Soonr V4.4 of Windows and Mac Workplace Desktop Agents
Adds support for migrating file servers to cloud and expanded device management policies.
This is a Press Release edited by StorageNewsletter.com on July 25, 2014 at 2:55 pmSoonr, Inc. announced the latest version of its Windows and Mac desktop agents for its file sharing and collaboration solution, Soonr Workplace.
The version 4.4 desktop agents add local file server support for hybrid cloud sync and share deployments, and device approvals for secured access to files and documents.
The desktop agents allow external folders on local servers or network drives to be synced with the service, enabling users to integrate their cloud storage with their legacy on-premise server environment. Project folders can be located anywhere on a local drive, external drive, Windows file server, or NAS device.
“Our clients have a need to reduce local file server loads by leveraging cloud-based storage, but on a selective basis,” said Francis Yiu, CEO, Novani LLC. “The ability to synchronize nd collaborate on documents on both local servers and in the cloud is key to providing anywhere anytime access to files and documents in a hybrid environment.“
Gartner research predicts that half of mainstream enterprises will have a hybrid cloud by 2017. In addition, IDC research indicates that hybrid cloud management will be a $3.6 billion business by 2016. These statistics demonstrate the increasing demand to simplify hybrid cloud implementations with solutions that both improve productivity and security.
“Increasingly, companies are looking to cloud services as a way to reduce server capacity and costs, and to provide end-users with mobile access to business documents,” said Sam Liu, VP marketing, Soonr. “However, it is important to select vendors that can meet corporate security policies to help ensure the data is not compromised.“
The service is built for the enterprise in mind. In addition to being HIPAA compliant and SSAE-16 audited, it offers cloud security features such as two-factor authentication (2FA), encryption on device, in-transit and in-session, download/copy prevention, and jurisdictional datacenters. For added security, the agents include device approval capabilities that let administrators set policies to control which users and groups require device approvals, and also which may be exempt.