Welcome!

News Feed Item

Introducing Acronis Access: The First Solution to Comprehensively Address Enterprise-Level Needs for Mobile File Access, Synching and Sharing

New Product Allows Employees to Conveniently Work and Collaborate From Anywhere and on Any Device, While Providing IT the Level of Security and Control They Need

ARLINGTON, VA -- (Marketwired) -- 03/04/14 -- Today Acronis®, a global data protection company, announced Acronis Access, the first solution to turn any mobile device into a true business platform by integrating both mobile content management (MCM) and controlled file sync and sharing. Acronis Access is designed with a special focus on enterprise IT departments, especially those in highly regulated industries. It allows IT to maintain security and control, and comply with regulations, while enabling employees to easily and efficiently access and share corporate content with internal and external constituents.

"Acronis Access has revolutionized mobility with our clients," said J David Hester, PhD, Solutions architect at LCG Systems. "The federal IT departments we work with had no sanctioned way in which to collaborate with external researchers. Using Acronis activEcho® provided us with all the necessary tools to manage, monitor and secure our data and meet NIST compliance standards, and before Acronis mobilEcho®, we had no simple way for our end users to access internal network resources on their iPads® and iPhones®. Acronis Access unites both functionalities and gives IT departments everything they need: support for two-factor authentication, access to their network home directories, shared folders and collaboration. In addition, with Acronis Access, they can now map to network shares without the cumbersome need of requesting centralized or local support."

Acronis Access is powered by Acronis AnyData Technology and is on-premise, so enterprise IT knows exactly where their company's data is. It also allows IT to give their employees the functionality they want, so they can remain productive in a controlled and secure environment. End-users can access content from file servers, NAS and SharePoint®, as well as their own desktops/laptops, and share files with people inside and outside their organization.

"Many employees today use personal smartphones and tablets to access sensitive corporate information, even if their organization doesn't permit a bring-your-own-device (BYOD) policy," said Terri McClure, Senior Analyst at Enterprise Strategy Group. "With this growing trend, mobile device management (MDM) doesn't go far enough. It isn't about controlling the employee's devices; it is about managing and securing corporate content. That is why companies need solutions like Acronis Access for Mobile Content Management. It gives IT more granular control of sensitive corporate information to ensure compliance, control and security for IT managers."

Acronis Access delivers a number of key features, including:

  • On-premise deployment to provide IT with complete control
  • Active Directory integration, which makes authentication, provisioning and user management seamless
  • Military-grade, FIPS 140-2 certified encryption module and CAC/PIV authentication
  • The Acronis Policy Engine, which provides granular management capabilities to create security policies and ensures control and compliance, with more than 50 security and user permission policies available
  • Allows IT departments to easily manage and scale their environments
  • In-app editing and creation capability, to allow employees to edit Office documents and annotate PDFs within the secure Access sandbox, eliminating data leakage and improving productivity
  • An easy and intuitive UI to make it simple and natural for users, with virtually no training
  • An audit log that gives IT the visibility to see what users are doing, including which documents they access and share with others.

"The age of one size fits all is over. People have more choices than ever, so it's crucial that IT departments give employees products they'll actually want to use and the flexibility to use the device of their choice," said Anders Lofgren, VP of product management at Acronis. "Acronis Access provides a user-friendly UI and seamless integration with Active Directory®, so both users and IT are happy. Plus the audit log gives IT the oversight necessary to ensure security and compliance."

Companies interested in learning more about Acronis Access can visit www.acronis.com/mobility.

About Acronis
Acronis delivers reliable, easy to use backup and disaster recovery solutions for physical, virtual and cloud environments to individuals and businesses in 90 countries worldwide. Acronis' innovative technology enables organizations to reduce risk against the loss of valuable data, control management and storage costs while responding to the always available, everywhere access demands of users. With proven technology for data migration and disaster recovery for hybrid environments, and secure file-sharing and synchronization for the home and business, Acronis is enabling new levels of data protection and mobile collaboration.

For additional information, please visit www.acronis.com. Follow Acronis on Twitter: http://twitter.com/acronis.

Acronis®, Acronis activEcho®, and Acronis mobilEcho® are registered trademarks of Acronis International GmbH in the United States and other countries. BlackBerry® and related trademarks, names and logos are the property of Research In Motion Limited and are registered and/or used in the U.S. and countries around the world. The Enterprise Strategy Group is a registered trademark of The Enterprise Strategy Group, Inc. SharePoint® and Active Directory® are registered trademarks of Microsoft Corporation in the United States and/or other countries. iPhone® and iPad® are trademarks of Apple Inc., registered in the U.S. and other countries. Other company and product names may be trademarks of their respective owners.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and ...
Application transformation and DevOps practices are two sides of the same coin. Enterprises that want to capture value faster, need to deliver value faster – time value of money principle. To do that enterprises need to build cloud-native apps as microservices by empowering teams to build, ship, and run in production. In his session at @DevOpsSummit at 19th Cloud Expo, Neil Gehani, senior product manager at HPE, discussed what every business should plan for how to structure their teams to delive...
"Venafi has a platform that allows you to manage, centralize and automate the complete life cycle of keys and certificates within the organization," explained Gina Osmond, Sr. Field Marketing Manager at Venafi, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We are a modern development application platform and we have a suite of products that allow you to application release automation, we do version control, and we do application life cycle management," explained Flint Brenton, CEO of CollabNet, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web ...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Phil Hombledal, Solution Architect at CollabNet, discussed how customers are able to achieve a level of transparency that e...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...