Top 25 European Rising Stars 2012: YobiDrive

Top 25 European Rising Stars 2012: YobiDrive

Top 25 European Risng Stars: YobiDrive

….YobiDrive: A Smart Choice for Cryptographic File Sharing on The Cloud

The Top 25 European Rising Stars is a special annual series by CloudTweaks, where we seek to celebrate new cloud startups that have demonstrated the strongest impact across the year. These have earned little or no press coverage nor loquacious claims but they are indeed rising. To authoritatively arrive at the top 25, we have applied a criteria pegged on critical parameters like the quality of management, current funding, valuable service provision, European based and professionalism in all respects.

In the face of the rise of the Smartphone as the major tool of communication and even for remote business interaction today, it was high time encryption technologies improved. There are upcoming cloud providers ready to meet this deficit. One such provider is YobiDrive, a Luxembourg startup that is leveraging on the way individuals and corporate entities exchange files cryptically. They can even choose on how they want to disburse the files, who can gain a key into the documentation stage, and who has the viability to access the finished product.

There are three approaches to YobiDrive in terms of:

1. Device-to-device harmonization
2. Cryptographic cloud storage
3. Core Services: File Sharing

Device-to-device Harmonization:  From the homepage of YobiDrive, one gets to visualize how diverse gadgets, ranging from tablets to smart cellular devices, can interact privately. If the user is away from office, he or she only needs to unlock the company’s or private cloud to either view or work on a document. There is a similar model, albeit concentrating more on cryptography in Microsoft’s workspace, which envisions a way of letting people view content in its read-only format, but they cannot go into altering it if they have no authority. YobiDrive, does not concentrate as much on the above score as it does in ensuring that only an authorized ID unlocks private information using a different device. This is why the startup uses API technology to ensure that no matter how different a mobile gadget’s operational framework is from that of a computer, the latter being the source of the private data, the data remains foolproof against illegal tapping.

Cryptographic Cloud Storage: Going by the multi-tenancy option of the cloud, YobiDrive expands its file sharing drive into a fully-fledged cryptographic sending-and-receiving storage conduit. This deters other networks within a multiple-tenant cloud infrastructure from reading each other’s data that is always in perpetual motion. In the face of it, the startup has recognized the need for double-encrypting documents, in their finished file stage, so that when they are in transit, they do not spill some of their contents to hackers. This is courtesy of its key technology, alongside its drive-style remote storage. Of course even the drive is not averse to viral attacks, which makes the encryption precaution a little off the mark, for as Microsoft’s  research team says, it is more about searching for “homomorphic encryption” and similar trials that the consolidation of existing crypto technology will finally succeed.

Core Services: File Sharing: The YobiDrive’s agility at file sharing is discernable in the ability to improve uptime and reduce the time a file spends on the network during the remission process. The software edifies a single click impetus, even when a file is in the documentation stage, right into a published format. Say, if one is working on a blog post on the current  offers that his/ her company has in store, they can keep hitting the button, stage by stage, to save the publication instead of undergoing many stages before publishing. There is also an organizing icon from this provider that helps to profile the valid partners in an ongoing file exchange project. Each receives a key to the repository, so that the files can stay in an anonymous format that only the partners can unlock when need be. The accessibility limitation even moves into the world of equal partners: users can curtail the seeing of the work in progress until a certain time comes. Microsoft’s research lab, however, sees certain obstacles in that format meaning that the Internet as a browsing field, will initiate search with certain keywords that will allow the work to be available even in its encrypted form. Thus, in spite of trying the best to make file sharing a secure process by cloud security standards, YobiDrive can do more to boost this overlook.
Users on Google webmaster pages are already recommending the technology with some commenting on the software as being “fully elastic.” There are also overtones of how the storage solution adheres to S3 implementation guidelines, thus making its cloud suitability even greater.

Thus, YobiDrive qualifies into the Top 25 European Rising Stars because of the fact that it is fully-fledged in storage, cryptography and file sharing. There might be loopholes, here and there, but any way, encryption has always attracted diverse views. The Luxembourg startup is an offering of the EZC Group.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…