Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst"

Transcription

1 ESG Lab Spotlight Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst Abstract: This ESG Lab Spotlight provides a high level look at the Acronis Access Advanced enterprise file sync and share solution. The Challenges Consumer-oriented, public cloud file sync and share solutions are common today in corporate environments because they are easy to get, easy to use, and enable employees to access content from any device and share it with colleagues and partners from any location. This can leave vast amounts of corporate data at risk and outside of IT s protection, management, and monitoring potentially leading to violations of industry compliance or corporate governance regulations, reputation harm, and financial loss. In fact, when ESG asked potential corporate public cloud sync and share adopters about their top concerns, security was the mostoften cited response by a large margin, followed by employees continuing to use their own solutions, and integration with existing IT tools and applications. 1 The data to which organizations need access from various devices and locations includes not just recently created files, but the data volumes that they have created over the history of the company. The difficulty for many organizations is that they are tired of the cumbersome and restrictive VPN method of secure remote access to data, but having to move data into a specific sync and share silo for remote access is a huge burden. The bottom line is that business users need better data access and easier collaboration, but with full protection, rocksolid security, and management by IT. Consumer-grade solutions are simply not designed for these enterprise-class needs. The Solution: Acronis Access Advanced Acronis Access Advanced is a file sync and share solution that provides enterprise-class features for any organization, regardless of size. It was designed for on-premises or private cloud infrastructures, and provides the security, scalability, management, and compliance features that today s organizations need. It is easy for both users and administrators, is a complete and secure solution offering a wide range of features and flexible policies, and enables access to and mobilization of data from a variety of sources including home directories, file shares, NAS devices, and SharePoint sites. Acronis Access Advanced is deployed as a physical or virtual Windows service and enables file access and sharing for Windows PCs, Macintosh computers, and mobile devices that support ios, Android, and Windows operating systems. There is no file size limit. Key user features include: Access to data on file servers, NAS, and SharePoint. Native support for Active Directory home folders on mobile devices. 1 Source: ESG Research Report, Online File Sharing and Collaboration Deployment Model Trends, February The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab s expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by Acronis.

2 ESG Lab Spotlight: Secure File Sync and Share with Acronis Access Advanced 2 Secure file access and sharing across multiple devices via web UI, desktop clients, and mobile clients. Selective sync of files and folders to optimize bandwidth and storage. File and folder sharing via links governed by policies such as passwords and expiration dates. File versioning including conflicted file renaming. Bi-directional sharing with external users. An intuitive UI that requires no training; consistent interface across repositories and devices. A built-in Office editor is included with the mobile client code, helping to make Acronis Access Advancedenabled mobile devices a true business platform. Key administrative features include: Fast, easy on-premises deployment. Integration with Active Directory for authentication, user account management, and enrollment. HTTPS reverse proxy support with password and certificate authentication. FIPS encryption in transit and at rest. Granular, policy-based management of files, users, and devices. Incremental sync at file level. Audit trail and transaction history with search, filter, and export, essential for compliance and oversight. Whitelists and blacklists for users, groups, domains, and applications. Selective remote wipe capability. Web API for additional integration and custom app development. MDM integration including MobileIron and Good Technology. The architecture overview shows clients on the front-end accessing Acronis Access Advanced via LAN/WAN/HTTPS. On the back end, the solution integrates with customer file storage deployments, Active Directory, and repositories such as SharePoint. ESG Lab Testing ESG Lab evaluated the Acronis Access Advanced solution using a combination of remote demos and self-directed testing of user and administrative features. User testing was conducted using a MacBook Pro, Windows PC, Android phone, and Apple ipad. Usability was validated for the web interface, desktop client, and mobile device, while testing focused on the mobile device as a true business platform. Administrative testing focused on the wide variety of management options. Mobile Devices Using an ipad, ESG Lab easily installed the Acronis Access Advanced application from the App Store, noting that additional versions of the app were available for integration with specific mobile device management applications.

3 ESG Lab Spotlight: Secure File Sync and Share with Acronis Access Advanced 3 To test the capabilities of the Acronis Access Advanced mobile platform, ESG Lab executed numerous business tasks on the ipad. After adding our Acronis Access Advanced server by inserting the server name and user credentials, our sync and share folder contents were viewable and searchable, including folders and files with several viewing options. We reviewed the settings, including the amount of local cache, timeout time, delete confirmation, password and certificate settings, auto-syncing, confirm before download (a key feature for mobile devices that can prevent bottlenecks and security issues), and MDM partner features. The home screen provides access to other bookmarked folders, and with a single click, enables your folder to be bookmarked, synced, or refreshed. It should be noted that automatic syncing can be configured to occur only at launch or at defined intervals, and to occur only with a WiFi connection. This eliminates mobile network data charges and potential bottlenecks. ESG Lab tapped on the Test Document.docx file that we had created in a desktop Acronis folder and synced with the ipad. A pop-up box appeared offering numerous options, including the ability to preview or edit the file, open it in a specific application, the file or a link to the file, copy or move the file with the clipboard, rename it, or delete the file (left). After selecting the option to a file or link, a form was presented in which we entered an address, added a message, and configured the link to expire in two days. We sent the link to a colleague, who confirmed the ease of accessing the document from the link. Next, with the same document selected on the ipad, ESG Lab tested the Preview, Edit, and Open In features. Preview brought up the document in full-screen mode for viewing; the Edit feature opened the document using the built-in Office editor. With the document open, buttons appeared at the top for file actions such as save, print, and ; cut and paste; view options; add shapes, images, and photos; keyboard options; undo; redo; and page navigation. Tapping in the document brought up a soft keyboard, and we added a sentence to the document and clicked Save; this brought up options to overwrite the original, rename and save it, or cancel and discard it. After returning to the Acronis Access screen, we selected the document again and clicked Open In, which brought up a box containing all the icons for the applications installed on the ipad with which we could open, move, or display the document. This included social media, messaging, word processing, and collaboration applications, as well as AirDrop for sharing with nearby devices using Bluetooth. After clicking on the Apple Pages (word processing) icon, the document opened in that application with full functionality. It should be noted that when content is opened in another application, it leaves the secure sandbox environment of Acronis and could be vulnerable; however, Acronis Access Advanced enables applications to be whitelisted or blacklisted for the Open In feature, enabling greater control. Next, we created a new document by clicking the Add icon on the home screen and selecting Add New (right).this brought up options for creating documents, spreadsheets, presentations, text files, or folders. ESG Lab created a new document, tested all word processing features, saved it, and then renamed and saved it. Finally, from the home screen, ESG created a new folder and opened it. After clicking the Add button, we selected Copy Photos & Videos. This brought up all image applications in the ipad; we tapped the Camera Roll, selected all the screenshots that we had taken during this ipad testing, and clicked Save (right). The screenshots were immediately saved to the clipboard, individually added to the new folder, and synced with the desktop application. The figure below shows the same content synced on the web interface, desktop client, and mobile device.

4 Desktop and Web Interface ESG Lab Spotlight: Secure File Sync and Share with Acronis Access Advanced 4 When configuring the desktop client, users specify a folder to use for syncing with the Acronis Access Advanced on-premises server. Folders and files are controlled by policies, and users can download, rename, copy, move, delete, and links to files and folders. Similar to the mobile device testing, ESG Lab validated for the desktop and web UI s the ease of: Collaborating with users inside and outside the Active Directory domain. Adding content to the Acronis Access Advanced folder via drag and drop. Editing files and propagating changes to shared folders. Selecting files and folders to sync. Administrative Testing Acronis Access Advanced offers IT a wide range of management options that can be accessed from five categories in the left navigation pane: Mobile; Sync and Share; Audit Log; User and Devices; and General Settings. Each category has intuitive subcategories that enable tasks such as role assignments, templates for notification and sharing s, UI customization, licensing, sync policies, and sharing policies. While a full review of all administrative functions is beyond the scope of this report, ESG Lab found that Acronis Access Advanced offered a very flexible set of tools and options that enables organizations to customize as much or as little as they like. IT can tailor sync, mobility, collaboration, and security features using templates or ad hoc, and can vary policies and permissions across organizations, divisions, departments, users, and devices. ESG Lab highlighted two administrative areas that are essential for businesses: user enrollment procedures, and mobile policies (left). Acronis Access Advanced enables IT to enroll users in the same way they typically do, using Active Directory. Administrators select Active Directory users or groups, and the system sends an with installation instructions for both desktop and mobile devices along with a token that transfers all Active Directory security and access permissions. This enables organizations to quickly and easily add authenticated users while maintaining secure operations. Users have immediate access to any content in their Access folders, in other network servers, and in accessible data sources such as file shares and SharePoint repositories. Additional policies can be layered on top of the Active Directory configuration, such as preventing users from storing files on mobile devices or disabling ing of files or links. This way, users can be granted persona-based credentials for each device they use, enabling organizations to maintain control and security of data. Options such as time-limited

5 ESG Lab Spotlight: Secure File Sync and Share with Acronis Access Advanced 5 access to links, automatic erasure of content after a period of time without device log in, and selective remote wipe can also ensure that data is not vulnerable, for example, when a mobile device is lost or stolen. The Mobile Policies tabs enable IT to handle enrollment; create specific security, application, sync, and home folder policies; manage servers and data sources that mobilize content; and manage settings. For example, IT can create a connection to a dedicated data source for high-level managers that requires a secure VPN tunnel, while enabling other employees to access home directories using HTTPS. Business users have different needs, and Acronis Access Advanced accommodates every level of functionality and security. Why This Matters For syncing and sharing files, users will leverage what is easy for them, without necessarily thinking about security. The only way to ensure that employees use a secure, IT-managed file sync and share solution is to ensure that it has the features and data sources users want. ESG Lab validated that Acronis Access Advanced is a simple, intuitive, complete, and powerful solution that can be used via desktop, web, or mobile client. Keeping data on-premises eliminates the vulnerabilities of public cloud solutions. The mobile capabilities make it a full-featured business platform. Knowledge workers can execute a wide range of business functions with a mobile device in the absence of a desktop or laptop, while keeping in sync with the central document repository, sharing with internal and external users, and collaborating. ESG Lab also validated the flexibility of administrative options that enable IT to be completely confident regarding sync and share data security across the organization. The Bigger Truth Acronis has clearly thought through the needs of business users and IT organizations. The company offers a solution that is easy to use, full featured, secure, and integrates easily with customer infrastructure including file shares, data repositories, Active Directory, and MDM applications. ESG Lab was particularly impressed with the level of flexible control Acronis Access Advanced offers. IT can tailor the many policies to users, groups, and devices, enabling them to gain the right level of control and match that with the right features for each user and each device. Users get the devices and features they want, while IT gets the security and control it needs, without having to migrate data to a new silo or platform. There is a fine level of granularity when needed, and simplicity when not. Acronis put significant effort into creating a superior mobile experience in terms of optimizing protocols for mobile devices and providing a true business platform with which users can actually do work. Just getting access to files on mobile devices is a good start, but being able to actively produce work is the goal for business users, and Acronis Access Advanced does an excellent job of enabling that. Acronis is known for offering excellent data protection solutions. This file sync and share solution came to Acronis by acquisition, and ESG Lab s experience indicates that Acronis fully supports its continuing innovation. Acronis Access Advanced can provide organizations with a complete, fully secure, enterprise file sync and share platform that provides the features and ease of use to keep employees happy, while enabling IT to safely manage and control data across the organization. All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test

More information

activecho Driving Secure Enterprise File Sharing and Syncing

activecho Driving Secure Enterprise File Sharing and Syncing activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get

More information

SharePlus Enterprise: Security White Paper

SharePlus Enterprise: Security White Paper INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with

More information

Hitachi Content Platform Anywhere 2.0 Date: March 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Hitachi Content Platform Anywhere 2.0 Date: March 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst ESG Lab Test Drive Hitachi Content Platform Anywhere 2.0 Date: March 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab

More information

Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst

Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst ESG Lab Review Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst Abstract: Organizations are challenged in today

More information

activecho Frequently Asked Questions

activecho Frequently Asked Questions activecho Frequently Asked Questions What are the benefits of activecho? activecho allows your organization to provide an on-premise, managed and secure alternative to Dropbox and other file synching and

More information

ESG Lab Review. Data Protection Challenges. The Tested Solution: i365 EVault for DPM

ESG Lab Review. Data Protection Challenges. The Tested Solution: i365 EVault for DPM ESG Lab Review i365 EVault for Microsoft System Center Data Protection Manager Date: November 2010 Authors: Ginny Roth, Lab Engineer, and Tony Palmer, Senior Engineer Abstract: This ESG Lab review documents

More information

HDS HCP Anywhere: Easy, Secure, On-Premises File Sharing Date: May 2013 Author: Vinny Choinski, Senior Lab Analyst, and Kerry Dolan, Lab Analyst

HDS HCP Anywhere: Easy, Secure, On-Premises File Sharing Date: May 2013 Author: Vinny Choinski, Senior Lab Analyst, and Kerry Dolan, Lab Analyst ESG Lab Review HDS HCP Anywhere: Easy, Secure, On-Premises File Sharing Date: May 2013 Author: Vinny Choinski, Senior Lab Analyst, and Kerry Dolan, Lab Analyst Abstract: This ESG Lab review documents hands-on

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH. Client Guide Copyright Statement Copyright Acronis International GmbH, 2002-2014. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH. "Acronis

More information

Hitachi Content Platform Anywhere 2.0 Date: April 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst

Hitachi Content Platform Anywhere 2.0 Date: April 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst ESG Lab Test Drive Hitachi Content Platform Anywhere 2.0 Date: April 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst Abstract: This report documents the results of an ESG Lab

More information

Rubrik Converged Data Management Date: July 2015 Author: Vinny Choinski, Senior Lab Analyst; and Tony Palmer, Senior Lab Analyst

Rubrik Converged Data Management Date: July 2015 Author: Vinny Choinski, Senior Lab Analyst; and Tony Palmer, Senior Lab Analyst ESG Lab Review Rubrik Converged Data Management Date: July 2015 Author: Vinny Choinski, Senior Lab Analyst; and Tony Palmer, Senior Lab Analyst Abstract: ESG Lab recently completed testing of the Rubrik

More information

Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst

Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst ESG Lab Review Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst Abstract: This ESG Lab review documents hands-on testing of

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Quick Start and Trial Guide (Mail) Version 3 For ios Devices

Quick Start and Trial Guide (Mail) Version 3 For ios Devices Quick Start and Trial Guide (Mail) Version 3 For ios Devices Information in this document is subject to change without notice. Complying with all applicable copyright laws is the responsibility of the

More information

The Challenge of Securing and Managing Data While Meeting Compliance

The Challenge of Securing and Managing Data While Meeting Compliance ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

ESG Lab Review. The Challenges

ESG Lab Review. The Challenges ESG Lab Review Protecting Virtual Environments with Symantec Backup Exec 2014 Date: November 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst Abstract: This ESG Lab review documents

More information

Mobile App User's Guide

Mobile App User's Guide Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

DroboAccess User Manual

DroboAccess User Manual DroboAccess User Manual Release 8.2 The DroboAccess developers June 02, 2016 CONTENTS 1 DroboAccess 8.2 User Manual Introduction 1 2 Configuration of DroboAccess 8.2 3 2.1 Users, passwords and share management................................

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Product Guide. 2013 Nintex. All rights reserved. Errors and omissions excepted.

Product Guide. 2013 Nintex. All rights reserved. Errors and omissions excepted. Product Guide support@nintex.com www.nintex.com 2013 Nintex. All rights reserved. Errors and omissions excepted. Contents Contents... 2 Introduction... 4 1 Understanding system requirements... 5 1.1 Operating

More information

Qsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080

Qsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080 Qsync Qsync is a cloud based file synchronization service empowered by QNAP Turbo NAS. Simply add files to your local Qsync folder, and they will be available on your Turbo NAS and all its connected devices.

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer Field Audit Report Asigra Hybrid Cloud Backup and Recovery Solutions By Brian Garrett with Tony Palmer May, 2009 Field Audit: Asigra Hybrid Cloud Backup and Recovery Solutions 2 Contents Introduction...

More information

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license

More information

Administration Guide

Administration Guide Administration Guide Copyright Statement Copyright Acronis International GmbH, 2002-2014. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH. "Acronis

More information

Introduction to the AirWatch Browser Guide

Introduction to the AirWatch Browser Guide Introduction to the AirWatch Browser Guide The AirWatch Browser application provides a safe, accessible and manageable alternative to Internet browsing using native device browsers. The AirWatch Browser

More information

Top. Reasons Legal Firms Select kiteworks by Accellion

Top. Reasons Legal Firms Select kiteworks by Accellion Top 10 Reasons Legal Firms Select kiteworks by Accellion Accellion Legal Customers Include: Top 10 Reasons Legal Firms Select kiteworks kiteworks by Accellion provides law firms with secure wherever, whenever

More information

Egnyte Cloud File Server. White Paper

Egnyte Cloud File Server. White Paper Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage

More information

Nutanix Complete Cluster Date: August 2011 Author: Ginny Roth, Lab Engineer and Analyst

Nutanix Complete Cluster Date: August 2011 Author: Ginny Roth, Lab Engineer and Analyst ESG Lab Review Nutanix Complete Cluster Date: August 2011 Author: Ginny Roth, Lab Engineer and Analyst Abstract: This ESG Lab review documents hands-on testing of the Nutanix Complete Cluster, highlighting

More information

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst ESG Lab Spotlight AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst Abstract: This ESG Lab Spotlight details ESG s hands-on testing of

More information

Novell Filr 1.0.x Mobile App Quick Start

Novell Filr 1.0.x Mobile App Quick Start Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Top. Reasons Federal Government Agencies Select kiteworks by Accellion Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Cortado Corporate Server

Cortado Corporate Server Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and

More information

Deltek Touch Time & Expense for Vision 1.3. Release Notes

Deltek Touch Time & Expense for Vision 1.3. Release Notes Deltek Touch Time & Expense for Vision 1.3 Release Notes June 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical

More information

Acronis Backup 12 Beta

Acronis Backup 12 Beta Acronis Backup 12 Beta EVALUATION GUIDE Table of contents 1 Introduction...3 2 What's new in version 12...4 3 Joining the Beta program...6 4 On-premise vs. cloud deployment...7 5 Evaluation scenarios...8

More information

Enterprise Security with mobilecho

Enterprise Security with mobilecho Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come

More information

End User Devices Security Guidance: Apple ios 8

End User Devices Security Guidance: Apple ios 8 GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy

More information

Polkast Einstein User Guide v.1

Polkast Einstein User Guide v.1 Mobile Device Access provided by Polkast Polkast Einstein User Guide v.1 About Polkast Einstein... 2 Introduction... 2 Definitions... 2 Logging into your Polkast Account... 2 Registering your Mobile Device...

More information

Backups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete

Backups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete Backups User Guide for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot

More information

Colligo Engage for Mac. User Guide

Colligo Engage for Mac. User Guide for Mac User Guide Contents Introduction... 2 Key Features... 2 Devices Supported... 2 SharePoint Platforms Supported... 2 Installing Colligo Engage... 3 Managing SharePoint Sites... 5 Adding a Site...

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

Mobile First Government

Mobile First Government Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,

More information

Purpose The purpose of this document is to provide information and recommendations on how to successfully deploy IBM Cognos Mobile in your enterprise.

Purpose The purpose of this document is to provide information and recommendations on how to successfully deploy IBM Cognos Mobile in your enterprise. Purpose The purpose of this document is to provide information and recommendations on how to successfully deploy IBM Cognos Mobile in your enterprise. Applicability The information is focused on deploying

More information

Store & Share Quick Start

Store & Share Quick Start Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You

More information

Medstar Health Dell Services

Medstar Health Dell Services Medstar Health Dell Services Non Medstar Device Citrix Connectivity Guide October 2012 Sean Kaminski Dell Services System Admin Consultant 1 Table of Contents Overview...3 What is Citrix and why do I need

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH. Copyright Statement Copyright Acronis International GmbH, 2002-2016. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH. Acronis Compute with Confidence,

More information

AvePoint Perimeter Online

AvePoint Perimeter Online AvePoint Perimeter Online User Guide Issued November 2016 1 Table of Contents What s New in this Guide... 5 About AvePoint Perimeter Online... 6 Site Collection Administrators... 6 SharePoint Online Users...

More information

EM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab

EM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab EM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab Description The Symantec Mobile Management platform continues to expand it s offering with new support for native

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide

CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM User Guide Revision D Issued July 2014 Table of Contents About CRM Migration Manager... 4 System Requirements... 5 Operating Systems... 5 Dynamics

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Good Share Client User Guide for ios Devices

Good Share Client User Guide for ios Devices Good Share Client User Guide for ios Devices Product Version: 3.1.3 Doc Rev 3.1 Last Updated: 24-Feb-15 Good Share TM Table of Contents Introducing Good Share 1 Installing the Good Share App 1 Getting

More information

Novell Filr. Mobile Client

Novell Filr. Mobile Client Novell Filr Mobile Client 0 Table of Contents Quick Start 3 Supported Mobile Devices 3 Supported Languages 4 File Viewing Support 4 FILES THAT CANNOT BE VIEWED IN THE FILR APP 4 FILES THAT GIVE A WARNING

More information

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6

More information

Colligo Briefcase 3.3

Colligo Briefcase 3.3 3.3 Enterprise, Pro, and Lite Editions User Guide ipad Table of Contents Introduction... 4 Key Features... 4 Benefits... 4 Devices Supported... 5 SharePoint Platforms Supported... 5 Colligo Briefcase Lite...

More information

File Sharing & Collaboration

File Sharing & Collaboration File Sharing & Collaboration Box.com File Sharing Revision Date: October 29, 2013 Prepared by: William Fisher Contents Overview... 3 Account Request... 3 Installation... 3 Installing Box Sync... 4 Installing

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Lab Validation Report

Lab Validation Report Lab Validation Report Content Raven Secure Content Distribution By Ginny Roth and Brian Garrett February 2012 Lab Validation: Content Raven Secure Content Distribution 2 Contents Introduction... 3 Background...

More information

Mobile App User's Guide

Mobile App User's Guide Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure

More information

Table of Contents. Oxygen Web Client... 34 Uploading my files... 34 Versioning my files... 34 Deleting my files... 36

Table of Contents. Oxygen Web Client... 34 Uploading my files... 34 Versioning my files... 34 Deleting my files... 36 Oxygen User Guide Table of Contents What is Oxygen Cloud?... 3 Getting Started with Oxygen!... 4 Registering... 4 Access My Files from Any Device... 6 What is an Oxygen Space?... 7 Types of Spaces... 8

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

HP 3PAR Peer Motion Software Date: December 2011 Authors: Tony Palmer, Sr. ESG lab Analyst and Ajen Johan, ESG Lab Engineer

HP 3PAR Peer Motion Software Date: December 2011 Authors: Tony Palmer, Sr. ESG lab Analyst and Ajen Johan, ESG Lab Engineer ESG Lab Review HP 3PAR Peer Motion Software Date: December 2011 Authors: Tony Palmer, Sr. ESG lab Analyst and Ajen Johan, ESG Lab Engineer Abstract: This ESG Lab review documents hands-on testing of HP

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

OneDrive for Business User Guide

OneDrive for Business User Guide OneDrive for Business User Guide Contents About OneDrive for Business and Office 365... 2 Storing University Information in the Cloud... 2 Signing in... 2 The Office 365 Interface... 3 The OneDrive for

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

Recovery-Series, Purpose-built Backup Appliances from Unitrends Date: June 2015 Author: Vinny Choinski, Senior Lab Analyst

Recovery-Series, Purpose-built Backup Appliances from Unitrends Date: June 2015 Author: Vinny Choinski, Senior Lab Analyst ESG Lab Review Recovery-Series, Purpose-built Backup Appliances from Unitrends Date: June 2015 Author: Vinny Choinski, Senior Lab Analyst Abstract: This ESG Lab review documents hands-on testing of the

More information

WatchDox SharePoint Beta Guide. Application Version 1.0.0

WatchDox SharePoint Beta Guide. Application Version 1.0.0 Application Version 1.0.0 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators.

ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators. ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators. Overview of ShareSync Easy, intuitive sharing and syncing ShareSync

More information

Top. Enterprise Reasons to Select kiteworks by Accellion

Top. Enterprise Reasons to Select kiteworks by Accellion Top 10 Enterprise Reasons to Select kiteworks by Accellion Top 10 Enterprise Reasons to Select kiteworks Accellion enables enterprise organizations to enhance business productivity, while ensuring data

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

SAS Mobile BI Security and the Mobile Device

SAS Mobile BI Security and the Mobile Device SAS Mobile BI Security and the Mobile Device Version 1.0 April 24, 2015 Contents Introduction...1 Security Features Provided by SAS Mobile BI and SAS Visual Analytics...2 Introduction... 2 Lock the SAS

More information

White. Paper. Evaluating Sync and Share Solutions. Balancing Security, Control, and Productivity. September, 2014

White. Paper. Evaluating Sync and Share Solutions. Balancing Security, Control, and Productivity. September, 2014 White Paper Evaluating Sync and Share Solutions Balancing Security, Control, and Productivity By Terri McClure, Senior Analyst September, 2014 This ESG White Paper was commissioned by Code42 and is distributed

More information

NEC CLOUD STORAGE. Demo Guide

NEC CLOUD STORAGE. Demo Guide NEC CLOUD STORAGE Demo Guide 2014 1 INTRODUCTION... 4 1.1 GOALS OF THIS DOCUMENT... 4 1.2 TERMS, ACRONYMS AND ABBREVIATIONS... 4 2 INTRODUCTION TO NEC CLOUD STORAGE... 5 2.1 WHAT IS NEEDED TO USE CLOUD

More information

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational

More information

CUSTOMER Administration Guide

CUSTOMER Administration Guide SAP HANA Cloud Platform, mobile service for app and device management Document Version: 1.0 2016-09-18 CUSTOMER Content 1 Solutions....4 2 SAP HANA Cloud Platform, mobile service for app and device management

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

5 Things You Need to Know About ipad in the Enterprise

5 Things You Need to Know About ipad in the Enterprise 5 Things You Need to Know About ipad in the Enterprise Introduction Without a doubt, ipads are one of the fastest adopted computing platforms in history. And, not just for consumers desiring to play Angry

More information

http://docs.trendmicro.com/en-us/home.aspx

http://docs.trendmicro.com/en-us/home.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Centrify Mobile Authentication Services for Samsung KNOX

Centrify Mobile Authentication Services for Samsung KNOX Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

Briefcase for Mac. User Guide

Briefcase for Mac. User Guide Briefcase for Mac User Guide Contents Introduction... 2 Key Features... 2 Devices Supported... 2 SharePoint Platforms Supported... 2 Installing Briefcase for Mac... 3 Managing SharePoint Sites... 4 Adding

More information

SAP Fiori Client User Guide

SAP Fiori Client User Guide Contents Introduction... 1 Mobile Qualities... 2 Prerequisites... 2 Installing the Application... 2 Launching the Application... 2 Passcode Screen... 3 First Use Tips... 5 SAP Fiori Logon... 6 Configuring

More information

EM L18 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab

EM L18 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab EM L18 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab Description The Symantec Mobile Management platform continues to expand it s offering with new support for native

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360

More information

New Choices in Windows * Device Management

New Choices in Windows * Device Management White Paper 4th Generation Intel Core Processors and Intel Atom Processors Intel and Windows 8.1* Mobility New Choices in Windows * Device Management Considerations in Deciding How to Manage Windows Devices

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

Mobile Device Management Version 8. Last updated: 16-09-14

Mobile Device Management Version 8. Last updated: 16-09-14 Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information