Top 25 European Rising Stars 2012: YobiDrive

Top 25 European Rising Stars 2012: YobiDrive

Top 25 European Risng Stars: YobiDrive

….YobiDrive: A Smart Choice for Cryptographic File Sharing on The Cloud

The Top 25 European Rising Stars is a special annual series by CloudTweaks, where we seek to celebrate new cloud startups that have demonstrated the strongest impact across the year. These have earned little or no press coverage nor loquacious claims but they are indeed rising. To authoritatively arrive at the top 25, we have applied a criteria pegged on critical parameters like the quality of management, current funding, valuable service provision, European based and professionalism in all respects.

In the face of the rise of the Smartphone as the major tool of communication and even for remote business interaction today, it was high time encryption technologies improved. There are upcoming cloud providers ready to meet this deficit. One such provider is YobiDrive, a Luxembourg startup that is leveraging on the way individuals and corporate entities exchange files cryptically. They can even choose on how they want to disburse the files, who can gain a key into the documentation stage, and who has the viability to access the finished product.

There are three approaches to YobiDrive in terms of:

1. Device-to-device harmonization
2. Cryptographic cloud storage
3. Core Services: File Sharing

Device-to-device Harmonization:  From the homepage of YobiDrive, one gets to visualize how diverse gadgets, ranging from tablets to smart cellular devices, can interact privately. If the user is away from office, he or she only needs to unlock the company’s or private cloud to either view or work on a document. There is a similar model, albeit concentrating more on cryptography in Microsoft’s workspace, which envisions a way of letting people view content in its read-only format, but they cannot go into altering it if they have no authority. YobiDrive, does not concentrate as much on the above score as it does in ensuring that only an authorized ID unlocks private information using a different device. This is why the startup uses API technology to ensure that no matter how different a mobile gadget’s operational framework is from that of a computer, the latter being the source of the private data, the data remains foolproof against illegal tapping.

Cryptographic Cloud Storage: Going by the multi-tenancy option of the cloud, YobiDrive expands its file sharing drive into a fully-fledged cryptographic sending-and-receiving storage conduit. This deters other networks within a multiple-tenant cloud infrastructure from reading each other’s data that is always in perpetual motion. In the face of it, the startup has recognized the need for double-encrypting documents, in their finished file stage, so that when they are in transit, they do not spill some of their contents to hackers. This is courtesy of its key technology, alongside its drive-style remote storage. Of course even the drive is not averse to viral attacks, which makes the encryption precaution a little off the mark, for as Microsoft’s  research team says, it is more about searching for “homomorphic encryption” and similar trials that the consolidation of existing crypto technology will finally succeed.

Core Services: File Sharing: The YobiDrive’s agility at file sharing is discernable in the ability to improve uptime and reduce the time a file spends on the network during the remission process. The software edifies a single click impetus, even when a file is in the documentation stage, right into a published format. Say, if one is working on a blog post on the current  offers that his/ her company has in store, they can keep hitting the button, stage by stage, to save the publication instead of undergoing many stages before publishing. There is also an organizing icon from this provider that helps to profile the valid partners in an ongoing file exchange project. Each receives a key to the repository, so that the files can stay in an anonymous format that only the partners can unlock when need be. The accessibility limitation even moves into the world of equal partners: users can curtail the seeing of the work in progress until a certain time comes. Microsoft’s research lab, however, sees certain obstacles in that format meaning that the Internet as a browsing field, will initiate search with certain keywords that will allow the work to be available even in its encrypted form. Thus, in spite of trying the best to make file sharing a secure process by cloud security standards, YobiDrive can do more to boost this overlook.
Users on Google webmaster pages are already recommending the technology with some commenting on the software as being “fully elastic.” There are also overtones of how the storage solution adheres to S3 implementation guidelines, thus making its cloud suitability even greater.

Thus, YobiDrive qualifies into the Top 25 European Rising Stars because of the fact that it is fully-fledged in storage, cryptography and file sharing. There might be loopholes, here and there, but any way, encryption has always attracted diverse views. The Luxembourg startup is an offering of the EZC Group.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Comic
How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced;Introduction of VMware Cloud Foundation on IBM Cloud helps move existing apps to the cloud within hours; More than 4,000 IBM service professionals trained to help organizations extend…

Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

Cloud Infographic – Big Data Predictions By 2023

Cloud Infographic – Big Data Predictions By 2023

Big Data Predictions By 2023 Everything we do online from social networking to e-commerce purchases, chatting, and even simple browsing yields tons of data that certain organizations collect and poll together with other partner organizations. The results are massive volumes of data, hence the name “Big Data”. This includes personal and behavioral profiles that are stored, managed, and…

Cloud Computing Myths That SMBs Should Know

Cloud Computing Myths That SMBs Should Know

Cloud Computing and SMBs Cloud Computing is the hottest issue among IT intellects of Small and Medium Businesses (SMBs). Like any other computer-orientated technology, Cloud Computing has some misconceptions and myths that often kick-start arguments among the two opposing groups: Cloud Supporters and Cloud Opponents. Both of these groups have their own ideology and reasons…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…