Fraunhofer SIT: New Version of OmniCloud
Mobile access to encrypted cloud storage
This is a Press Release edited by StorageNewsletter.com on March 12, 2013 at 2:59 pmOmniCloud enables secure mobile access to critical business data in the cloud – Fraunhofer SIT demonstrates the new version of cloud storage enhancement at CeBIT.
The new version of OmniCloud makes accessing critical business data with smartphones and tablet PCs secure and easy.
Fraunhofer-Institut für Sichere Informationstechnologie presented mobile access to encrypted cloud storage for the first time at the CeBIT trade fair in Hanover.
The new OmniCloud allows employees to access encrypted data in cloud storage easily with mobile devices and to share the data with colleagues within the company – all without exchanging passwords or keys.
The advantage of the OmniCloud solution: a company does not have to install the OmniCloud software on the end devices, only the access to the enterprise’s corporate network is required. For example: A sales representative has a customer meeting, prepares a calculation and asks a colleague to check it. He saves the file via a word processor with his tablet into the OmniCloud storage, where his colleague can access it immediately. OmniCloud provides encryption and rights management- without the employees noticing.
OmniCloud offers client-side encryption and supports a variety of cloud storage services. The software solution protects sensitive data and ensures lower backup costs by avoiding duplication. In addition, it allows data migration between various cloud storage systems, thus avoiding a dependence on specific providers.
Just in November, the developer team won first place at the German IT Security Awards. OmniCloud aims at enabling medium-sized companies to profit from the advantages of cloud storage services – without dependencies or security risks. It supports a number of cloud storage services and can be combined with current backup solutions, even if they do not provide cloud integration.
OmniCloud facilitates typical business situations such as employee absences and changes in responsibilities. Separating identity management from key management makes this possible. Delegation rules can be realized easily – without password disclosure and elaborate data re-encryption.