Cloud-only vs. Cloud-based: What’s The Best File Sharing For Business?

The cloud file-sharing market has exploded over recent years with users embracing this latest technology to simplify both their personal and professional lives. While cloud has helped remove a lot of the headaches around storage and file access, it has also presented its own challenges. With an increasing number of people using consumer-grade products in the workplace, many are leaving company systems open to threats and exposing potentially sensitive data to unwanted access. So what can be done to address this? Well, it all starts with a simple definition….

On the face of it, there is little difference between file sharing for consumers and file sharing for businesses; they both provide easy access to data via an internet connection. However, consumer file sharing has been designed for easy, light use – the sharing of family pictures or videos for example. These solutions lack the security, permissioning, and auditability of those designed for the enterprise.

File Sharing for business, on the other hand, has been designed from the ground up with security and stability in mind as compared to being an afterthought to an easy, lightweight solution. Demands by enterprise solutions have always been vastly different than those of the consumer; although, the simplicity is an absolute necessity in either case.

With so many of us using the cloud in our personal lives, it was inevitable that this would spill over to the business world — the consumerization of IT strikes again.  Employees have shunned “sneakernet” using memory sticks, CDs, and DVDs, and have instead started uploading work files to consumer clouds alongside their holiday pictures and favorite music. This presents issues for enterprise IT teams who are desperate to prevent the leak of sensitive materials and security breaches. They need to provide employees with a file-sharing platform that is simple for users but created for business.

Security, access permissions, complete audibility, and device controls will continue to be a core focus for administrators needing to control access levels and manage compliance in real time.  Business file sharing will also need to take advantage of local storage whenever possible.  Local storage provides the fastest access speed possible, does not clog the connection to the Internet, and provides business continuity in case of Internet outages. And the cloud provides accessibility to remote employees, business partners, and clients.

But providing the right solution is just part of the battle. Once the right solution is in place, ensuring high levels of adoption is the next challenge. Demonstrating ease of use to employees along with showing that they can now access any file in the company that they have permission to access (instead of just the ones that they remembered to drop in a folder on their computer) will go a long way to facilitating adoption.

So why run the risk of exposing  your business data to major security issues from consumer file sharing?  It’s time to put your critical data into a purpose-built platform designed to meet all the file sharing needs and requirements of businesses, not consumers.

Rajesh Ram 'RR'

By Rajesh Ram

Rajesh is a co-founder of Egnyte. He leads the product management and customer support teams. Rajesh’s strength in defining, delivering and supporting software solutions was developed while at Oracle, KPMG consulting and Valdero Corporation. Rajesh holds a BS in Engineering from the Indian Institute of Technology-Madras and received an MS in Industrial Engineering from the University of Minnesota.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

Health Cloud Capabilities ORLANDO, FL. - 20 Feb 2017: At the 2017 Health Information Management Systems Society (HIMSS) conference in Orlando, IBM (NYSE: IBM) today introduced expanded capabilities for the Watson Platform for Health Cloud and a specialized Watson Health Consulting Services unit dedicated to helping clients and partners across the healthcare ecosystem capture the business opportunity of cognitive computing ...
Read More
Philips spotlights connected technology, predictive analytics software, and artificial intelligence advancing population health and precision medicine at HIMSS 2017 AMSTERDAM, Feb. 17, 2017 /PRNewswire/ -- Featuring new and enhanced connected health offerings at the 2017 HIMSS Conference & Exhibition (HIMSS17), Royal Philips (NYSE: PHG,AEX: PHIA), a global leader in health technology, will showcase a broad range of population health management, ...
Read More
Cupertino, California — Apple today announced its 28th annual Worldwide Developers Conference (WWDC) — hosting the world’s most talented developer community — will be held at the McEnery Convention Center in San Jose. The conference, kicking off June 5, will inspire developers from all walks of life to turn their passions into the next great innovations and apps that customers ...
Read More
When Cisco Systems Inc. reports earnings Wednesday, the big question will be if the networking giant’s repeated gambles on software can reverse a yearlong sales slide, or at least point to a reversal of that trend in the future. Cisco CSCO, +1.06%  is scheduled to report fiscal second-quarter earnings less than a month after announcing its latest multibillion-dollar software acquisition, ...
Read More
Offering Integrated and Automated Solutions, Expansive Partner Ecosystem, Advanced Architecture with Cross-Industry Collaboration SAN FRANCISCO, Feb. 14, 2017 – Today Intel Security outlined a new, unifying approach for the cybersecurity industry that strives to eliminate fragmentation through updated integrated solutions, new cross-industry partnerships and product integrations within the Intel Security Innovation Alliance and Cyber Threat Alliance (CTA). “Transforming isolated technologies ...
Read More