Secure File Sharing with Your File Servers

Are you worried about employees sending sensitive data like private health information (PHI), financial records or business trade secrets through third party websites?

Are you worried about your data getting lost, stolen or hijacked by ransomware when employees use popular file sync and share services in the cloud?


In this article, we’ll discuss how CentreStack addresses all these issues while increasing worker productivity! And we think you’re going to love taking control by using it to implement secure file sharing in your own datacenter.

With CentreStack, secure file sharing is easier than sending an email:

1. Users simply access the file or folder through their mapped drive or mobile device,

2. Right click on the file or folder they’d like to share,

3. And then enter the email address of the recipient.

This process makes the file available without transferring it to any third-party clouds or servers and allows you to set your own security policies. For example, an administrator can require that the share recipient enter a password to access the shared data.

If you are sending an email with an attachment, compliance requirements may prohibit attaching documents with private health information or other sensitive data. But with CentreStack deployed on-premise, the attachment is replaced by a link to the file which remains on your private servers. This approach also makes it easy to send large files through email.

This ability to provide security while enhancing productivity is a recurring theme with CentreStack. In fact, not only will you get the reassurance of keeping your data on-premise in your compliant environment, you’ll get the ability to leverage your existing Windows permissions and users with added protection from cyber-threats like ransomware, viruses and data leakage.

For ransomware, CentreStack provides a group policy that blocks ransomware with a behavioral heuristic instead of by scanning files for infections. An administrator can set a change frequency threshold such that if a device is generating more changes than humanly possible, it will be quarantined to prevent the spread of infection. This is an excellent way to defend against delayed attacks from infected files that may be laying dormant in a backup image. It’s also a great second line of defense behind a firewall that may already be doing some security scanning.

For viruses, CentreStack can be integrated with your existing anti-virus software to provide protection from viruses that may be injected from unmanaged endpoints. For example, if a remote worker uses an unmanaged\unprotected computer to access your data through CentreStack, the files that are uploaded will be scanned for viruses before the transfer is allowed.

And if you’re worried about employee devices being lost, stolen or otherwise compromised, CentreStack provides the ability to selectively encrypt or remotely wipe corporate data on the device.

These features have been leveraged by companies like HP, Barclays and LifeLabs to provide secure file sharing to their employees and customers while maintaining security and compliance requirements with on-premise file servers.

For example, LifeLabs is one of the largest biomedical testing facilities in North America. They have on-premise infrastructure which is HIPAA compliant but they needed a way to share test results and reports with their customers without sending the data through third-party servers or websites. They were able to solve that problem by deploying a CentreStack server in their DMZ to enable secure file sharing with their on-premise file servers. They were also able to maintain HIPAA compliance because the security, auditing and reporting features of CentreStack essentially provided a “transparent” access layer to their existing environment.

So, if you’re looking for a similar solution to enhance worker productivity with secure file sharing deployed in your datacenter. If you’re interested in protecting your business from cyber-attacks while maintaining compliance, please take advantage of our risk-free trial offer. It takes about 30 minutes to get setup, is completely free and fully functional for 30 days. And we’ll provide support for the trial with no commitments.

Now, according to the Ponemon Institute, the average small business pays up to $1M after a cyber-attack and the U.S. National Cyber Security Alliance concludes that 60% of those companies will go out of business in less than 6 months.

With those kinds of risks, how can you afford not to take a look?

To learn more and signup for a trial, please visit


Popular posts from this blog

Access and Backup to HP Cloud Storage

7 Biggest Limitations of SharePoint Online And How to Fix Them

Optimizing 3D Rendering and AutoCAD Performance in Remote Work Environments