The Lighter Side Of The Cloud – Thin Client
The Lighter Side Of The Cloud – Transformation
The Lighter Side Of The Cloud – Music Collection
Egnyte Delivers Mobile Data Management Suite For Comprehensive Device Security In The Enterprise

Egnyte Delivers Mobile Data Management Suite For Comprehensive Device Security In The Enterprise

Delivers Mobile Data Management Suite for Comprehensive Device Security in the Enterprise

First File Sync and Share Vendor to Offer Native Remote Wipe, Encryption, Trusted Device and Two-Factor Authentication Features

egnyte-logoLONDON, UK – May 22, 2013Egnyte, the leader in enterprise file sharing and synchronization, today announced its Mobile Data Management Suite, giving enterprises comprehensive control over corporate data through a variety of new device and file management strategies. This new offering enables sophisticated management of the full range of end user devices in the workplace while allowing IT departments to efficiently and seamlessly maintain complete control over corporate data.

Employees are increasingly integrating their own laptops, smartphones and tablets into work routines to share, edit and review documents both in and out of the office. A recent Gartner report states that by 2017, half of employers will require employees to supply their own device for work purposes.* Additionally, industry analyst firm Ovum Research found that over 57.1% of all full-time employees use a personal device to access corporate data.** This increased use has led to a corresponding increase in worker productivity.

But this Bring Your Own Device (BYOD) trend has also raised serious security concerns with respect to controlling where corporate data resides and who has access to it – the same Ovum report found that almost 80% of BYOD activity is still going unmanaged in the workplace.  And while Mobile Device Management (MDM) solutions have arisen to tackle the adoption of smartphones and tablets, the approach can be heavy-handed, resulting in securing the entire device instead of just its corporate data.

In addition, significant corporate sensitive data resides on employee laptops, which can translate into big headaches – and big costs – when an unencrypted laptop is misplaced or stolen. A Ponemon Institute Study*** reports that 70% of the more than 86,000 laptops lost in 2011 were not encrypted, and that the average cost of each unencrypted lost laptop to an organization was $56,165. Costs associated with a data breach represent 80% of the total cost of a lost laptop, compared to 2% for replacing just the computer. Encryption can reduce the cost of a lost laptop by more than $20,000, on average.

Egnyte Mobile Data Management Suite

The Egnyte Mobile Data Management Suite gives enterprise IT departments the ability to allow employees to use their own laptops and mobile devices in the work environment while enabling them to maintain tight control over corporate data and minimize costs. New management features include:

·         A Device Control Panel that provides an integrated, central view of all end user devices connected to a company’s account.  Administrators can view information about the user, device type, last time of access etc. and can take corrective actions such as disconnecting or wiping a device from the control panel in the event the device is compromised. And users can view their own devices, allowing for self-service when needed.

·         Local File Encryption on smartphones and tablets prevents data from being accessed directly from the mobile file system, by limiting access to authorized users using the Egnyte application.

·         Two-Step Login Verification enforces a second factor for login in addition to username/password verification. The second factor can be sent in the form of a phone call, passcode sent via text message or push notification to a smartphone. This two-step login can be enforced whether the user is logging in from a laptop, smartphone or tablet.

·         Certificate Based Device Trust allows only laptops, phones and tablets with a valid security certificate to access the company’s file sharing service, preventing access from unauthorized devices.

·         Remote Wipe of Files from the device control panel enables the initiation and verification of a remote wipe of all Egnyte file contents in cases where a device is lost or stolen.

“The Advanced Mobile Security Mobile Wipe Feature takes the risk out of BYOD and makes it easy for us to keep track of where our sensitive files are and who is viewing them,” said Orlando Castillo, Bulova Corporation. “Our employees are productive and get to use the devices they prefer while we can control our data instead of the entire device.  Management is happy because we have a way to ensure that we can keep company data secure.”

Egnyte offers our customers the option of using Egnyte in conjunction with their MDM solution or using our new capabilities as a MDM-light solution,” said Vineet Jain, Egnyte CEO. “With the native security and management capabilities, IT departments can reduce costs by getting everything they need in one place. More importantly, they can be confident their files and data are safe.”

Analyst Reports:

*Gartner, Inc., Bring Your Own Device: The Facts and the Future, David A. Willis, April 11, 2013.

**© Ovum, Multi-Market BYOD Strategy Results: The BYOD Management Gap, Richard Absalom, October 31, 2012

***Additional information can be found in the report: “The Billion Dollar Lost Laptop Problem Benchmark study of U.S. organizations.” This report was independently conducted by Ponemon Institute LLC and Sponsored by Intel  Publication Date: 30 September 2010

About Egnyte

Over 1 billion files are shared daily by businesses using Egnyte´s unique technology, which provides the speed and security of local storage with the accessibility of the cloud. Users can easily store, share, access and backup files, while IT has the centralized administration and control to enforce business policies. Founded in 2008, Egnyte is based in Mountain View, California and is a privately held company backed by venture capital firms Google Ventures, Kleiner Perkins Caufield & Byers, Floodgate Fund, and Polaris Venture Partners. For more information, please visit http://www.egnyte.com or call 1-877-7EGNYTE.

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Popular Archives

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford…

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About…

Cloud-Based VOIP – 4 Alternatives To Skype

Cloud-Based VOIP – 4 Alternatives To Skype

Cloud-Based VOIP – 4 Alternatives To Skype Skype is the most popular cloud-based VOIP service. Since being bought out by Microsoft for $8.5 billion in 2011 the company has grown to more than 300 million users and now accounts for 34% of all international calls. Some people don’t want to use Skype though. Reports of…

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears  CIOs are tired of hearing about cloud computing concerns. They’ve spent years reading about how cloud resources are subject to risks, and wonder – what can they do to help people trust the cloud?  The truth is that despite being a hot issue for years, the topic of…

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

Recent

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue The integral integration of cyber security and cloud technology seemed to be the hottest issue at the busy RSA 2015 Conference in San Francisco. Interested parties packed security and cloud service booths for the duration of the conference. Several prominent publications covered the increased importance of securing their private information that’s…

Imperfect Security: The RSA Conference And The Illusion Of Safety

Imperfect Security: The RSA Conference And The Illusion Of Safety

The RSA Conference And The Illusion Of Safety This year’s 2015 RSA Conference is taking place from April 20th to 24th, in San Francisco, California. Here, security leaders from across the vast expanse of tech, politics, and more will gather to discuss the past, present, and future of security. From application security to technology infrastructure,…

The Lighter Side Of The Cloud – Day 5

The Lighter Side Of The Cloud – Day 5

By David Fletcher Are you looking to supercharge your Newsletter, Powerpoint presentation, Social media campaign or Website? Our universally recognized tech related comics can help you. Contact us for information on our commercial licensing rates. About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information.…

Contact Us

Sending

Technology Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising