secure internal file access - safe-t · 2019-12-01 · keeping data in the right hands figure 2 -...

Secure Internal File Access Product Brief Contents Introduction The Safe-T Solution How It Works Capabilities Benefits Feature List Access Component Data Exchange Component 2 2 3 4 5 5 5 8 www.safe-t.com Keeping Data in the Right Hands

Upload: others

Post on 15-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secure Internal File Access - safe-t · 2019-12-01 · Keeping Data in the Right Hands Figure 2 - Safe-T Secure Internal File Access – Multi Segment Capabilities Deploying Safe-T’s

Secure Internal File Access Product Brief

Contents

Introduction

The Safe-T Solution

How It Works

Capabilities

Benefits

Feature List

Access Component

Data Exchange Component

2

2

3

4

5

5

5

8

www.safe-t.com Keeping Data in the Right Hands

Page 2: Secure Internal File Access - safe-t · 2019-12-01 · Keeping Data in the Right Hands Figure 2 - Safe-T Secure Internal File Access – Multi Segment Capabilities Deploying Safe-T’s

Introduction

Sensitive data leakage by internal employees is a major concern for any organization in terms of data

protection, but for highly secure organizations such as defense contractors, military manufacturers,

intelligence agencies, law enforcement agencies, etc, it is the most pressing concern and may affect the

organization in many ways including jeopardizing human lives.

Such organizations are usually cut off from the outside world, but they hold the most highly sensitive data

in the world, so the threat is internal rather than external.

The internal threat can be any of the following – employees, 3rd party contractor working within the facility,

or the IT administrator managing the file storages.

The problem is that like their enterprise counterparts, also highly secure organizations use file shares in

order to provide users with access to organization data, as well as ensuring data is regularly backed up.

While providing ease of access to files, standard files shares do not provide high levels of access and usage

controls, but rather basic user permissions. In addition, the main protocol used for file shares is Server

Message Block (SMB) also known as Common Internet File System (CIFS).

But while SMB has become in the center of all organizations, it’s inherent vulnerabilities have been exploited

as part of various attacks. The continued use of the SMB protocol is a major security concern for organizations

globally, regardless their type.

The Safe-T Solution

The Safe-T Solution

Safe-T® SmarTransfer, which is part of Safe-T’s Software Defined Access solution, allows internal users to

gain transparent access to secure storages over the standard HTTP/S protocol.

What appears as a standard mapped network drive is actually a secure, encrypted and access-controlled

channel exposing the sensitive information /files with the right authorization rights to upload, download,

copy, open, delete, view, etc all according to “need to know basis” and permissions, while not relying on the

vulnerable SMB protocol.

All transactions are subject to Safe-T’s SecureStream policy and workflow engine, thereby ensuring secure

and controlled access to any file type file content, meeting governance and audit requirements.

SmarTransfer integrates with the organization’s authentication solution (e.g. Active Directory), transparently

authenticating the user when they open their mapped drive. The list of presented Safe Spaces (folders)

displayed to the user, depends on the user’s group and permissions.backend application.

www.safe-t.com Keeping Data in the Right Hands

Page 3: Secure Internal File Access - safe-t · 2019-12-01 · Keeping Data in the Right Hands Figure 2 - Safe-T Secure Internal File Access – Multi Segment Capabilities Deploying Safe-T’s

How It Works

Safe-T’s SmarTransfer allows deploying a Secure Internal File Access solution. It can be deployed in one of two deployment scenarios:

Single Segment

As can be seen in figure 1 below, when deployed in a single segment, the Safe-T Secure Internal File Access solution requires a single Safe-T SmarTransfer unit which is connected to the organization’s file server, authentication tier (e.g, Active Directory), and 3rd party security solutions (e.g. anti-malware, sandbox, etc).

Multiple Segments

As can be seen in figure 2 below, the Safe-T Secure Internal File Access solution is composed of multiple components. The solution is usually deployed in one or more internal segments within the organization.

• Internal Segment 1 – includes a Safe-T SmarTransfer which is connected to the organization’s file server, authentication tier (e.g, Active Directory), and 3rd party security solutions (e.g. anti-malware, sandbox, etc). If users connect to this segment for other segments, then an Access Controller is deployed also in Internal Segment 1. The Access controller communicates with an Access Gateway in other internal segments.

• Internal Segment 2 – includes an Access Gateway which communicates with the Access Controller in Internal Segment 1. It is used to allow users from Internal Segment 2 to reach the Safe-T SmarTransfer server without the need to open the firewall between the two segments.

Figure 1 - Safe-T Secure Internal File Access – Single Segment

www.safe-t.com Keeping Data in the Right Hands

Organization

Internal Segment

File/DataStorage

SmarTransfer

DLPUser IAM

Anti-Malware

Page 4: Secure Internal File Access - safe-t · 2019-12-01 · Keeping Data in the Right Hands Figure 2 - Safe-T Secure Internal File Access – Multi Segment Capabilities Deploying Safe-T’s

www.safe-t.com Keeping Data in the Right Hands

Figure 2 - Safe-T Secure Internal File Access – Multi Segment

CapabilitiesDeploying Safe-T’s SmarTransfer for Secure Internal File Access provides the following capabilities:

• Deployed as a virtual machine, SmarTransfer seamlessly integrates into existing file shares

• Server-side capabilities maximize the security on overall users file transmissions

• Zero SMB protocol usage, connection using HTTP/S protocol from client to Safe-T

• As opposed to other solutions, Safe-T SmarTransfer is clientless and does not require any installation on the user desktop. Clientless deployment minimizes the complexity of managing desktop client installations and upgrades, and it is transparent to any operating systems

• Access and permissions control ensures secure and controlled access to any file types and content

• Supports file operations with full file function capabilities, such as: Upload, download, copy, create, open, move, delete

• SmarTransfer acts as a secure file gateway between users and remote file servers, enabling 3rd party integration (AV/DLP/etc.) and policy enforcement

• Prevents any unauthorized file access or usage - changing file original format, encrypting files, etc

• Built-in file encryption and/or encryption using external HSM for Secure encryption keys storing

• Full audit trail and reporting to SIEM solutions (e.g. Arcsight)

• View only options, without the option to download the sensitive information to the local work station

Organization

Internal Segment 1Internal Segment 2

File/DataStorage

SmarTransferAccess Controller

DLPUserUser IAM

Access Gataway

Anti-Malware

Page 5: Secure Internal File Access - safe-t · 2019-12-01 · Keeping Data in the Right Hands Figure 2 - Safe-T Secure Internal File Access – Multi Segment Capabilities Deploying Safe-T’s

Benefits

The benefits of providing application access via Safe-T’s Secure Internal File Access:

Full segregation of duties between IT administrators and business users

Seamless integration into existing file access environments

Simple and easy deployment

Reduce the risk of data theft, and data leakage attacks

Reduce the overall network attack footprint by removing SMB protocols

Access Control ensures secure and controlled access to any file types and content

Ability to interact with organization security and data protection tools

Brings back the control over sensitive information from the users to the organizations

Feature List

Access Component

CommentsFeature

System Level Features

Safe-T Secure Application Access solution can be setup in HA using an external load balancer or application delivery controller. In addition, a single Access Controller can operate with multiple Access Gateways and Authentication Gateways.

High Availability (HA)Ability to perform high availability/clustering mode in the same data center and between data centers

www.safe-t.com Keeping Data in the Right Hands

Page 6: Secure Internal File Access - safe-t · 2019-12-01 · Keeping Data in the Right Hands Figure 2 - Safe-T Secure Internal File Access – Multi Segment Capabilities Deploying Safe-T’s

Feature List

Access Component

CommentsFeature

System Level Features

Safe-T Secure Application Access solution can be setup in a disaster recovery architecture using an external load balancer or application delivery controller

Disaster RecoveryAbility to failover to another data center in the event of application unavailability or site disasters

On-premisesDeployment

Access Features

Safe-T’s reverse-access technology is patent protected. The Reverse-access technology is a dual node technology, which removes the need to open any ports within a firewall, while allowing secured application access between networks (through the firewall)

Patented Reverse-Access technology

NoRequires opening firewall ports

Safe-T Secure Application Access solution supports any TCP based application / service, applying reverse-access to it

Support any TCP based application / service

Logically segment the network, deploying a Zero Trust model, to reduce the risk of cyber-attacks from reaching internal network segments, or laterally moving throughout your network

Logical Network Segmentation

Safe-T Secure Application Access solution supports WebDAV based file access

WebDAV Support

Safe-T Secure Application Access solution does not require any client application to be installed on the end-user’s machine

Client-less and VPN-less application access

www.safe-t.com Keeping Data in the Right Hands

Page 7: Secure Internal File Access - safe-t · 2019-12-01 · Keeping Data in the Right Hands Figure 2 - Safe-T Secure Internal File Access – Multi Segment Capabilities Deploying Safe-T’s

Feature List

Access Component

CommentsFeature

Management and Operation

YesUsing a Web for full management

YesSystem logs

Yes, via TCP API for reverse-access rules External Provisioning

System Level Features

− VMServer base platform to host the server application

− VM/Hardware− Windows Server

Client base platform to run the client application

Safe-T SmarTransfer uses an SQL database.Safe-T supports multiple protocols including NTFS, thus allowing customer to work directly with existing data centers

Configuration databaseLocation where configuration settings are stored

All sensitive information is encrypted including contacts, passwords, emails, packages, messages, etc. Encryption is done using AES 256-bit.

Database Encryption of sensitive information inside local SQL/MySQL database with which MFT product works.

YesFull Web access interface for internal/external users and guests

Ease of Use

Any user or application which touches the package/attachment is trackedTracking is done using a dedicated log within Outlook

Detailed attachment and transaction tracking (who, when, what?)

− SMBCommunication protocol(s) between Safe-T SmarTransfer and Data Storage

− WebDAV (HTTPS)Communication protocol(s) between user and Safe-T SmarTransfer

www.safe-t.com Keeping Data in the Right Hands

Page 8: Secure Internal File Access - safe-t · 2019-12-01 · Keeping Data in the Right Hands Figure 2 - Safe-T Secure Internal File Access – Multi Segment Capabilities Deploying Safe-T’s

Feature List

Data Exchange Component

CommentsFeature

Ease of Use

Yes, using a 3rd party anti-malware, or sandbox solution

Ability to perform applied policy scanning on an uploaded/downloaded attachment

YesAbility to enforce policy on any file type or size

YesFile encryption at rest

YesHTTPS secured connection

YesNTFS file access over HTTPS

YesOnline viewing of files via SmarTransfer

upports file I/O operations on remote file servers with full file function capabilities, such as: Upload, download, copy, create, open, move, delete and NTFS complimentary permissions associated with users and groups.• Clientless capabilities minimize the complexity of managing desktop client installations and upgrades, and it is transparent to operating systems (Windows/Mac/Linux).• Support using HTTP URL only and authenticating using standard authentication methods: Kerberos/Negotiate/NTLM/Multi- factor/ Header-Auth/etc.• Server-side capabilities maximize the security of overall user file transmissions.• Ensures secure and controlled access to any file types and content.• Acts as a secure file gateway between users and remote file servers while enabling third- party integration and enforced policies (AV, etc). This helps to prevent any unauthorized access or usage (such as changing file original format, encrypting files, Ransomware attacks, etc).

Control file access

www.safe-t.com Keeping Data in the Right Hands

Page 9: Secure Internal File Access - safe-t · 2019-12-01 · Keeping Data in the Right Hands Figure 2 - Safe-T Secure Internal File Access – Multi Segment Capabilities Deploying Safe-T’s

Feature List

Data Exchange Component

CommentsFeature

Ease of Use

• From the user’s perspective, it acts as any mapped drive, including sharing links to the mapped drive with other users.

Control file access

Management and Operation

YesLDAP integrationAbility to manage users via Active Directory

Yes, using Active Directory policyAbility to manage passwords of Active Directory and non- Active Directory users

YesUsing a Web admin for full management

Available (Disk Quota Management)Storage management of occupied space of uploaded files with the ability for easy delete

YesUsers/group control integrated through Active Directory

Yes, detailed, simple, summary, etc.Report generation

The following reports can be scheduled for generation (manually or via SDK):- Generate report detailing the total sent/ received files and sizes – manager and user level- Safe-T allows generating manager and user level reports

Ability to schedule the generation of reports

YesPolicy on group and individual users

YesPolicy regards file types allowed/not allowed

Yes, via REST APIExternal Provisioning

www.safe-t.com Keeping Data in the Right Hands

Page 10: Secure Internal File Access - safe-t · 2019-12-01 · Keeping Data in the Right Hands Figure 2 - Safe-T Secure Internal File Access – Multi Segment Capabilities Deploying Safe-T’s

Feature List

Data Exchange Component

CommentsFeature

Safe-T Connectors

Protocols

YesActive Directory

YesWebDAV

YesHTTP/S

YesNAS

YesNTFS

Applications

- Check Point SandBlast- Palo Alto WildFire- Fortinet FortiSandbox- Votiro Disarmer - SoleBit Solgate- AVG (Client/Server) Server- Sasa Software Gate Scanner- ReSec ReSecure- OPSWAT MetaDefender- ODI ODIX- McAfee- Symantec SEP- Trend Micro OfficeScan

Antivirus and Sanitization solution integration

Ability to encrypt the attachment

www.safe-t.com Keeping Data in the Right Hands

© 2019 Safe-T Data Ltd. All Rights Reserved. Safe-T and all other Safe-T product and service names are registered trademarks of Safe-T Data in

the U.S. and other countries. All other trademarks and names are the property of their respective owners.

ST-2-19