The First Agency-Grade Secure Shared Drive Solution
Information security teams devote their time and resources to securing and protecting sensitive, regulated, and proprietary data throughout their organizations, along with ensuring its integrity and availability.
In their focus on protecting PHI, PII, intellectual property, financial, and similar data, cybersecurity teams should not overlook the need to put in place strong protections for operational security information.
YakaDrive is Secure.
As sensitive as the data on your shared drive might be, adversaries will always try to find a way to get access to it. The danger here is if attackers or others, including those who work in your organization, gain access and extract the most valuable data and, consequently, inflict the most damage on the organization.
Core Security Features
Encryption At Rest: All files remain encrypted at all times on the system, so you have protection against brute force breach.
Encryption in Transit: With required SSL/SSI, the entire session using YakaDrive is secure from user end point to drive.
Object-Based Access Controls: Instead of folder based security, each individual object contains its own security access controls, giving true control over each item in your drive.
Built on SELinux: The entire structure and code-base of YakaDrive is built on the most secure operating system used today. The same technology used in the intellegency community's most secure apps. We know, because we build them!
Role-Based Permissions: Each user is given access based on roles, and controls of users can be fully customized to allow access to each individual file as needed, or groups of users based on roles.
Access and Action Logs: Each upload, view and transfer is recorded for complete auditing and security review.
Ultimately, your organization’s shared data is sensitive and should be managed with an elevated level of security, including PII and PHI. Not only do appropriate protections reduce risk for the organization, they allow cybersecurity teams to set the example for the rest of the organization by following best practices for protecting sensitive information for which they are responsible.
- Prevent unauthorized external access through a hardened software appliance. Provide a “secure wrapper” around all your secure data.
- Ensure users of the system only see, access, and modify records they are permitted to see. Provide “need-to-know” access to and editing of records and data within the system.
- Provide On-Prem/On-Site hosting, as well as encryption at rest.