activecho Driving Secure Enterprise File Sharing and Syncing

Similar documents
activecho Frequently Asked Questions

When enterprise mobility strategies are discussed, security is usually one of the first topics

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Installation and Upgrade Guide

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

mobilecho: 5-Step Deployment Plan for Mobile File Management

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Interact Intranet Version 7. Technical Requirements. August Interact

Release Notes. Cloud Attached Storage

Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst

The Maximum Security Marriage:

FileCloud Security FAQ

Administration Guide

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Access Your Cisco Smart Storage Remotely Via WebDAV

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Security Overview Enterprise-Class Secure Mobile File Sharing

efolder BDR for Veeam Cloud Connection Guide

The Essential Security Checklist. for Enterprise Endpoint Backup

An Enterprise Approach to Mobile File Access and Sharing

Access All Your Files on All Your Devices

Kony Mobile Application Management (MAM)

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

Gladinet Cloud Access Solution Simple, Secure Access to Online Storage

Storgrid EFS Access all of your business information securely from any device

Symantec Mobile Management 7.2

SAS Visual Analytics 7.2 for SAS Cloud: Quick-Start Guide

Cloud Attached Storage 5.0

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Copyright 2013, 3CX Ltd.

Exchange ActiveSync (EAS)

Mod 2: User Management

Anchor End-User Guide

Hitachi Content Platform (HCP)

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

EMC Syncplicity Overview. Copyright 2015 EMC Corporation. All rights reserved.

BES10 Cloud architecture and data flows

Mobile Printing for Business Made Easy

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE

IBM United States Software Announcement , dated February 3, 2015

3. Where can I obtain the Service Pack 5 software?

Mobile App User's Guide

ReadyNAS Remote. User Manual. June East Plumeria Drive San Jose, CA USA

Nasuni Management Console Guide

VMware Horizon Workspace Security Features WHITE PAPER

Symantec Mobile Management Suite

The All-in-One Support Solution. Easy & Secure. Secure Advisor

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

4cast Server Specification and Installation

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Casper Suite. Security Overview

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

Business and enterprise cloud sync, backup and sharing solutions

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

WOS Cloud. ddn.com. Personal Storage for the Enterprise. DDN Solution Brief

Copyright 2013, 3CX Ltd.

Enterprise Private Cloud Storage

Egnyte Cloud File Server. White Paper

Ensuring the security of your mobile business intelligence

All your apps & data in the cloud, all in one place.

MEGA Web Application Architecture Overview MEGA 2009 SP4

Soonr Workplace Enterprise Plan Overview

owncloud Architecture Overview

Interworks. Interworks Cloud Platform Installation Guide

System requirements for Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.

Setup Guide: Server-side synchronization for CRM Online and Exchange Server

Mobile App User's Guide

1. Scope of Service. 1.1 About Boxcryptor Classic

Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst

5 Things You Need to Know About ipad in the Enterprise

Propalms TSE Deployment Guide

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1

Installation Guide Version 3.0

Mobile Device Management Version 8. Last updated:

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Cortado Corporate Server

Athena Mobile Device Management from Symantec

owncloud Architecture Overview

EasiShare Whitepaper - Empowering Your Mobile Workforce

Deploying SwiftStack Object Storage for Storage Made Easy

Transcription:

activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get their jobs done. Enterprise employees need to be able to access their individual files independent of the device desktop, laptop, tablet or smartphone. In addition, individuals want to be able to easily share and collaborate on files with their colleagues or business partners. Enterprises are also recognizing the significant advantages these tools can deliver greater information access, increased teamwork, more engaged employees, etc. These advantages can lead to significant benefits to the business - better customer service, improved products, faster production cycles, increased revenue/ profitability, etc. However, the current solutions in the marketplace, many of them consumer-based services, expose the enterprise to significant and unacceptable risks data leakage, non-compliance of regulations, security risks, loss of data, etc. activecho is the industry s only Enterprise File Sharing solution that balances the need for simplicity for the end user, and the security, management and flexibility required by the enterprise. The enterprise, and more specifically IT, requires the ability to manage and control file sharing activities to protect the critical information and data assets of the organization. IT also needs the freedom to choose the most appropriate deployment model for their use case on-premise inside the firewall, in the DMZ, or in a private cloud. This deployment flexibility, plus activecho s high level of security and control, make it a great fit for security and compliance-sensitive organizations, including regulated industries.

activecho and Security The activecho enterprise file sharing and syncing solution provides easy to use functionality and managed security capabilities. It was designed with consumer-grade simplicity and enterprise-grade security, management and flexibility. activecho addresses a variety of security, compliance and governance needs in both the activecho server and the client. With activecho, the enterprise gains control over all critical aspects, including management via AD groups, freedom of deployment options, enterprise controlled encryption and whitelisting/blacklisting of approved internal and external users and domains. activecho Server activecho starts with infrastructure flexibility. It has several deployment options for the enterprise. IT can decide where the activecho server software is installed and where activecho files are stored - on premise in the data center, in the DMZ, or in a private cloud (ex. Amazon EC2 and S3). activecho gives IT and the enterprise the freedom to choose the infrastructure model that is most appropriate for their organization. After the initial deployment, IT sets policies that govern the activecho server as it performs the following functions: Authentication Encryption Service provisioning to users Storage Management Syncing Authentication activecho allows for internal users and external users. For internal users, access to activecho requires authentication with Active Directory (AD) credentials. The user enters their AD credentials into the activecho client agent or web browser interface per policies set by IT. Once the user is validated, activecho then checks the management polices specified in the activecho management console for that AD user or the groups of which they are members. These policies are explained in the Management section below. For external users, access to activecho requires authentication with accounts that are automatically provisioned when the user accepts an activecho invitation to share. Such invitations are only sent to email addresses allowed by policies set by IT with the whitelist and blacklist functions. The bottom line is that IT, or its designate, determines what external users are allowed access. The credentials for the external users are stored encrypted in the activecho database.

Management Based on Active Directory Users and Groups Enterprise IT sets policies in activecho that govern users and groups maintained in Active Directory. It has a number of policy controls, including: Access based on Active Directory group membership Whitelist of invitees by domain or email address Blacklist of invitees by domain or email address For example, IT might create an activecho policy for members of the Accounting AD group or for an individual such as Ben.Franklin@F500Ent.com. This policy governs the functions available to members of the Accounting group regarding who they can invite inside and outside the company. Enterprise IT also sets policies that can control the special environments for users accessing activecho from their mobile devices such as iphone and ipad. Encryption All data in activecho, at rest and in transit, is encrypted. The administrator defines the encryption cipher depth and owns the encryption keys. Data at rest in the activecho repository is encrypted with a cipher such as AES-256 specified by IT. Each file has its own unique encryption key which is stored in the database. Those encryption keys are encrypted themselves with a master key for the entire solution. When using S3 to deploy the repository, all communications between clients and the repository use HTTPS and X.509 certificates. Infrastructure Model and Storage The activecho server stores files in its own secure repository. IT selects the repository location that is appropriate for the expected uses, storage availability and security requirements. activecho gives the enterprise the freedom to choose the most appropriate infrastructure option for their organization. The options include: Local Storage on the Server Network Storage accessible by UNC path over SMB or CIFS Amazon S3 storage accessed via REST over HTTPS. For many security- and compliance-sensitive organizations including regulated industries, the ability to run activecho on-premise is a significant benefit as it allows the enterprise to maintain maximum control and security.

Syncing The activecho server is the hub for the synchronization of shared files to clients. The activecho server tracks all versions of shared files so that it can respond to client requests for any changes that need to be synced down to clients. All communication between the server and clients, including the actual transfer of files, is SSL encrypted. Clients activecho provides users with automatic background synchronization by using agents that communicate with the server to synchronize changes as they occur. There are native client agents for Windows, Macintosh, ios (iphone and ipad ), as well as access via all mainstream web browsers. The Windows and Macintosh clients are software agents with a very small footprint on memory and CPU. Enterprise IT manages these Windows and Macintosh clients as follows: An activecho software agent is installed on each user s Mac or PC. An individual s activecho shared and synced files are stored in the Mac or PC file system, so standard OS security practices apply - user login, file system encryption and local file permissions. activecho configuration and passwords are stored in an encrypted data store, i.e., the Keychain on Mac OS X, or within the registry on Windows. On mobile devices, Acronis s secure and managed mobilecho app can be used to access activecho shared files. This capability is included in the activecho server license. The app can be downloaded from the App Store for free. Mobile users are also managed through Active Directory. Files and other configuration elements are encrypted in the mobilecho app s secure sandbox for complete secure mobile access to activecho. IT can control provisioning the app and perform a remote wipe of the app on mobile devices as needed. Web Access Users can also gain access to activecho using any supported mainstream web browser. activecho s web interface provides access to shared files and folders and other functionality, like viewing the transaction log, inviting other users (if permitted by IT s defined whitelist/blacklist policies), and defining email notification preferences. activecho uses a bundled version of Apache Tomcat server to provide these web services. Enterprise IT manages web access through the settings in the activecho server. activecho web access provides security by: Requiring AD credentials for access. Encrypting all data in motion with HTTPS with a cipher such as AES-256 and a X.509 encryption certificates.

Backup and Disaster Recovery activecho can be backed up as a part of normal operations to provide reliable data protection of the server data. Since all of the data stored by activecho is encrypted all the time, the security of the backup copies of the data is preserved. IT uses standard backup tools to: Backup the repository which is a structure of encrypted folder names, file names and files with encrypted content. Backup the encrypted SQL database. Store a copy of the encryption keys with the backups so that the restore process can access the encrypted files. Summary Increasingly, a vast number of business activities revolve around the collaboration and sharing of information, data and files, and the way employees and the enterprise want to share and collaborate is evolving to a newer, much more effective paradigm: Enterprise File Sharing. Acronis s activecho is the industry s only Enterprise File Sharing solution that balances the need for simplicity for the end user, and the security, management and flexibility required by the enterprise. The enterprise, and more specifically, IT, requires the ability to manage and control file sharing activities to protect the critical information, data and file assets of the organization. With activecho the enterprise can address all the critical needs of all key constituents - users, the business, IT, security, and compliance groups. For additional information please visit http://www.acronis.com To purchase Acronis products, visit www.acronis.com or search online for an authorized reseller. Acronis office details can be found at http://www.acronis.com/company/worldwide.html Copyright 2002-2013 Acronis, Inc. All rights reserved. Acronis, mobilecho, activecho and the Acronis logo are trademarks of Acronis, Inc. Windows is a registered trademark of Microsoft Corporation. Other mentioned names may be trademarks or registered trademarks of their respective owners and should be regarded as such. Technical changes and differences from the illustrations are reserved; errors are excepted. 2013-01