Syncplicity Expands Virtual Private Cloud Capabilities

Syncplicity Expands Virtual Private Cloud Capabilities

Syncplicity is expanding virtual private cloud capabilities with the launch of its new iPhone app that is fully optimized and 100% native to Apple’s iOS platform. Syncplicity, which specializes in cloud based file management, sync and backup solutions, notes that its newly released application is set to give its users universal mobile access to all their files and folders. The new application will also enable users to meet important business requirements such as security, backup and versioning.

Cloud-based file management has definitely gone to the next level with this announcement as customers are now able to manage their own virtual private cloud. One can seamlessly access data anytime and anywhere regardless of where it is stored.

This announcement has apparently come at the right time as the popularity of both mobile and cloud adoption is increasing amongst consumers and businesses. Syncplicity notes IDC, according to which, the market for file sharing, file synchronization and backup services is expected to reach $2.5 billion by 2014.

With more data, file types, mobile devices and cloud apps, the level of complexity that users face managing their data has skyrocketed,” said Leonard Chung, Syncplicity’s co-founder and chief product strategist.

Syncplicity solves the challenges of accessing, syncing, sharing, versioning, backing up and managing files by giving users a simple, universal way to master all of their files in place, without moving a single file, that securely leverages cloud computing.

Those interested to buy Syncplicity’s new iPhone app can do so free of charge on Apple’s App Store. This application includes several features such as key file management capabilities to users on the go, including creating and deleting folders, creating and uploading photos and videos, and viewing and reverting to previous file versions. Also, this solution allows for real-time collaboration and sharing, ensures security of data, and has the ability to list and open any past version of any file from the iPhone.

By Anuradha Shukla

Sorry, comments are closed for this post.

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…