FileFlex

FileFlex Zero Trust Data Access brings security and order to the chaos of unstructured data

The FileFlex zero trust data access overlay service provides unified and secure remote access to all unstructured data across your organization helping to mitigate today’s ransomware crisis.

 

FileFlex Enterprise Brings Plug and Play Zero Trust Data Access to Enterprise Data on a Per Transaction Basis

Using our data access policy server, FileFlex Enterprise continually authenticates, verifies and grants or denies access to information on a per transaction basis via an exchange of anonymous secure tokens.

New encryption keys are generated for every session and tokens are available only per session. The use of tokens protects user and device credentials since they are not stored on the FileFlex Enterprise server or with the service provider (MSP).

Direct access to resources is not permitted. All access is via the connector agent which acts as a proxy for the user.

Remote Access and Sharing of Files and Folders According to Dynamic, Granular Policy

Granular File and Folder Level Microsegmentation

FileFlex Enterprise provides micro-segmented file and folder level access to prevent lateral movement.

No Access to the Infrastructure

All Resource Authentication and Authorization is Dynamic and Strictly Enforced Before Access is Allowed

FileFlex Enterprise Considers All Data Sources and Computing Devices as Resources

Secures All Communications Regardless of Network Location

Detailed Activity Logging

Built Ground Up on a Zero Trust Architecture

And That’s Not All… FileFlex Enterprise Software Gives you ZTDA and all the Security Features You Expect.

Active Directory and LDAP Integration

Support for Single Sign-On (SSO) (SAML)

User Authentication of Shared Files

Device Authentication

Support for Multi-Factor Authentication and U2F Devices

Protection of Credentials

Restricted Administrator Access

Optional Intel® SGX

Has the option of using Intel® SGX platform hardened secure enclaves for encryption key generation to provide added protection at the deepest level – within the silicon itself – and ensure that shared data is not snooped or tampered with at any stage of access or transmission – even if the system is compromised.

Secure, View-Only Option – Downloading Prohibited