Syncplicity Expands Virtual Private Cloud Capabilities

Syncplicity Expands Virtual Private Cloud Capabilities

Syncplicity is expanding virtual private cloud capabilities with the launch of its new iPhone app that is fully optimized and 100% native to Apple’s iOS platform. Syncplicity, which specializes in cloud based file management, sync and backup solutions, notes that its newly released application is set to give its users universal mobile access to all their files and folders. The new application will also enable users to meet important business requirements such as security, backup and versioning.

Cloud-based file management has definitely gone to the next level with this announcement as customers are now able to manage their own virtual private cloud. One can seamlessly access data anytime and anywhere regardless of where it is stored.

This announcement has apparently come at the right time as the popularity of both mobile and cloud adoption is increasing amongst consumers and businesses. Syncplicity notes IDC, according to which, the market for file sharing, file synchronization and backup services is expected to reach $2.5 billion by 2014.

With more data, file types, mobile devices and cloud apps, the level of complexity that users face managing their data has skyrocketed,” said Leonard Chung, Syncplicity’s co-founder and chief product strategist.

Syncplicity solves the challenges of accessing, syncing, sharing, versioning, backing up and managing files by giving users a simple, universal way to master all of their files in place, without moving a single file, that securely leverages cloud computing.

Those interested to buy Syncplicity’s new iPhone app can do so free of charge on Apple’s App Store. This application includes several features such as key file management capabilities to users on the go, including creating and deleting folders, creating and uploading photos and videos, and viewing and reverting to previous file versions. Also, this solution allows for real-time collaboration and sharing, ensures security of data, and has the ability to list and open any past version of any file from the iPhone.

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…