Egnyte Delivers Mobile Data Management Suite For Comprehensive Device Security In The Enterprise

Egnyte Delivers Mobile Data Management Suite For Comprehensive Device Security In The Enterprise

Delivers Mobile Data Management Suite for Comprehensive Device Security in the Enterprise

First File Sync and Share Vendor to Offer Native Remote Wipe, Encryption, Trusted Device and Two-Factor Authentication Features

egnyte-logoLONDON, UK – May 22, 2013Egnyte, the leader in enterprise file sharing and synchronization, today announced its Mobile Data Management Suite, giving enterprises comprehensive control over corporate data through a variety of new device and file management strategies. This new offering enables sophisticated management of the full range of end user devices in the workplace while allowing IT departments to efficiently and seamlessly maintain complete control over corporate data.

Employees are increasingly integrating their own laptops, smartphones and tablets into work routines to share, edit and review documents both in and out of the office. A recent Gartner report states that by 2017, half of employers will require employees to supply their own device for work purposes.* Additionally, industry analyst firm Ovum Research found that over 57.1% of all full-time employees use a personal device to access corporate data.** This increased use has led to a corresponding increase in worker productivity.

But this Bring Your Own Device (BYOD) trend has also raised serious security concerns with respect to controlling where corporate data resides and who has access to it – the same Ovum report found that almost 80% of BYOD activity is still going unmanaged in the workplace.  And while Mobile Device Management (MDM) solutions have arisen to tackle the adoption of smartphones and tablets, the approach can be heavy-handed, resulting in securing the entire device instead of just its corporate data.

In addition, significant corporate sensitive data resides on employee laptops, which can translate into big headaches – and big costs – when an unencrypted laptop is misplaced or stolen. A Ponemon Institute Study*** reports that 70% of the more than 86,000 laptops lost in 2011 were not encrypted, and that the average cost of each unencrypted lost laptop to an organization was $56,165. Costs associated with a data breach represent 80% of the total cost of a lost laptop, compared to 2% for replacing just the computer. Encryption can reduce the cost of a lost laptop by more than $20,000, on average.

Egnyte Mobile Data Management Suite

The Egnyte Mobile Data Management Suite gives enterprise IT departments the ability to allow employees to use their own laptops and mobile devices in the work environment while enabling them to maintain tight control over corporate data and minimize costs. New management features include:

·         A Device Control Panel that provides an integrated, central view of all end user devices connected to a company’s account.  Administrators can view information about the user, device type, last time of access etc. and can take corrective actions such as disconnecting or wiping a device from the control panel in the event the device is compromised. And users can view their own devices, allowing for self-service when needed.

·         Local File Encryption on smartphones and tablets prevents data from being accessed directly from the mobile file system, by limiting access to authorized users using the Egnyte application.

·         Two-Step Login Verification enforces a second factor for login in addition to username/password verification. The second factor can be sent in the form of a phone call, passcode sent via text message or push notification to a smartphone. This two-step login can be enforced whether the user is logging in from a laptop, smartphone or tablet.

·         Certificate Based Device Trust allows only laptops, phones and tablets with a valid security certificate to access the company’s file sharing service, preventing access from unauthorized devices.

·         Remote Wipe of Files from the device control panel enables the initiation and verification of a remote wipe of all Egnyte file contents in cases where a device is lost or stolen.

“The Advanced Mobile Security Mobile Wipe Feature takes the risk out of BYOD and makes it easy for us to keep track of where our sensitive files are and who is viewing them,” said Orlando Castillo, Bulova Corporation. “Our employees are productive and get to use the devices they prefer while we can control our data instead of the entire device.  Management is happy because we have a way to ensure that we can keep company data secure.”

Egnyte offers our customers the option of using Egnyte in conjunction with their MDM solution or using our new capabilities as a MDM-light solution,” said Vineet Jain, Egnyte CEO. “With the native security and management capabilities, IT departments can reduce costs by getting everything they need in one place. More importantly, they can be confident their files and data are safe.”

Analyst Reports:

*Gartner, Inc., Bring Your Own Device: The Facts and the Future, David A. Willis, April 11, 2013.

**© Ovum, Multi-Market BYOD Strategy Results: The BYOD Management Gap, Richard Absalom, October 31, 2012

***Additional information can be found in the report: “The Billion Dollar Lost Laptop Problem Benchmark study of U.S. organizations.” This report was independently conducted by Ponemon Institute LLC and Sponsored by Intel  Publication Date: 30 September 2010

About Egnyte

Over 1 billion files are shared daily by businesses using Egnyte´s unique technology, which provides the speed and security of local storage with the accessibility of the cloud. Users can easily store, share, access and backup files, while IT has the centralized administration and control to enforce business policies. Founded in 2008, Egnyte is based in Mountain View, California and is a privately held company backed by venture capital firms Google Ventures, Kleiner Perkins Caufield & Byers, Floodgate Fund, and Polaris Venture Partners. For more information, please visit http://www.egnyte.com or call 1-877-7EGNYTE.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Collision of Cloud and Data Privacy

The Collision of Cloud and Data Privacy

Cloud and Data Privacy The “cloudification” of everything from data storage to applications to security services has increased the availability of free-flowing data, allowing business to access anything from anywhere. However, it’s raised serious concerns about the security of personally identifiable information (PII) collected and shared by businesses and government agencies across international borders, and…

Here Are Four Ways To Elevate IT

Here Are Four Ways To Elevate IT

Here Are Four Ways To Elevate IT Prior to joining the consulting side of the industry, I worked in corporate IT for the first 7-8 years of my career. While my time in corporate IT has long come to a close, I can still vividly recall the pain points and dreaded battles I endured. A…

All Enterprises Should Model Themselves After Today’s Startups

All Enterprises Should Model Themselves After Today’s Startups

Startups Leveraging Cloud Services Never in history has it been easier to start a business and fast track growth to dominate a market. Conversely, it has never been possible to transform from market leader to market memory faster than now. New startups are disrupting the market, fast tracking growth and sucker punching the market leaders.…

Cloud Pricing: What In The End Am I Actually Paying For?

Cloud Pricing: What In The End Am I Actually Paying For?

Cloud Pricing: What In The End Am I Actually Paying For? I’ve been blogging about this concept now for a while. What is the cost of a cloud solution and what in the end am I actually paying for? I know I am not the only person considering this as I’ve seen any number of articles…

SaaS Freemium Models and the Hidden Cost of Free

SaaS Freemium Models and the Hidden Cost of Free

SaaS Freemium Models We’ve all been lured into sexy “try before you buy” freemium models that provide just the right amount of functionality to get you started. Yet, it’s not quite enough to complete the job. “Getting the job done” often requires stepping up to a paid or premium version that provides more functionality, capabilities…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor