News Feed Item

Introducing Acronis Access: The First Solution to Comprehensively Address Enterprise-Level Needs for Mobile File Access, Synching and Sharing

New Product Allows Employees to Conveniently Work and Collaborate From Anywhere and on Any Device, While Providing IT the Level of Security and Control They Need

ARLINGTON, VA -- (Marketwired) -- 03/04/14 -- Today Acronis®, a global data protection company, announced Acronis Access, the first solution to turn any mobile device into a true business platform by integrating both mobile content management (MCM) and controlled file sync and sharing. Acronis Access is designed with a special focus on enterprise IT departments, especially those in highly regulated industries. It allows IT to maintain security and control, and comply with regulations, while enabling employees to easily and efficiently access and share corporate content with internal and external constituents.

"Acronis Access has revolutionized mobility with our clients," said J David Hester, PhD, Solutions architect at LCG Systems. "The federal IT departments we work with had no sanctioned way in which to collaborate with external researchers. Using Acronis activEcho® provided us with all the necessary tools to manage, monitor and secure our data and meet NIST compliance standards, and before Acronis mobilEcho®, we had no simple way for our end users to access internal network resources on their iPads® and iPhones®. Acronis Access unites both functionalities and gives IT departments everything they need: support for two-factor authentication, access to their network home directories, shared folders and collaboration. In addition, with Acronis Access, they can now map to network shares without the cumbersome need of requesting centralized or local support."

Acronis Access is powered by Acronis AnyData Technology and is on-premise, so enterprise IT knows exactly where their company's data is. It also allows IT to give their employees the functionality they want, so they can remain productive in a controlled and secure environment. End-users can access content from file servers, NAS and SharePoint®, as well as their own desktops/laptops, and share files with people inside and outside their organization.

"Many employees today use personal smartphones and tablets to access sensitive corporate information, even if their organization doesn't permit a bring-your-own-device (BYOD) policy," said Terri McClure, Senior Analyst at Enterprise Strategy Group. "With this growing trend, mobile device management (MDM) doesn't go far enough. It isn't about controlling the employee's devices; it is about managing and securing corporate content. That is why companies need solutions like Acronis Access for Mobile Content Management. It gives IT more granular control of sensitive corporate information to ensure compliance, control and security for IT managers."

Acronis Access delivers a number of key features, including:

  • On-premise deployment to provide IT with complete control
  • Active Directory integration, which makes authentication, provisioning and user management seamless
  • Military-grade, FIPS 140-2 certified encryption module and CAC/PIV authentication
  • The Acronis Policy Engine, which provides granular management capabilities to create security policies and ensures control and compliance, with more than 50 security and user permission policies available
  • Allows IT departments to easily manage and scale their environments
  • In-app editing and creation capability, to allow employees to edit Office documents and annotate PDFs within the secure Access sandbox, eliminating data leakage and improving productivity
  • An easy and intuitive UI to make it simple and natural for users, with virtually no training
  • An audit log that gives IT the visibility to see what users are doing, including which documents they access and share with others.

"The age of one size fits all is over. People have more choices than ever, so it's crucial that IT departments give employees products they'll actually want to use and the flexibility to use the device of their choice," said Anders Lofgren, VP of product management at Acronis. "Acronis Access provides a user-friendly UI and seamless integration with Active Directory®, so both users and IT are happy. Plus the audit log gives IT the oversight necessary to ensure security and compliance."

Companies interested in learning more about Acronis Access can visit www.acronis.com/mobility.

About Acronis
Acronis delivers reliable, easy to use backup and disaster recovery solutions for physical, virtual and cloud environments to individuals and businesses in 90 countries worldwide. Acronis' innovative technology enables organizations to reduce risk against the loss of valuable data, control management and storage costs while responding to the always available, everywhere access demands of users. With proven technology for data migration and disaster recovery for hybrid environments, and secure file-sharing and synchronization for the home and business, Acronis is enabling new levels of data protection and mobile collaboration.

For additional information, please visit www.acronis.com. Follow Acronis on Twitter: http://twitter.com/acronis.

Acronis®, Acronis activEcho®, and Acronis mobilEcho® are registered trademarks of Acronis International GmbH in the United States and other countries. BlackBerry® and related trademarks, names and logos are the property of Research In Motion Limited and are registered and/or used in the U.S. and countries around the world. The Enterprise Strategy Group is a registered trademark of The Enterprise Strategy Group, Inc. SharePoint® and Active Directory® are registered trademarks of Microsoft Corporation in the United States and/or other countries. iPhone® and iPad® are trademarks of Apple Inc., registered in the U.S. and other countries. Other company and product names may be trademarks of their respective owners.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue an...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and microservices. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your conta...
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his session at @DevOpsSummit 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will show how customers are able to achieve a level of transparency that enables everyon...
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
DevOps theory promotes a culture of continuous improvement built on collaboration, empowerment, systems thinking, and feedback loops. But how do you collaborate effectively across the traditional silos? How can you make decisions without system-wide visibility? How can you see the whole system when it is spread across teams and locations? How do you close feedback loops across teams and activities delivering complex multi-tier, cloud, container, serverless, and/or API-based services?
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
So you think you are a DevOps warrior, huh? Put your money (not really, it’s free) where your metrics are and prove it by taking The Ultimate DevOps Geek Quiz Challenge, sponsored by DevOps Summit. Battle through the set of tough questions created by industry thought leaders to earn your bragging rights and win some cool prizes.
Today every business relies on software to drive the innovation necessary for a competitive edge in the Application Economy. This is why collaboration between development and operations, or DevOps, has become IT’s number one priority. Whether you are in Dev or Ops, understanding how to implement a DevOps strategy can deliver faster development cycles, improved software quality, reduced deployment times and overall better experiences for your customers.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...