Active Cypher On-Prem Migration

Client Use Case and Profile

Profile of On-Prem client today:

  • 50 – 500 employees, centralized, File Server, and Active Directory environment.
  • Remote workers use a virtual desktop to access internal assets.
  • Has Windows PCs and/or laptops running Windows 10, desktop, or laptop devices.
  • Might not have an Office 365 subscription, or “in limited” usage.
  • Users log into their workstations with Windows Domain Services and then access networked resources such as files, printers, applications.
  • The company uses a centralized file system to manage documents that are accessed from the file server. Microsoft Active Directory Security Groups are used to access control permissions to those shared networked folders containing the company documents.
  • The client is concerned about documents leaking to the world unprotected if\when they are shared as email attachments or if copied to a 3rd party file sharing platform.

Use-Case of an On-Premises Company today:

The company wishes to share the documents and files from their on-prem File Servers to remote workers without risk of data loss from unprotected files being shared openly on 3rd party sharing platforms. The client fears the migration of files to the Cloud because user productivity will be negatively impacted by requiring remote users to use Remote Desktop to access their work computers from home. Spotty availability of their workstations being up and available has left the remote workers vulnerable.

Active Cypher Solution:

Active Cypher Cloud Fortress was used to protect the Company’s data on their File Server before, during, and after they migrate to an Azure-hosted File Sharing solution. The data is encrypted on the File Servers, in transit anywhere, and in the Azure Cloud. In addition, the content of the data is protected from Microsoft.

The Cloud Fortress by Active Cypher offers its clients a “Wizard” deployed, automated end-to-end file encryption solution that protects every file on a system owner’s file servers, at rest, in-use, or in-transit.
In short, the Cloud Fortress is a unique data-protection solution with all functionalities installed on the system-owner’s local network, Azure Subscription, and onto its user’s workstations. Authentication and key storage stay within the owner’s system and do not travel to a hosted platform or service outside of their scope of control.
All identity and authentication are handled by Windows with access control permissions (credentials) managed by ACTIVE CYPHER via the Active Directory & Office 365 functionality that the system-owner is already using.

The Active Cypher Cloud Fortress – Key Points:

  • Total deployment time for Cloud Fortress is less than one hour.
  • Cloud Fortress requires no administrative overhead.
  • Cloud Fortress requires no user involvement to protect system-owner data.
  • Cloud Fortress is fully integrated into the system-owner’s existing Azure Tenant and Subscription.

Cloud Fortress is an un-hackable technology, files can be transmitted over less secure, open networks, without the fear of file contents being “picked off” while in transit. Any files that might be copied, intercepted, or “sniffed” on unsecured networks are meaningless gibberish to an unauthorized user or “Bad Actor”.

Without the Cloud Fortress system and having Active Directory permissions, a “Bad Actor would have little more than a digital waste product for their trouble and no ability to decipher any stolen file.

Fully automated file protection, no end-user steps to encrypt/decrypt documents & files. Files can only be opened by authenticated users. Files remain encrypted whether in the cloud, in email, on user’s digital devices, or anywhere in the world.

ACTIVE CYPHER SYSTEM REQUIREMENTS:

Hardware

  • Windows-based servers, workstations, and laptops.
  • Windows Active Directory-based Domain authentication.
  • Single AD Forest configuration.
  • Files stored in networked shared folders, with permissions set by Active Directory (AD).

Network Topography

  • LAN Based network, centralized file storage, AD Domain Access Control.
  • User Workstations are AD Domain joined and authenticated for access to network resources: files, folders, and printers. 

Software Requirements

Servers – Windows Server 2008 R2, 2012, 2016  

Workstations – Windows 10 Professional or Enterprise

File Servers and Workstations – Microsoft.NET Framework 4.7 

Typical On-Prem Active Directory, File Servers, and Workstations with inadequate File Migration Path

Typical-On-Prem-Active-Directory-AC

Next day, after Cloud Fortress Solution, Files encrypted On-Prem, in Cloud, and anywhere sent.

Cloud Active Fortress solutions -Active-cypher