Learn about ShareFile’s security features.
Some of the biggest challenges IT teams face today stem from data loss and security risks caused by the unauthorized use of personal file sharing services. Using personal file sharing services for business purposes invites data leakage and compliance violations, allowing files to escape beyond the visibility and control of IT. Users, however, want the ability to access and share data from anywhere, on any device they choose.
The only way for IT to stop the spread of uncontrolled data sharing is to address this need through an IT-approved application that meets employees’ needs better than any consumer service could. A true enterprise file sync and sharing service combines the convenience and simplicity of a personal file sharing service with enterprise-oriented features to increase productivity as well as provide increased security, flexibility and control for IT.
Citrix ShareFile eliminates the threat posed by consumer file sharing services and provides the industry’s most comprehensive set of data protection features. IT maintains total control over data access, storage, and sharing across the organization—including the control to audit, track, and log all user activity to support compliance requirements and provide visibility into data usage.
With ShareFile, files are encrypted both at rest and in transit. A remote wipe feature allows secure destruction of all ShareFile-stored data and passwords on a device that has been compromised. IT can also remove a device from the list of devices that can access ShareFile accounts, or lock a device to restrict its use for a defined period of time. A poison pill capability lets IT prescribe data expiration policies for mobile devices.
Citrix ShareFile integrates with popular DLP systems including Symantec Data Loss Prevention, McAfee DLP Prevent, and Websense Forcepoint to restrict document sharing based on the file’s DLP classification. Enterprises need to be able to control file sharing based on the content inside the files themselves. Through integrations with leading data loss prevention systems, ShareFile will classify items based on their content and enforce sharing restrictions based on data categories.
Information rights management (IRM) adds an extra layer of protection to sensitive data. With IRM, files stay protected from unauthorized access, even after being shared or downloaded to an unprotected device. With Citrix ShareFile IRM capabilities, data security features “follow” the file, even if it leaves the ShareFile system and finds its way onto USB drives or email attachments. When a file is shared with rights management protections, access to the file requires ShareFile authentication—even after the file has been downloaded.
ShareFile customer-managed encryption keys leverage Amazon’s Key Management Solution to give customers the data security control they need. Customer files reside within the ShareFile application, but the generation—and control—of the encryption keys occurs within Amazon KMS.
ShareFile customers using Citrix-managed StorageZones to store their files can manage encryption keys and use Amazon WebServices to generate a master key. The master key encrypts ShareFile data uploaded to the cloud using a dual encryption key paradigm. A master key is stored securely within your Amazon KMS account and never exported outside of that environment, while a data key can be generated and exported outside of the KMS environment. This simplifies the management of encrypted data and establishes a level of trust between the cloud service provider and customer.
Citrix ShareFile empowers federal agency teams, contractors, and partners to instantly access and securely exchange confidential information anytime, anywhere, on any device. Federal IT departments gain complete visibility and granular control over all end-user data sharing activity. ShareFile delivers the operational efficiency, seamless collaboration, and enhanced productivity benefits of the cloud while ensuring the IT oversight required to comply with evolving public sector regulations. Agencies choose to store proprietary government documents in on-premises data centers, public or private clouds, or a hybrid architecture that encompasses all compliance, cost, and performance requirements. Federal employees and government contractors rely on a single point of access to connect to data everywhere.