Top 25 European Rising Stars 2012: YobiDrive

Top 25 European Rising Stars 2012: YobiDrive

Top 25 European Risng Stars: YobiDrive

….YobiDrive: A Smart Choice for Cryptographic File Sharing on The Cloud

The Top 25 European Rising Stars is a special annual series by CloudTweaks, where we seek to celebrate new cloud startups that have demonstrated the strongest impact across the year. These have earned little or no press coverage nor loquacious claims but they are indeed rising. To authoritatively arrive at the top 25, we have applied a criteria pegged on critical parameters like the quality of management, current funding, valuable service provision, European based and professionalism in all respects.

In the face of the rise of the Smartphone as the major tool of communication and even for remote business interaction today, it was high time encryption technologies improved. There are upcoming cloud providers ready to meet this deficit. One such provider is YobiDrive, a Luxembourg startup that is leveraging on the way individuals and corporate entities exchange files cryptically. They can even choose on how they want to disburse the files, who can gain a key into the documentation stage, and who has the viability to access the finished product.

There are three approaches to YobiDrive in terms of:

1. Device-to-device harmonization
2. Cryptographic cloud storage
3. Core Services: File Sharing

Device-to-device Harmonization:  From the homepage of YobiDrive, one gets to visualize how diverse gadgets, ranging from tablets to smart cellular devices, can interact privately. If the user is away from office, he or she only needs to unlock the company’s or private cloud to either view or work on a document. There is a similar model, albeit concentrating more on cryptography in Microsoft’s workspace, which envisions a way of letting people view content in its read-only format, but they cannot go into altering it if they have no authority. YobiDrive, does not concentrate as much on the above score as it does in ensuring that only an authorized ID unlocks private information using a different device. This is why the startup uses API technology to ensure that no matter how different a mobile gadget’s operational framework is from that of a computer, the latter being the source of the private data, the data remains foolproof against illegal tapping.

Cryptographic Cloud Storage: Going by the multi-tenancy option of the cloud, YobiDrive expands its file sharing drive into a fully-fledged cryptographic sending-and-receiving storage conduit. This deters other networks within a multiple-tenant cloud infrastructure from reading each other’s data that is always in perpetual motion. In the face of it, the startup has recognized the need for double-encrypting documents, in their finished file stage, so that when they are in transit, they do not spill some of their contents to hackers. This is courtesy of its key technology, alongside its drive-style remote storage. Of course even the drive is not averse to viral attacks, which makes the encryption precaution a little off the mark, for as Microsoft’s  research team says, it is more about searching for “homomorphic encryption” and similar trials that the consolidation of existing crypto technology will finally succeed.

Core Services: File Sharing: The YobiDrive’s agility at file sharing is discernable in the ability to improve uptime and reduce the time a file spends on the network during the remission process. The software edifies a single click impetus, even when a file is in the documentation stage, right into a published format. Say, if one is working on a blog post on the current  offers that his/ her company has in store, they can keep hitting the button, stage by stage, to save the publication instead of undergoing many stages before publishing. There is also an organizing icon from this provider that helps to profile the valid partners in an ongoing file exchange project. Each receives a key to the repository, so that the files can stay in an anonymous format that only the partners can unlock when need be. The accessibility limitation even moves into the world of equal partners: users can curtail the seeing of the work in progress until a certain time comes. Microsoft’s research lab, however, sees certain obstacles in that format meaning that the Internet as a browsing field, will initiate search with certain keywords that will allow the work to be available even in its encrypted form. Thus, in spite of trying the best to make file sharing a secure process by cloud security standards, YobiDrive can do more to boost this overlook.
Users on Google webmaster pages are already recommending the technology with some commenting on the software as being “fully elastic.” There are also overtones of how the storage solution adheres to S3 implementation guidelines, thus making its cloud suitability even greater.

Thus, YobiDrive qualifies into the Top 25 European Rising Stars because of the fact that it is fully-fledged in storage, cryptography and file sharing. There might be loopholes, here and there, but any way, encryption has always attracted diverse views. The Luxembourg startup is an offering of the EZC Group.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Comic
The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Cloud Computing Advancing Edtech In a new research study by ResearchMoz it’s predicted that the global cloud computing market in higher education will grow steadily at a CAGR of 24.57% over the period 2016 to 2020. Making use of computing resources connected by either public or private networks provides the benefits of scalable infrastructure, greater…

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Digital Healthcare Executives and Investors Addressed Opportunities and Challenges Facing the Industry New York City – September 21, 2016 – According to a survey of 122 founders, executives and investors in health-tech companies released today by Silicon Valley Bank, big data and artificial intelligence will have the greatest impact on the industry in the year ahead. Healthcare…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

Do Small Businesses Need Cloud Storage Service?

Do Small Businesses Need Cloud Storage Service?

Cloud Storage Services Not using cloud storage for your business yet? Cloud storage provides small businesses like yours with several advantages. Start using one now and look forward to the following benefits: Easy back-up of files According to Practicalecommerce, it provides small businesses with a way to back up their documents and files. No need…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…