Cloud computing has been hailed as the beginning of the fourth information revolution, with its full use of the Internet's penetration and seamless integration with mobile interconnecting devices, providing users with almost omnipotent super services. However, the data stored in the cloud on the one hand create unlimited value, on the other hand, is becoming a super hacker, network illegal organization, APT attack "target". Over the past few years, the major public cloud manufacturers frequent leaks of the incident so that users are quite worried, the emergence of trust crisis so many enterprises have turned, choose to build private cloud storage platform.
To build a private cloud that is both perfect and practical, businesses must meet the needs of users for data access and sharing, and cross the "high threshold" of technology and management. Considering the diversified demand of cloud service construction mode, as a global server security, virtualization and cloud computing security leading manufacturer, trend technology to help enterprise users build convenient and efficient cloud storage application platform, has introduced a more security, can play BYOD advantage SafeSync Enterprise Security Cloud Disk ( SafeSync for Enterprise, hereinafter referred to as: SafeSync), is designed to help enterprise users in the mobile internet era, the pace of innovative applications.
Cloud storage and leaked door "equals", users have turned to build their own
The security of cloud services has been the focus of the recent invasion of icloud and the leaking of a large number of Hollywood movie stars ' private photos. "Apple Yan Yan Door" in the field of personal applications encountered unprecedented loss of trust, but also disrupt the many corporate users to the cloud of confidence migration. Of course, this is not the first time cloud computing has issued a warning on data security issues:
December 2010, Microsoft Business Office Online Suite (BPOS) occurred a data leakage accident, resulting in many enterprises to the staff of mandatory provisions, including multiple password authentication and document encryption, etc.
May 2011, Sony PlayStation Receptacle user data leak incident, and cloud computing and virtualization-related corporate stock market value, the entire cloud industry began to rethink the industry outlook;
June 2013, hackers successfully invaded Korea's well-known online storage service Simdisk, replaced the client software SimDisk.exe, and the use of Automatic update mechanism deployed to all users, resulting in these users into a "broiler";
In the August 2013, several Japanese companies ' internal documents were leaked to the Chinese search engine Baidu's file-sharing service, even including a picture of a car that has not yet been listed and a sales material for specific parameters;
October 2013, Adobe was apt to attack, dozens of G source code and 2.9 million user information stolen;
In the February 2014, ebay was attacked by mysterious hackers, and huge numbers of users ' email addresses, passwords, birthdays and other information were stolen.
It is clear that although the providers of each public cloud claim that their services are safe in every respect, especially with regard to data management, there has been no reduction in data disclosure incidents. For large enterprises or specific industries, business-related data is its lifeline, can not be threatened in any form, and because of this, more users began to consider building a cloud data management platform.
Mobile interconnection and cloud fusion provide "best" challenge to data
The survey data show that 90% of large enterprises and government users will be expected to deploy cloud computing products and solutions by 2015, which will face a new challenge of security, management and ROI. It is noteworthy that if enterprises want to rely on their ability to become the cloud era, the first to face the data of the four challenges, the combination of English abbreviations is "best":
▲
"Best" reflects the user's basic need for data usage in the cloud era.
Challenge one: Big file cloud sharing
Network file sharing has been one of the hard needs of people, one of the evidence is that the file sharing site has a huge amount of traffic. Google offers a list of the world's top ten file-sharing websites, eight of which are file-storage sites. Unlike the public cloud storage, within the enterprise, the value of large file sharing can be directly displayed, which is embodied in the new media collection and storage, design file transmission, partner interaction, for external customers to show, training suppliers and so on.
Challenge two: Mail large attachments (email)
Even though instant messaging and online social software are prevalent, email is the oldest, most formal, and most used communication tool. In the traditional mail system, hundreds of trillion of photo compression packages, design drawings, high-definition video clips are generally not emailed. Therefore, many public mailbox service providers provide the "File Transfer Station" function, but the enterprise is difficult to use or develop such a program module, and the choice of "file Transit" will be time and confidentiality of the reality.
Challenge Three: Data security
Because of the high concentration of data on the cloud platform, the risk of large-scale data loss and privacy disclosure is faced once an attack is encountered. In the entire process of uploading data to the cloud or storing it in a PC or smartphone, any omission can be exploited by hackers, and personal users ' mobile phones are likely to be the gateway to the cloud, adding to the difficulty of security protection.
Challenge four: Cross-platform Transfer (Tansfer)
With the wide popularization of smartphones and the rapid development of BYOD, the purpose of establishing cloud storage platform is not only to store computer, mobile phone, web, etc., but also to provide convenient conditions for users ' multi terminal operation, such as iOS, Android, Synchronizing data in a Windows multiple operating system environment.
However, the traditional file access can not meet the needs of users, file-sharing server or FTP services can not support large file cloud sharing, real-time synchronization across the system, teamwork, encryption and decryption, anti-virus, data and leak-proof. To this end, once the enterprise set up its own cloud storage services, it is necessary to find a group can completely solve the above problems of the new scheme.
SafeSync the characteristics of "iron triangle" to dissolve "power dispute" in BYOD
The public cloud at lower cost opens up a shortcut for enterprise IT informatization development, but the data storage service exposes many worrying problems. To this end, the trend of science and technology to play its own network security in the field of strong advantages, and with the actual needs of users and mobile Internet development trends, the introduction of SafeSync Enterprise Security cloud disk, in data security, teamwork, Cross-platform synchronization and cloud sharing, will help users easily build a secure and efficient enterprise private cloud storage System.
In the product characteristics, SafeSync use the "Iron triangle" function to create a controllable tube of the new data space, three frame construction includes: Data security, teamwork, Cross-platform synchronization and cloud sharing. For example: Each access to SafeSync cloud account has an independent storage space, support team file permissions and online editing functions, the client and the cloud data transmission between the use of AES 256-bit encryption communication protection, and has anti-virus filtering and leak-proof function, fully protect the security of user data.
▲
SafeSync "Iron triangle" of data security, team collaboration, Cross-platform synchronization and cloud sharing
SafeSync fully supports secure management and data synchronization for smart terminals, including iOS, Mac, Android, windows and all other mainstream operating systems, and provides automatic file backup and anytime and anywhere synchronization for an enterprise network environment that is ready or already deployed BYOD. Oversized Outlook mail attachments will no longer be restricted, automatically converted to cloud links, or shared in real time using streaming online playback technology, which makes it possible for large files to be used flexibly in the cloud.
Unlike the intelligent Terminal deployment MDM and MAM products, SafeSync can avoid the occurrence of employee benefit events from the perspective of the device owner. Without affecting the use of personal habits, SafeSync can work with the existing active Directory/ldap directory services, to achieve a unified authentication access management, on the same mobile phone can not only remote enterprise data access, but also to achieve staff in the office to maintain personal privacy and private data.
SafeSync not only keeps all data synchronized between all devices in the enterprise, but also within the entire private cloud, while protecting against data loss due to loss, theft, or equipment failure. In addition, in terms of compatibility and extensibility, SafeSync can be deployed on physical or VMware virtual servers, while also supporting mainstream storage devices such as Sans and NAS, which can be changed on demand for rapidly growing volumes of data.
Cloud storage changes data ecological environment, SafeSync helps multiple industry users business innovation
Trend Technology SafeSync Enterprise Security cloud Disk since the advent of the user experience and network threats to protect the ability to upgrade, has been in the world for many areas of customers to provide the best private cloud storage services, but also in the domestic industry to form a number of references and reference to the success of the case. These include: entry-exit inspectors use 3G or 4G networks to take out forensics, educate users to use mobile devices and cloud storage to achieve classroom innovation, large design document sharing in the manufacturing industry, remote data synchronization in the financial and retail industries, and new media mobility platforms in the broadcasting industry, among others.
Entry-Exit Inspection and Quarantine Bureau of a city: SafeSync improve work efficiency comprehensively
Before the deployment of SafeSync, a city entry and exit inspection and Quarantine Bureau staff to go out every day to check, once found that there is no compliance requirements, business personnel will use the camera to leave evidence, the evening back to the unit to take photos of the day uploaded to the server, the efficiency is very low.
After the deployment of SafeSync, the business staff use SafeSync Mobile client directly after taking photos or video capture, then through the 3G or 4G network real-time synchronization to the background storage, not only improve the efficiency of inspection and quarantine work, but also do not worry about equipment damage or loss of data leakage caused by the problem.
Zhejiang Radio and TV group: "Safety first" can give full play to new media advantages
The rise of new media means that the radio and television industry will produce more multimedia data, more types of business systems, more cross-platform application of data sharing, and as the important assets of radio and television, data security is critical. In many enterprises also for "public, private" cloud storage hesitate, to "safety first" for the Zhejiang Radio and television Group is determined to choose the latter.
Based on the frequent occurrence of public cloud leaks, Zhejiang Radio and TV Group decided to establish its own mobile application platform. After comprehensive evaluation, Zhejiang Radio and television finally decided to adopt trend technology SafeSync Enterprise Security cloud disk, as the storage pillar of the whole platform. SafeSync not only helps users to support large file cloud sharing, real-time synchronization across systems, team collaboration, but also to meet user needs in Access control, data encryption and leak prevention.
With the rise of new information technology changes such as large data, cloud technology, and Internet of things, the business innovation between enterprises or competition with rivals will depend on "data", and the enterprises with insight into this trend are creating ecological environment which can play greater value. Next, trend technology hopes to leverage the new leading cloud security technology and SafeSync cloud storage solutions to work with more users to create an efficient, 0-risk data exchange world