Research institutes produce some of the world’s most valuable data: research of human beings, animal/plant life, society’s and cultures, and so much more. This data being collected is integral to future advancements in our society, yet we must ask ourselves how it’s being protected today. For the sake of confidentiality and privacy, how can we keep critical research data protected?
Research institutes are responsible for conducting, storing, analyzing, using and ultimately sharing research data. Before research begins, there should be data protection protocols in place to prevent data loss, manipulation or theft. Read on to discover how research institutes can actively prevent data infringement and protect their data with Nextcloud as their platform.
How can research institutes’ data be protected with Nextcloud?
1. Access controls
One of the best ways to protect research data is to limit access to it. Only a handful of people will need to open the research folders and sysadmins can control this process down to a tee.
In Nextcloud Files, advanced permissions that limit and/or restrict access are state-of-the-art and trusted by our customers and community.
Just a few examples of advanced permissions:
Setting permissions on a shared file to: read, create, edit, and/or upload.
Watermarking confidential documents to make it harder to steal data.
Enabling a password protection or expiration date on a public file or folder.
Blocking downloads so the user can view and even edit the shared file(s), but not download them.
Watch the webinar recording!
Learn more about how your organization can collaborate on research data with Nextcloud
On a daily basis, external contacts send files and documents by email or through other channels which need to be scanned for threats like viruses. The Nextcloud Antivirus app (AV) performs automatic virus scans. Whenever a file is uploaded, it first gets handed over to the AV app.
Nextcloud provides optimal security for research data and communication through encryption and hardening.
We offer three types of encryption:
Encrypted data transfer with industry-standard TLS (Transport Layer Security)
Server side encryption
Enables researchers to store files locally and securely with encryption keys and ciphers
End-to-End encryption
E2EE file sharing: Enables researchers to share confidential files to other users and can be synced between devices.
E2EE file drop: Allows researchers to receive files from external users through sharing a secure shared link. The external user only has the option to upload a file in the end-to-end encrypted folder.
4. Intrusion detection software
With machine learning based suspicious login detection, research institutes can increase security and productivity even beyond our brute-force protection and 2-factor authentification.
Suspicious Login Detection uses a locally trained neural network to detect attempts to login by malicious actors.
Unternehmen, ob klein oder groß, brauchen eine Möglichkeit, die Ausfallsicherheit und digitale Souveränität ihrer Abläufe zu gewährleisten - eine Open-Source-Alternative zu Teams, die die Privatsphäre respektiert. Und heute stellen wir diese Lösung vor - Nextcloud Talk.
Bechtle und Nextcloud kündigen heute eine vollständig verwaltete Kollaborationsplattform für den öffentlichen Sektor an, die keiner Ausschreibung bedarf und sofort bereitgestellt werden kann.
Our mission is to help individuals, businesses and organizations achieve digital sovereignty and regain control over their data. Nextcloud Hub 5 marks a massive step forward towards achieving this mission, putting the power of AI into your hands – in a way that keeps you in control. New release, new possibilities Hub 5 builds on […]
In this article, we find out how open-source AI gets you your privacy back and explore examples of reliable AI models that you can use in your ecosystem.
In this article, we explain how federation works and what federation tools you can already use in Nextcloud, and discover how it can help businesses and governments achieve digital sovereignty.
Wir speichern einige Cookies, um Besucher zu zählen und die Nutzung der Website zu erleichtern. Diese verlassen unseren Server nicht und dienen nicht der Verfolgung Ihrer online-Aktivitäten.
Weitere Informationen hierzu finden Sie in unserer Datenschutzrichtlinie. Anpassen
Statistik-Cookies sammeln anonym Informationen und helfen uns zu verstehen, wie unsere Besucher unsere Website nutzen. Wir verwenden cloud-gehostetes Matomo
Matomo
_pk_ses*: Zählt den ersten Besuch des Benutzers
_pk_id*: Hilft, die Besuche nicht doppelt zu zählen.
mtm_cookie_consent: Erinnert daran, dass der Nutzer seine Zustimmung zur Speicherung und Verwendung von Cookies gegeben hat.
_pk_ses*: 30 Minuten
_pk_id*: 28 Tage
mtm_cookie_consent: 30 Tage