications via Email

When you work collaboratively in a folder, make sure you stay up to date with changes by turning on folder notifications! From the My Preferences section of your user profile, select Receive folder notification emails for chosen folders and your desired frequency. Then, navigate to the folder locations of your choice, and Select Folder Details and Options under More. From the Options tab, you’ll be able to choose your notification preferences for when content is “added, updated, or removed” or “downloaded and previewed.”

Remotely Removing a Device

Imagine one of your users has their company device stolen. Don’t panic. Egnyte allows you to manage user devices by remotely removing any Egnyte content synced for offline access. Simply navigate to Settings, then Devices. Select the device of your choice, then Remote Wipe to delete all of the Egnyte content synced locally to the device. You can even go a step further to prevent any unwanted access to Egnyte and forcing a logout by selecting Remove Device.

Review and Approval Workflows

Easily streamline collaborative procedures and perform document review and approval using Workflows in Egnyte. From the file preview, under the Workflows menu, you can add a one-step task, or a multi-step workflow for each stage of review, including final approval. For GxP domains, approval includes Part 11-compliant digital signatures. Collaborators are automatically notified when the workflow moves to a step they’re assigned to.

CEO Customer Spotlight with First Republic Bank

Learn about trends in the financial services industry, the intersection of content collaboration and data governance, and new techniques to adapt to the hybrid work era as Vineet Jain, Co-Founder and CEO of Egnyte, sits down with Joe Sarci, Deputy Chief Information Officer at First Republic Bank. Egnyte is #1 in cloud content governance. SaaS software trusted by 16,000+ content-critical businesses worldwide.

Defending Against Insider Threats with Egnyte

An insider threat is perhaps the most difficult threat to deal with for most organizations. It occurs when someone uses legitimate access to copy, expose, damage, or delete sensitive information. It can be accidental, such as when a sensitive file is placed in a folder accessible to all employees. Or, it can be intentional, such as when an employee preparing to resign copies sensitive files to take with them. It can even be malicious, such as when a disgruntled employee intentionally deletes critical files.

Top Findings and Insights from Egnyte's New Data Governance Trends Report

Learn about the latest research on cloud security, data governance, and how IT leaders are preparing for the future of digital work. The Egnyte Data Governance Trends Report is based on responses from 400 CIOs and CISOs regarding the state of their data governance programs and the threats that keep them up at night. We'll dissect some of the most surprising and revealing findings, and share real-world examples that underscore their implications for IT teams of all sizes.

Detect & Mitigate Your Ransomware Risk with Egnyte

In this video, Egnyte’s Chief Governance Officer Jeff Sizemore & Senior Manager of Governance Marketing Neil Jones discuss recent trends in ransomware detection and how you can mitigate potential attacks. A brief demo is provided at the end, where you will learn how to recover from a ransomware attack. Ransomware attacks continue to proliferate. We want users to understand the current state of ransomware attacks and to be able to prepare for attacks and manage them more effectively.

Whitelist Sensitive Content Locations

Whitelist sensitive data locations so you are notified about what matters most. To keep content in your repository secure and compliant, Egnyte scans all of your folder locations for sensitive content. However, there are often folders where sensitive content is intentionally allowed to live. To whitelist sensitive content by location or policy, first select the Sensitive Content tab.

The Fastest Way to Put Large Data Sets to Work

The use by AEC firms of reality capture devices, like drones and 3D cameras, has exponentially increased the amount of data that they collect in the field but to unlock its value and be actionable it must go through a time and computing-intensive process that is easier said than done. Transferring that data to an office or the public cloud can take hours, days or weeks, significantly impacting project timelines.