File Sharing


11 Nov
How to maintain tight control over Data Access Rights
Category: Advisory, Blog, Data access, File Sh...
When your data is accessible by multiple employees and teams across your organisation, data access rights must be carefully controlled to keep your environment safe. Always ensure ...
21 Oct
Why empowerment drives powerful data access governance
Category: Advisory, Blog, Data access, Data Go...
Moving day-to-day data access decisions away from the IT team to data owners might seem like a big step (this is exactly what Torsion does), but the end results can be far more enc...
09 Sep
Types of Data Access Control
Category: Advisory, Blog, Data access, File Sh...
Generally speaking, the different types of access control can be distinguished by how access is granted (DAC and MAC) and why access is granted (RBAC and ABAC). Here, we guide you ...
17 Aug
5 tips for choosing the right file-sharing solution
Category: Advisory, Blog, Data access, File Sh...
1. Make data sharing a business function Let’s face it, a lot of file sharing happens at work both internally and externally. And the volume of information being shared is in...
29 Jul
Latest research shows Data Access under greatest pressures
Category: Blog, Data access, Data Governance, ...
07 Jul
Trust your people to control access
Category: Advisory, Blog, Data access, File Sh...
Forbes has published some latest research that identified five key trends that set data-leading organisations apart from peers. One of those key trends is ‘Trust’, in p...
01 Jul
Collaboration Security: What is it and why does it matter
Category: Blog, Data access, Data Governance, ...
Collaboration Security is the practice of ensuring data shared through collaboration platforms is secure. The rise of collaboration platforms such as Teams, Sharepoint and File Sha...
08 Jun
Torsion named in CyberTech100 for 2021 for companies helping financial institutions combat cyber threats and fraud
Category: Compliance, File Sharing, News
The annual list of the world’s most innovative providers of digital solutions helping financial services firms fight off cyber attacks and protect their data was announced today by...
02 Jun
Our top 5 scenarios for revoking data access
Category: Advisory, Blog, Data access, File Sh...
In our last blog we talked about the importance of revoking data access, to limit the amount of data sprawl that can easily get out of control. Here we give our top 5 scenarios in ...