Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:07 AM
Dark Reading
Dark Reading
Products and Releases

Avanan Introduces Cloud-based Security for Citrix ShareFile

Avanan's new set of capabilities expands its coverage of cloud-based platforms.

NEW YORK, May 19, 2020 (GLOBE NEWSWIRE) -- Avanan, the leading security solution for cloud-based email and collaboration suites, announced today new security protocols to protect Citrix ShareFile.

As more and more businesses are expanding the tools in their employees’ collaboration suite from mainly email into cloud-based file-sharing, collaboration and messaging, sensitive information is being shared on those platforms, and the risks for attacks are increasing. Unlike email these platforms are generally open only for internal use, and within a few clicks information can be shared with third parties and malicious content can find its way into the organization. These platforms are also used by hackers that compromise one account in the organization to try and spread to others. 

Avanan's new set of capabilities further expands its coverage of cloud-based platforms and improves the security of the information that employees share with their co-workers and external parties. Avanan, the highest-rated email security platform according to Gartner’s Peer Insights, is the only email security provider to bring its protection to the broader collaboration suite. 

Citrix ShareFile is a file sharing and sync solution. It allows people to store documents and share them with colleagues and external users. The Avanan solution for ShareFile includes scanning files for Data Loss Prevention (DLP) and malware. Files that are flagged by Avanan as containing malware or potentially sensitive information can be automatically mitigated by moving the file to a special quarantined folder and by changing the file access policy. An alert can be issued to the file owner and system administrator.

ShareFile is protected by the same powerful yet easy-to-use unified security policies that Avanan uses to secure similar services, such as Microsoft OneDrive, Google Drive, Box and Dropbox. Avanan’s unique approach to protecting these services allows for the reporting and managing of all security events from email, file sharing, collaboration and messaging platforms in a single console, while quickly mitigating any potential attack.

In addition to scanning for malicious content and sensitive files, Avanan’s new integration with Citrix ShareFile supports the detection of compromised attacks, insider threats and unsecure configurations. This is done leveraging Avanan’s artificial intelligence engine and baselining algorithms, that analyze end-users’ behaviors within Citrix ShareFile and cross-correlate those end-user actions with their activity in the SaaS service that the organization secures with the Avanan platform.

See the power and simplicity. Learn more about Avanan’s cloud-based security for Citrix ShareFile here.

About Avanan
Avanan catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365™, G-Suite™ and Slack™. The platform deploys in one click via API to prevent Business Email Compromise and block phishing, malware, data leakage, account takeover and shadow IT across the enterprise. Avanan replaces the need for multiple tools to secure the entire cloud collaboration suite, with a patented solution that goes far beyond any other Cloud Email Security Supplement.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/3/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-03
IBM Security Guardium 11.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 174732.
PUBLISHED: 2020-06-03
IBM Security Guardium 11.1 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM X-Force ID: 174735.
PUBLISHED: 2020-06-03
IBM Security Guardium 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174738.
PUBLISHED: 2020-06-03
IBM Security Guardium 11.1 could disclose sensitive information on the login page that could aid in further attacks against the system. IBM X-Force ID: 174805.
PUBLISHED: 2020-06-03
IBM Security Guardium 10.6, 11.0, and 11.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 174851.