Powerful encryption capabilities and a built-in rule-based File Access Control. Complemented by strong password policies, brute-force protection, ransomware protection and more.
Access data from FTP, Windows Network Drive, SharePoint, NFS, Object storage. Simple configuration and integration lower costs and decrease risk while leveraging existing IT investments.
With Workspaces you can bring context to your folders, adding notes and even to do lists and links to files on top. This is great to coordinate with your team, making sure everyone knows what a particular folder is for, or to track important tasks in a prominent location.
Send files and folders with just a few clicks to one or multiple customers. Create personal links for them to upload data to you. Files are securely transferred and stored on your own infrastructure, without any third party ever gaining access. The IT department enforces rules and limitations on password & expiration dates, access by IP, file type or size and more.
With iDesk, system administrators can control and direct the flow of data between users on or between servers. Rule-based file tagging and responding to these tags as well as other triggers like physical location, user group, file properties and request type enables administrators to specifically deny access to, convert, delete or retain data following business or legal requirements.
Boot VMware and Hyper-V VMs directly from deduplicated backups; migrate booted VMs to production if necessary.
Instantly boot VMware VMs from physical machine backups.
Browse, search, and instantly restore files and folders back to source.