Downloads

Making sure your Pydio Cells deployment is (really) safe

By deploying Cells Enterprise on-premises or on your cloud of choice, you are choosing a security-by-design approach to keep full control and ownership of your company documents. However, the great power provided by Cells comes with great responsibility. A badly configured server can be a perfect backdoor for malicious attackers.

This document provides a guided tour of the most important aspects you have to take into account to make sure that your Cells Enterprise instance is ready for production in terms of security and compliance.

It covers topics such as :

  • Securing your Server & DB
  • Tuning your firewall
  • Scheduling backup tasks
  • Discovering Pydio Cells advanced security features

 

Audience : Technical (DevOps, System Administrators)

Transparent Background: 
Transparent Background: 

Put Pydio To Work For You

Does your organization have complex compliance and security issues? Are SaaS solutions out of the question for you? Pydio Cells gives you full control of your document sharing environment and can be deployed in a matter of hours on your own hosting.

Transparent Background: 

What's New At Pydio?

Transparent Background: 
18/10/2022 at 09:23 pm
Pydio Cells V4 - Now Enterprise Multi-cloud Ready
If your organization needs to share and collaborate on documents at scale while maintaining security, compliance and ease of use Pydio Cells Version 4 here! Our latest version is cloud-ready, scalable and ready for enterprise-level sharing.
14/10/2022 at 11:52 pm
Why Is Scalability a Priority for Document Sharing?
Scalability isn’t just trendy IT jargon. It’s a core requirement for systems in today’s digital business world. But concretely, how does investing in a scalable solution for document sharing and collaboration benefit your organization? Let’s take a look.
11/05/2022 at 09:41 pm
New Whitepaper - Quick Guide to Secure Document Sharing and Collaboration
Document sharing and collaboration can expose your organization to a range of data security risks. In this whitepaper we examine those risks, look at best practices and provide a 5-step checklist to improve your security.