Cloud Data Storage – File Sync On Steroids For The Enterprise

Cloud Data Storage – File Sync On Steroids For The Enterprise

Cloud storage is getting saturated, fast. How many of you use just a single, or maybe two Cloud storage services? Yes, I know. None. We all have our data flying around the Cloud. While only a few Cloud sync and storage services are positioned to become clear winners in this game, the landscape on the enterprise side is witnessing increased thirst for faster and simpler ways to store, sync and collaborate on enterprise data stored on the Cloud, be it private or public.

Egnyte – an enterprise Cloud data storage, sync and collaboration company – last month released benchmarks which show that they can sync data at top speed, taking about 7 minutes to sync a 500GB file, whereas (according to their findings), their competitors (unnamed) take about 72 hours, on average. That’s a huge difference. At the core of this speed gain is their “delta sync” technology, which makes sure that only the updated portions of the file are sent over the network to sync with the full version of file on the Cloud. This is something similar to what Dropbox does, making file sync incredibly fast. Egnyte has been doing it since 2007, when they started out.

So does speed matter for an enterprise worker who normally has to work on documents or spreadsheets or presentations which are a few MBs at best? Perhaps not if you do not think at a scale – imagine 100 users working on multiple files daily. That would be taxing for the network if you start putting complete files over it even if just a line was changed or a cell value in Excel was updated.

Unless your enterprise has fully adopted consumer Cloud sync and storage solutions like Dropbox or gone Box, there’s a good chance that if you’re using a Cloud only solution for file storage, sync and collaboration, your network would be throttled and you may be paying additional dollars (Egnyte estimated that to be $6,000/month to acquire additional 420Mbps/mo.) to keep up with all the “data traffic” put on the network.

So when you hand over your data to a Cloud data storage provider, who takes care of its security? Security is one of the top concerns when it comes to convincing enterprises to make the shift to Cloud, especially after the recent data breach and massive intrusion incidents which have only helped to increase awareness and educate about security threats which modern enterprises dace. Egnyte has a unique solution; they let you hold the encryption keys yourself which means that you will have complete access to your data. The data is encrypted when it’s put on the line (data in motion) and it is stored in encrypted form, something which Google Cloud only recently started doing. Perhaps data-at-rest encryption is becoming the de-facto standard for Cloud storage.

Egnyte claims to process over a billion files every day. This is a mammoth number and saving even a small amount of network bandwidth and time to sync a file would have a significant impact when you look at the big picture. Cloud storage is all about increased productivity, reduced complexity and cost savings and if you’re not getting all of these from your Cloud storage provider, you are actually missing out.

By Salman UI Haq

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…