Cloud-only vs. Cloud-based: What’s The Best File Sharing For Business?

Cloud-only vs. Cloud-based: What’s The Best File Sharing For Business?

The cloud file-sharing market has exploded over recent years with users embracing this latest technology to simplify both their personal and professional lives. While cloud has helped remove a lot of the headaches around storage and file access, it has also presented its own challenges. With an increasing number of people using consumer-grade products in the workplace, many are leaving company systems open to threats and exposing potentially sensitive data to unwanted access. So what can be done to address this? Well, it all starts with a simple definition….

On the face of it, there is little difference between file sharing for consumers and file sharing for businesses; they both provide easy access to data via an internet connection. However, consumer file sharing has been designed for easy, light use – the sharing of family pictures or videos for example. These solutions lack the security, permissioning, and auditability of those designed for the enterprise.

File Sharing for business, on the other hand, has been designed from the ground up with security and stability in mind as compared to being an afterthought to an easy, lightweight solution. Demands by enterprise solutions have always been vastly different than those of the consumer; although, the simplicity is an absolute necessity in either case.

With so many of us using the cloud in our personal lives, it was inevitable that this would spill over to the business world — the consumerization of IT strikes again.  Employees have shunned “sneakernet” using memory sticks, CDs, and DVDs, and have instead started uploading work files to consumer clouds alongside their holiday pictures and favorite music. This presents issues for enterprise IT teams who are desperate to prevent the leak of sensitive materials and security breaches. They need to provide employees with a file-sharing platform that is simple for users but created for business.

Security, access permissions, complete audibility, and device controls will continue to be a core focus for administrators needing to control access levels and manage compliance in real time.  Business file sharing will also need to take advantage of local storage whenever possible.  Local storage provides the fastest access speed possible, does not clog the connection to the Internet, and provides business continuity in case of Internet outages. And the cloud provides accessibility to remote employees, business partners, and clients.

But providing the right solution is just part of the battle. Once the right solution is in place, ensuring high levels of adoption is the next challenge. Demonstrating ease of use to employees along with showing that they can now access any file in the company that they have permission to access (instead of just the ones that they remembered to drop in a folder on their computer) will go a long way to facilitating adoption.

So why run the risk of exposing  your business data to major security issues from consumer file sharing?  It’s time to put your critical data into a purpose-built platform designed to meet all the file sharing needs and requirements of businesses, not consumers.

Rajesh Ram'RR'

By Rajesh Ram

Rajesh is a co-founder of Egnyte. He leads the product management and customer support teams. Rajesh’s strength in defining, delivering and supporting software solutions was developed while at Oracle, KPMG consulting and Valdero Corporation. Rajesh holds a BS in Engineering from the Indian Institute of Technology-Madras and received an MS in Industrial Engineering from the University of Minnesota.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…