Discovering and Managing Sensitive Information in Microsoft Repositories

Discovering and Managing Sensitive Information in Microsoft Repositories

David Buster

David Buster

Product Marketing, Security and Governance

Read Article

Best Practices for File Sharing in Hybrid Work Environments

Best Practices for File Sharing in Hybrid Work Environments

David Buster

David Buster

Product Marketing, Security and Governance

Read Article

Why NAS Is Old School

Why NAS Is Old School

David Buster

David Buster

Product Marketing, Security and Governance

Read Article

Why VPN Is Dead

Why FTP Is Dead

David Buster

David Buster

Product Marketing, Security and Governance

Read Article

Why VPN Is Dead

Why VPN Is Dead

David Buster

David Buster

Product Marketing, Security and Governance

Read Article

Move off On-Prem File Servers to Unlock New Capability and Cost Savings

Move off On-Prem File Servers to Unlock New Capability and Cost Savings

David Buster

David Buster

Product Marketing, Security and Governance

Read Article

Move off On-Prem File Servers to Unlock New Capability and Cost Savings

Move off On-Prem File Servers to Unlock New Capability and Cost Savings

David Buster

David Buster

Product Marketing, Security and Governance

Read Article

3 Reasons Why You Should Attend the Egnyte Life Science Summit

3 Reasons Why You Should Attend the Egnyte Life Science Summit

Abhay Kini

Abhay Kini

Practice Leader of Life Sciences at Egnyte

Read Article

Automate the ISO 27001 Compliance Process

Automate the ISO 27001 Compliance Process

Neil Jones

Neil Jones

Director, Cybersecurity Evangelism

Read Article

Don’t miss an update

Subscribe today to our newsletter to get all the updates right in your inbox.

By submitting this form, you are acknowledging that you have read and understand Egnyte’s Privacy Policy.