Blog Archives

Object Storage or Cloud for Enterprise File Sync and Share

Enterprise File Sync and Share (EFSS) is a “must deliver” for IT since most users perceive the capability to be a “must have”. In our last blog we discussed what to look for in an EFSS and explained the advantages

Tagged with: , , , , , , , , , , ,
Posted in Blog

Object Storage or NAS for File Sync and Share

The primary motivation behind using file sync and share used to be the “sync” component. Now, however, it is sharing. In an era where devices are almost always connected to the internet, syncing is less of a priority, although ubiquitous

Tagged with: , , , , , , , , , , ,
Posted in Blog

SlideShare: How to Design a Compliant and GDPR Ready Collaboration System

Users need to collaborate on projects, which means sharing file data with other internal users as well as external business partners. More often than not, to accomplish this file sharing, they leverage cloud-based file-sync and share solutions. The problem is

Tagged with: , , , , , , , ,
Posted in Slideshare

Refining Your GDPR Strategy – Addressing User Data

The European Union’s General Data Protection Regulation (GDPR) deadline for implementation has come and gone. Many organizations have achieved a basic level of compliance, so now is the time to dig deeper, tie up loose ends and try to simplify

Tagged with: , , , , , , , , , , ,
Posted in Blog

Webinar: How to Design a Compliant and GDPR Ready Collaboration System

Users need to collaborate on projects, which means sharing file data with other internal users as well as external business partners. More often than not, to accomplish this file sharing, they leverage cloud-based file-sync and share solutions. The problem is

Tagged with: , , , , , , , ,
Posted in Webinar

Where Is The Copy of Record in a File Sync & Share Service? – CTERA Product Spotlight

When assessing Enterprise File Sync and Share services (EFSS), it’s essential to understand the concept of the copy of record. What is the “copy of record?” The term is borrowed from the legal world, and it refers to the original

Tagged with: , , , , , , ,
Posted in Product Spotlight

Why is Encryption Key Ownership So Important?

When it comes to encryption, IT is constantly being told to “own the keys.” But why? Isn’t it OK if your provider owns the keys? Encryption keys are how you unlock encrypted data. Whoever or whatever owns the keys has

Tagged with: , , , , ,
Posted in Blog

Enterprise File Sync and Share Panel Discussion

The mobile ”work from anywhere” workforce creates new challenges for IT. Users not only need to sync and share data, they need to have data protected and need efficient storage in remote offices. IT can no longer let users establish

Tagged with: , , , , , ,
Posted in Blog

What is Enterprise File Sync and Share?

Enterprise file sync and share brings file synchronization and file sharing under IT control. Its competitor is public offerings that are outside of the oversight of the organization and puts corporate data at risk. For an enterprise file sync and

Tagged with: , , , , , , , ,
Posted in Blog

SlideShare: How To Achieve Total File Security in the Cloud

Today’s IT professional is stuck in the middle of a file sharing tug of war. One side has the end users who want the improved productivity that mobility and collaboration promises. The other side consists of corporate governance that wants

Tagged with: , , , , ,
Posted in Slideshare