Restrict User Access Via SFTP

Posted on December 13, 2018 by Maytech Marketing |Leave a comment|

The new feature  "Lock SFTP home" enables admins to prohibit a user’s access to any root folders while jailing that user to the "Projects Shared with Me" folder using SFTP.

The update follows the continuous security and UX improvement direction of Quatrix®, and should be valuable for more precise data control. By quickly locking a user’s SFTP home in your Administration tab, you can easily ensure that such user sees only received files on his or her profile.

 
Continue reading →

Quatrix IP restriction

Posted on December 11, 2018 by Maytech Marketing |Leave a comment|

Precise centralised control over who can access your files is incredibly important for enterprises and other organisations that operate sensitive information.

Last summer, we introduced SSO / ADFS integrations: once activated, it enforces your employees to sign in merely with your company credentials.

 
Continue reading →

Why Request ISO 27001 Certification from Your File Sharing Provider?

Posted on November 13, 2018 by Maytech Marketing |Leave a comment|

Sharing files within and outside of an organisation is a large and important part of any data management. With the growing amount of data that companies collect, process, and share on a daily basis, it’s vital that this part of corporate data security doesn’t get overlooked.

Continue reading →

SSO / ADFS Integrations for Better Security and Corporate Data Protection

Posted on June 19, 2018 by Maytech Marketing |Leave a comment|

Maytech, a global leader in secure file sharing for businesses since 2006, is happy to announce a new feature in our ever growing list of available enterprise capabilities: Single Sign On (SSO) Login and ADFS integrations.

Continue reading →

Final GDPR countdown: Is your business at risk from uncontrolled file sharing?

Posted on May 11, 2018 by John Lynch |Leave a comment|

Unless you’ve been living under a rock for the last few months you’ll know that in just a few days, on 25th May, the new EU GDPR legislation will take effect. Any failure to comply could land you in hot water, with hefty fines of up to €20m or 4% of global turnover.

Continue reading →

7 Security Problems When Sending Emails

Posted on October 12, 2016 by John Lynch |Leave a comment|

 

You may think that sending an email is much more secure than writing a letter. After all, the receiver needs to sign in with their password to receive it. But, in fact, there are a number of security flaws when it comes to sending sensitive information this way.


Here are a few common threats to your secure mail and how Maytech’s experts would recommend you remedy this.

Continue reading →

Five Emerging Threats Enterprise Security Must Not Ignore

Posted on August 03, 2016 by John Lynch |Leave a comment|

Cybercrime is an ever-evolving industry that is scamming businesses big and small out of millions of pounds each year. So, it’s important to remain knowledgeable and up-to-date on all of the latest scams, plus how to best protect your organisation’s network.

Continue reading →

Apple vs. The US Government: Unlocking the Answer to a Crime

Posted on April 22, 2016 by John Lynch |Leave a comment|

It was announced last week that the month long legal battle between technology giant Apple and the US government has come to a conclusion with the FBI gaining access to the iPhone in question by ‘other means’.

Continue reading →

What Do Changes in EU Data Protection Regulation Mean For You?

Posted on September 21, 2015 by John Lynch |Leave a comment|

In the next 12 months, the draft General Data Protection Regulation (GDPR) is due to be passed through European Parliament – the most significant change of its kind in a generation.

What does it mean? How will it affect organisations across the world? What does your IT department need to know? We take a look:

Continue reading →

Hackers Becoming More Innovative to Steal Data

Posted on July 23, 2015 by John Lynch |Leave a comment|

There is a never ending war between hackers and computer security companies, with both trying to come up with new, impressive ways of getting one over on the other. In the newest wave of innovation, it has been found that hackers have been using a cheap, small gadget to steal encryption keys.

Continue reading →

Subscribe

Recent Entries