activecho Frequently Asked Questions
|
|
- Lawrence Randall
- 7 years ago
- Views:
Transcription
1 activecho Frequently Asked Questions What are the benefits of activecho? activecho allows your organization to provide an on-premise, managed and secure alternative to Dropbox and other file synching and sharing solutions. Benefits include: Ease of Use Requires minimal end-user training. Simple for IT to install and get up and running in minutes. Security Active Directory Integration to authenticate and provision users. Encryption for data transfer and data at rest. Whitelists and blacklists to control who users can share files with. Management Full logging, tracking and history of operations. Administrator configurable features. Zero-admin provisioning. Infrastructure Flexibility On-premise file servers or NAS, or cloud-based (Ex. Amazon S3). Cost, availability and security requirements drive decisions. What are the key features of activecho? Integration with Active Directory for end-user security and user permissions. Support of multiple deployment options including on-premise. Rapid configuration of user blacklists and whitelists to ensure file sharing access follows enterprise security and compliance requirements Simple install and rapid deployment on multiple platforms. Intuitive end-user experience that requires minimal training. HTTPS encryption of data in-motion for the secure access and sharing of files residing on multiple devices. Full logging, tracking, and history of file activities for auditing and compliance. Instant notifications and alerts. What are the most commonly used activecho cases? activecho allows users to access their files via their PC, MAC, mobile device or web browser. There are many valuable uses for enterprises and employees including: Team projects Project teams can set up activecho folders to speed collaboration and workflow. Ad hoc collaboration Users can quickly collaborate with other employees and external constituents.
2 Customer connections Corporations can share materials with customers in a secure and managed manner. Partner interactions Corporations can share materials with partners in a secure and managed manner. Service provider interchanges Service providers, such as lawyers, accountants, auditors and financial institutions, can securely and easily share sensitive material with clients. Why do I need activecho if my employees are already using Dropbox? Is your organization concerned about security, management and compliance? Do your employees have access to sensitive material? There have been many documented security related issues with Dropbox. You have no control or visibility over whom your employees are sharing information with. There is limited to no audit trail. There is no enterprise and IT oversight. How safe is Dropbox to use with mobile devices? activecho addresses all these concerns providing the consumer-grade simplicity of Dropbox with the benefit of enterprise grade security and management required by the enterprise. We are already using Dropbox for Teams? While Dropbox for Teams provides some IT oversight, there are still numerous factors to take into account, such as: Security. There have been many documented security related issues with Dropbox. IT has little or no control over whom your employees are sharing information with. There is limited to no audit trail. How safe is it to use with mobile devices? Would you like to run file sharing on-premise? Do you want full Active Directory integration? Do you want to control your files? activecho addresses all these concerns by providing the consumer-grade simplicity of Dropbox with the enterprise grade security and management required by the enterprise. Will my end users want to use this? activecho is really simple to use and works very similarly to Dropbox. activecho was built to provide the consumer-grade simplicity of Dropbox with the enterprise grade security and management required by the enterprise. I like having my storage taken care of for me. And on-premise is added storage cost for me. And we like the cloud solutions because we don t have to manage it. For many of our customers, they have additional storage already in place which they can take advantage of. And in fact, for solutions like Dropbox or Box, you are paying for storage for each individual user regardless of how much they use. With activecho, you allocate the storage and can monitor how much is used. In a future release, activecho will also have a storage quota that you can place on users or groups of users. In many ways, activecho can be more cost-effective than the other cloudbased solutions. activecho is also very simple to manage and maintain so it will not add significant management overhead.
3 Why should Enterprise File Sharing be a priority or issue right now? A significant number of employees within the organization are or may be using unapproved, and sometimes unsecure solutions, to either collaborate on files with others or to get files on their mobile devices. So while this may not be a visible priority, it is likely that you may already have an existing problem within your organization. This is especially true in the mobility use case where your employees may be using Dropbox or other similar solutions to get files on to their ipads or iphones. Wouldn t this cause your company concern regarding the security of corporate assets? Do we need to use Synchronization? You don t need to use sync if you don t want to. You can use activecho with a Browser or mobile app to get to your files from anywhere. How safe is it for people to put files on their mobile devices? activecho provides a very safe and secure mobile environment to access files on mobile devices, such as ipad and iphone. We use our mobilecho solution to provide this access which has the following features/functions: Encrypted sandbox. In transit encryption with HTTPS. Integration in Active Directory. Administrator configurable functions. What are the system requirements? The activecho solution consists of two components: server software and client apps for Mac, Windows, ipad and iphone. The client is also accessible via most popular browsers. activecho can be installed on both server and workstation-class versions of the Windows operating system. For optimal results, your Windows machine should be running the latest service pack from Microsoft. Server Requirements: Windows 2003 / 2008 / 2012 Intel/AMD Server Virtualization environments Cloud (Amazon EC2) Client Requirements: Windows: Vista, 7, XP Mac OS X 10.6 and higher ipad iphone Android Browsers: Firefox, Internet Explorer, Google Chrome, Safari What s the installation process for the activecho client software on Windows? On a Windows computer, use a browser to download and run the activecho client software from the activecho server s login page. In the preferences pane, enter the server name (DNS name like or select a folder to monitor and you are ready to go.
4 What s the installation process for the activecho client software on Mac OS X? On a Mac OS X computer, download and run the activecho client software installer. In the preferences pane, enter the server name (DNS name like or select a folder to monitor and you are ready to go. What s the installation process for the activecho client software on iphone or ipad? On any ios device, install the mobilecho App from the Apple App Store. Add the activecho server name (DNS name like server. mycompany.com) or IP address, log in and you are ready to go. How does activecho address security? activecho addresses many key security requirements including: Integration with Active Directory for ensured security and user permissions. Support of multiple deployment options including on-premise. Rapid configuration of user blacklists and whitelists to ensure file and sharing access follows enterprise security and compliance requirements. HTTPS encryption of data in-motion with for the secure access and sharing of files residing on multiple devices. Full logging, tracking, and history of file activities for auditing and compliance. Instant notifications and alerts. We also have a document that specifically addresses security which is available on our web site. Do you use encryption? Yes, we encrypt data at rest and in-motion. HTTPS encryption of data in-motion with for the secure access and sharing of files residing on multiple devices. Can you run activecho on multiple servers with central management? You can run activecho on multiple servers, but they are independent of each other for use and management. You will also require a separate license and agreement for each activecho server. Can you split the repository among multiple storage devices? No, not at this time. It is on our roadmap. Can you run it in the DMZ? Yes. activecho is specially designed to run in the DMZ. It s fully encrypted repository and firewall friendly protocols make DMZ a very desirable deployment scenario.
5 Can I share files with people outside my company? Yes. activecho allows users to share files with external users (as long as IT permits sharing with external users). With activecho, the enterprise can remain in control of who can share what, and with whom it can be shared. First, for internal employees, users are provisioned through Active Directory to ensure they are approved for file sharing. External constituents can also be added; related to this is the ability to add recipients to whitelists or blacklists. This gives IT complete control over who is allowed to share and receive corporate files. A whitelist would contain a list of properly credentialed external partners. This could be a finance department securely sharing data with their external auditors. One example of blacklist usage is setting a restriction to not allow users to send files to a Gmail address. If we don t use Active Directory, can we use activecho? Yes. You can create user accounts and invite others (internal and external) using addresses. If the organization already uses mobilecho, why would we need activecho? mobilecho and activecho are complementary solutions. mobilecho is our Mobile File Management solution. activecho is our Enterprise File Sharing Solution. mobilecho is all about providing mobile users secure access to corporate file servers. activecho is all about enabling file sharing between multiple people and providing access across all of your devices (desktop/laptop, web browser and mobile device). Acronis Product Summary ExtremeZ-IP provides seamless integration of Macs into Windows server environments. We ve been selling this product for 12 years and we have thousands of customers. mobilecho provides secure mobile file access to corporate file servers. Introduced in May 2011, it has hundreds of customers and has been especially popular within financial services, healthcare, pharma and other regulated industries. activecho Enterprise File Sharing. Freedom of Choice IT can run activecho on-premise or private cloud. Security o Active Directory o Encryption o Auditing Mobile significant advantage on mobile because we use mobilecho. For additional information please visit To purchase Acronis products, visit or search online for an authorized reseller. Acronis office details can be found at Copyright Acronis International GmbH. All rights reserved. Acronis, activecho, mobilecho and the Acronis logo are trademarks of Acronis International GmbH. ExtremeZ-IP is a registered trademarks of GroupLogic, Inc. Windows is a registered trademark of Microsoft Corporation. Other mentioned names may be trademarks or registered trademarks of their respective owners and should be regarded as such. Technical changes and differences from the illustrations are reserved; errors are excepted
activecho Driving Secure Enterprise File Sharing and Syncing
activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationmobilecho: 5-Step Deployment Plan for Mobile File Management
mobilecho: 5-Step Deployment Plan for Mobile File Management Overview GroupLogic s mobilecho is the industry s first and only secure Mobile File Management (MFM) solution for ipads. mobilecho enables IT
More informationEMBRACING SECURE BYOD
EMBRACING SECURE BYOD Acronis 2002-2014 Introduction The Bring Your Own Device (BYOD) movement has evolved from a buzzword and a trend to a full-fledged corporate phenomenon. Tablets and smartphones have
More informationNEC CLOUD STORAGE. Demo Guide
NEC CLOUD STORAGE Demo Guide 2014 1 INTRODUCTION... 4 1.1 GOALS OF THIS DOCUMENT... 4 1.2 TERMS, ACRONYMS AND ABBREVIATIONS... 4 2 INTRODUCTION TO NEC CLOUD STORAGE... 5 2.1 WHAT IS NEEDED TO USE CLOUD
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationAcronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.
1 Copyright Acronis International GmbH, 2002-2016 Copyright Statement Copyright Acronis International GmbH, 2002-2016. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of
More information5 Things You Need to Know About ipad in the Enterprise
5 Things You Need to Know About ipad in the Enterprise Introduction Without a doubt, ipads are one of the fastest adopted computing platforms in history. And, not just for consumers desiring to play Angry
More informationInstallation and Upgrade Guide
Installation and Upgrade Guide Copyright Statement Copyright Acronis International GmbH, 2002-2014. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of Acronis International
More informationThe Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
More informationEnterprise Security with mobilecho
Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come
More informationWHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them
Mobile Security Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for
More informationBES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
More informationIntroducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management
Introducing Databackup.com Cloud Backup File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Global Explosion of Data The demand for cloud storage is just getting started.
More informationMobile Printing for Business Made Easy
Mobile Printing for Business Made Easy If users know how to send an email or go to a Web address, they can print with EveryonePrint EveryonePrint is the perfect fit for any business of any size, where
More informationGladinet Cloud Access Solution Simple, Secure Access to Online Storage
A Gladinet White Paper http://www.gladinet.com Gladinet Cloud Access Solution Simple, Secure Access to Online Storage October 12 Contents Introduction 2 Problem Statement 2 Previous Options Error! Bookmark
More informationSystems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
More informationQuick View. Folder Details
Quick View You MUST be logged in to access any information inside the IONU system. If you aren t logged in, you will not see the folders and the data and files cannot be accessed and decrypted. All files,
More informationActive Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper
Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.
More informationThe Dangers of Consumer Grade File Sharing in a Compliance Driven World
The Dangers of Consumer Grade File Sharing in a Compliance Driven World Enterprise data access is spiraling out of control owncloud, Inc. 57 Bedford Street Suite 102 Lexington, MA 02420 United States www.owncloud.com/contact
More informationowncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
More informationE-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER
E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting
More informationIONU PRO Product Overview
Quick View ü You MUST be logged in to access any information inside the IONU system. If you aren t logged in, you will not see the folders and the data and files cannot be accessed and decrypted. ü All
More informationSecure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst
ESG Lab Spotlight Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst Abstract: This ESG Lab Spotlight provides a high level look at the Acronis Access
More informationEgnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
More informationOpenScape Web Collaboration
OpenScape Web Collaboration Give your teams a better way to meet Enabling the Bring-Your-Device-to-Work era OpenScape Web Collaboration is a scalable, reliable, and highly secure web conferencing solution
More informationManual for Android 1.5
Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor
More informationHow To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On
Installation and Setup of Google Drive for Students on Mac OS X Purpose: This guide will lead you through the Google Drive Installation and Configuration. Pre-requisites: 1) ODU Student Gmail account 2)
More informationowncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
More informationCTERA Portal Datacenter Edition
Administrator Guide CTERA Portal Datacenter Edition November 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any
More informationReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA
User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label
More informationHitachi Content Platform (HCP)
Copyright 2014 A*STAR Version 1.0 Hitachi Content Platform (HCP) HCP and HCP Anywhere Features Evaluation THIS DOCUMENT AND THE INFORMATION CONTAINED HEREIN IS PROVIDED ON AN "AS IS" BASIS WITHOUT ANY
More informationGetting Started with TRITON Mobile Security
1 Getting Started with TRITON Mobile Security Welcome to Websense TRITON Mobile Security. Mobile Security is a cloud-based service that brings comprehensive and flexible protection against web threats
More information5 Things You Need to Know About ipad in the Enterprise
5 Things You Need to Know About ipad in the Enterprise Introduction Without a doubt, ipads are one of the fastest adopted computing platforms in history. And, not just for consumers desiring to play Angry
More informationAccess All Your Files on All Your Devices
d Access All Your Files on All Your Devices The Best Performance, Features and Price for Private cloud storage for all platforms Windows, Mac, Linux, ios, Android, Blackberry & more Enterprise Private
More informationAmazon WorkMail. User Guide Version 1.0
Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection
More informationMaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationMassTransit vs. FTP Comparison
MassTransit vs. Comparison If you think is an optimal solution for delivering digital files and assets important to the strategic business process, think again. is designed to be a simple utility for remote
More informationUSER S MANUAL FOR THE HEALTHCARE DEMO SOFTWARE:
USER S MANUAL FOR THE HEALTHCARE DEMO SOFTWARE: PHYSICIAN S USER INTERFACE. SETASOFTWARE TABLE OF CONTENTS 1. General Information 2. Systems Overview 3. Installation and Access 4. System Modules 4.1. Authentication
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationMedia Server Installation & Administration Guide
Media Server Installation & Administration Guide Smarter Surveillance for a Safer World On-Net Surveillance Systems, Inc. One Blue Hill Plaza, 7 th Floor, PO Box 1555 Pearl River, NY 10965 Phone: (845)
More informationBusiness and enterprise cloud sync, backup and sharing solutions
Business and enterprise cloud sync, backup and sharing solutions Private Cloud Synchronization Collaboration Backup / Versioning Web Access Mobile Access LDAP / Active Directory Federated RADIUS Single
More informationAn Enterprise Approach to Mobile File Access and Sharing
White Paper File and Networking Services An Enterprise Approach to Mobile File Access and Sharing Table of Contents page Anywhere, Any Device File Access with IT in Control...2 Novell Filr Competitive
More informationSOOKASA WHITEPAPER SECURITY SOOKASA.COM
SOOKASA WHITEPAPER SECURITY SOOKASA.COM Sookasa Overview Sookasa was founded in 2012 by a team of leading security experts. The company s patented file-level encryption enables enterprises to protect data
More informationNasuni Management Console Guide
Nasuni Management Console Guide Version 5.5 April 2014 2014 Nasuni Corporation All Rights Reserved Document Information Nasuni Management Console Guide Version 5.5 April 2014 Copyright Copyright 2010-2014
More information2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
More information2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationDropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
More informationGoogle Drive @ Holy Family University
Google Drive @ Holy Family University A Hard Drive in the Cloud. Access & share anything everywhere Google Docs has been retired and replaced by Drive. And if you are familiar with Google Docs, Google
More informationTaming the Mobile File Sharing Beast
White Paper File and Networking Services Taming the Mobile File Sharing Beast To Whom Should You Entrust the Enterprise Goods? Mobile file access and sharing is not only the rage, but it s fast becoming
More informationIBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
More informationSpontania User Setup Guide
Spontania User Setup Guide ClearOne 5225 Wiley Post Way Suite 500 Salt Lake City, UT 84116 Telephone 1.800.945.7730 1.801.975.7200 Spontania Support 1.801.974.3612 TechSales 1.800.705.2103 FAX 1.801.977.0087
More informationOpenText Managed File Transfer (MFT) is an enterprise
OpenText IX Secure MFT Simplified, accelerated, and managed enterprise file exchange OpenText Managed File Transfer (MFT) is an enterprise solution for managing the exchange of rich digital content inside
More informationONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0
ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a
More informationCloudController. Getting Started In the Cloud. The Cloud-Based, Full-Service Accounting Solution. From ORBA, the business advisor you trust
CloudController The Cloud-Based, Full-Service Accounting Solution From ORBA, the business advisor you trust for all your accounting needs Quick Setup Guide TABLE OF CONTENTS Chapter 1- QuickBooks in the
More informationOpenScape Web Collaboration
OpenScape Web Collaboration Performance-boosting collaboration and secure support for teams from anywhere OpenScape Web Collaboration is a scalable, reliable, and highly secure web conferencing solution
More informationSupport for Apple Mac and ios Devices
Support for Apple Mac and ios Devices Published: July 29, 2011 For the latest information, please see Microsoft Office 365. The information contained in this document represents the current view of Microsoft
More informationComparing Alternatives for Business-Grade File Sharing. intermedia.net 1.800.379.7729. sales@intermedia.net CALL US EMAIL US ON THE WEB
for -Grade CALL US EMAIL US ON THE WEB 1.800.379.7729 sales@intermedia.net intermedia.net for -Grade Goal of this report This report compares and contrasts various alternatives for file sharing in a business
More informationAdministration Guide. WatchDox Server. Version 4.8.0
Administration Guide WatchDox Server Version 4.8.0 Published: 2015-11-01 SWD-20151101091846278 Contents Introduction... 7 Getting started... 11 Signing in to WatchDox... 11 Signing in with username and
More informationLync Online Deployment Guide. Version 1.0
Date 28/07/2014 Table of Contents 1. Provisioning Lync Online... 1 1.1 Operating System Requirements... 1 1.2 Browser Requirements Administrative Centre... 1 2. Obtaining your login Credentials & Logging
More informationCopyright 2013 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationProduct Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
More informationSmarter working. Capture and output connectivity solutions for mobile and cloud services. you can
Smarter working Capture and output connectivity solutions for mobile and cloud services you can Make your business agile - mobile and cloud connectivity Technology is fast evolving, offering you new opportunities
More informationGoToMyPC reviewer s guide
GoToMyPC reviewer s guide Citrix GoToMyPC reviewer s guide Thank you for evaluating Citrix GoToMyPC. This guide will introduce you to the current GoToMyPC functionality and help you effectively evaluate
More informationIslington ebooks Help / FAQs
Islington ebooks Help / FAQs How does the ebook Service work? Using your Library Card and pin, an Islington Libraries user can login into a secure ebook service and select up to 4 ebooks to download at
More informationOcularis Media Server Installation & Administration Guide
Ocularis Media Server Installation & Administration Guide 2013 On-Net Surveillance Systems Inc. On-Net Surveillance Systems, Inc. One Blue Hill Plaza, 7 th Floor, PO Box 1555 Pearl River, NY 10965 Phone:
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationCA Service Desk Manager - Mobile Enabler 2.0
This Document is aimed at providing information about the (CA SDM) Mobile Enabler and mobile capabilities that is typically not available in the product documentation. This is a living document and will
More informationSeagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts
Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide 2 Purpose of this guide Experience the most common use cases for the product, learn about
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationSample- for evaluation purposes only! Outlook Web App. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.
A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2015 Outlook Web App TeachUcomp, Inc. it s all about you Copyright: Copyright 2015 by TeachUcomp, Inc. All rights reserved. This publication,
More informationAccess Your Cisco Smart Storage Remotely Via WebDAV
Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to
More informationHow To Use Uniflow
One platform for all your print, scan and device management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in
More informationSystems Manager Cloud-Based Enterprise Mobility Management
Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and
More informationSoftware Product Information. Faba5 Website
Software Product Information Faba5 Website Valid from 09th March 2013 Copyright Faba5 GmbH, A-4020 Linz, 2013. All rights reserved. All hardware and software names used are registered trade names and/or
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationManage all your Office365 users and licenses
Manage all your Office365 users and licenses Delegate 365 White Paper Authors: Toni Pohl, Martina Grom Version: 1.2 of December 2014 atwork information technology gmbh. All rights reserved. For information
More informationCloud Store & Share Frequently Ask Questions
Cloud Store & Share Frequently Ask Questions Where can I find information about the offer, e.g. the price list? How can I order the service? What is the Cloud Store & Share Client? Where can I download
More informationCitrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide
Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6
More informationImplementation Guide. Version 10
Implementation Guide Version 10 Synthesis Enterprise Portal Implementation Guide Part Identification: RPIGSEP10 ReliaSoft Corporation Worldwide Headquarters 1450 South Eastside Loop Tucson, Arizona 85710-6703,
More informationInformation. OpenScape Web Collaboration V7
Information OpenScape Web Collaboration V7 OpenScape Web Collaboration V7 is a scalable, reliable, and highly secure web conferencing solution for enterprises of all sizes. It provides a cost-effective
More informationWhitepaper. Securing Data in Google Drive The Enterprise Guide to keeping corporate data safe in Google Drive. Introduction.
Whitepaper Securing Data in Google Drive The Enterprise Guide to keeping corporate data safe in Google Drive At a Glance Intended Audience: C-level security, collaboration, and trust professionals at companies
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationShareFile Enterprise. Jaan Feldmann Sergei Sokolov
ShareFile Enterprise Jaan Feldmann Sergei Sokolov Users Demand Instant file and data access from any device File sharing (with anyone) Easy and familiar (love Dropbox) IT Wants Security Control no data
More informationEasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
More informationHow To Find Print And Print Servers On A Macintosh (For Free)
Simplify WAN Service Discovery for Mac Users & Eliminate Appletalk A Technical Best Practices Whitepaper Overview Macintosh users need to easily locate network resources such as printers and file servers.
More informationFrequently Asked Questions
Frequently Asked Questions Contents FAQ: About Us... 1 FAQ: About BryteWave Digital Textbooks... 2 FAQ: Shopping... 4 FAQ: Delivery of Digital Materials... 6 FAQ: Mobile Devices... 7 FAQ: Technical...
More informationMobile. Pull. Solution. Print. and. Get true printing flexibility and document security with EveryonePrint
Get true printing flexibility and document security with EveryonePrint SimpleSecure Mobile Print and Pull Solution EveryonePrint is the perfect fit for any business of any size, where users need secure
More informationAcronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE
Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution
More informationMailStore Server 7 Technical Specifications
MailStore Server 7 Technical Specifications MailStore Server The Standard in Email Archiving Businesses of all sizes can benefit from the legal, technical, and financial advantages of modern and secure
More informationMaintaining Native Mac File Sharing in an Enterprise Storage Environment A Technical Best Practices Whitepaper
Maintaining Native Mac File Sharing in an Enterprise Storage Environment A Technical Best Practices Whitepaper About This Document This whitepaper explores two important trends in Enterprise Storage: the
More informationWhitepaper. Simple and secure. Business requirements for Enterprise File Sync and Share solutions. www.brainloop.com
Whitepaper Simple and secure Business requirements for Enterprise File Sync and Share solutions www.brainloop.com Simplicity and security: business requirements for enterprise file sync and share solutions
More informationDeploying Apple ios in Education
Solution Guide Deploying Apple ios in Education March 013 This document covers strategies for deploying, monitoring, and supporting ios devices in education environments. Table of Contents 1 3 4 5 6 7
More informationSystem requirements for Qlik Sense. Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved.
System requirements for Qlik Sense Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech,
More informationConvergence 2012 Dynamics CRM
Convergence 2012 Dynamics CRM May 1, 2012 Agenda Welcome CRM 2011 Questions Next Steps Microsoft Dynamics CRM Roadmap Q4 2011 Q1 2012 Q2 2012 Q3 2012 Q4 2012 November 2011 Service Update R7 Social Productivity
More information