Click here to close now.


News Feed Item

Introducing Acronis Access: The First Solution to Comprehensively Address Enterprise-Level Needs for Mobile File Access, Synching and Sharing

New Product Allows Employees to Conveniently Work and Collaborate From Anywhere and on Any Device, While Providing IT the Level of Security and Control They Need

ARLINGTON, VA -- (Marketwired) -- 03/04/14 -- Today Acronis®, a global data protection company, announced Acronis Access, the first solution to turn any mobile device into a true business platform by integrating both mobile content management (MCM) and controlled file sync and sharing. Acronis Access is designed with a special focus on enterprise IT departments, especially those in highly regulated industries. It allows IT to maintain security and control, and comply with regulations, while enabling employees to easily and efficiently access and share corporate content with internal and external constituents.

"Acronis Access has revolutionized mobility with our clients," said J David Hester, PhD, Solutions architect at LCG Systems. "The federal IT departments we work with had no sanctioned way in which to collaborate with external researchers. Using Acronis activEcho® provided us with all the necessary tools to manage, monitor and secure our data and meet NIST compliance standards, and before Acronis mobilEcho®, we had no simple way for our end users to access internal network resources on their iPads® and iPhones®. Acronis Access unites both functionalities and gives IT departments everything they need: support for two-factor authentication, access to their network home directories, shared folders and collaboration. In addition, with Acronis Access, they can now map to network shares without the cumbersome need of requesting centralized or local support."

Acronis Access is powered by Acronis AnyData Technology and is on-premise, so enterprise IT knows exactly where their company's data is. It also allows IT to give their employees the functionality they want, so they can remain productive in a controlled and secure environment. End-users can access content from file servers, NAS and SharePoint®, as well as their own desktops/laptops, and share files with people inside and outside their organization.

"Many employees today use personal smartphones and tablets to access sensitive corporate information, even if their organization doesn't permit a bring-your-own-device (BYOD) policy," said Terri McClure, Senior Analyst at Enterprise Strategy Group. "With this growing trend, mobile device management (MDM) doesn't go far enough. It isn't about controlling the employee's devices; it is about managing and securing corporate content. That is why companies need solutions like Acronis Access for Mobile Content Management. It gives IT more granular control of sensitive corporate information to ensure compliance, control and security for IT managers."

Acronis Access delivers a number of key features, including:

  • On-premise deployment to provide IT with complete control
  • Active Directory integration, which makes authentication, provisioning and user management seamless
  • Military-grade, FIPS 140-2 certified encryption module and CAC/PIV authentication
  • The Acronis Policy Engine, which provides granular management capabilities to create security policies and ensures control and compliance, with more than 50 security and user permission policies available
  • Allows IT departments to easily manage and scale their environments
  • In-app editing and creation capability, to allow employees to edit Office documents and annotate PDFs within the secure Access sandbox, eliminating data leakage and improving productivity
  • An easy and intuitive UI to make it simple and natural for users, with virtually no training
  • An audit log that gives IT the visibility to see what users are doing, including which documents they access and share with others.

"The age of one size fits all is over. People have more choices than ever, so it's crucial that IT departments give employees products they'll actually want to use and the flexibility to use the device of their choice," said Anders Lofgren, VP of product management at Acronis. "Acronis Access provides a user-friendly UI and seamless integration with Active Directory®, so both users and IT are happy. Plus the audit log gives IT the oversight necessary to ensure security and compliance."

Companies interested in learning more about Acronis Access can visit

About Acronis
Acronis delivers reliable, easy to use backup and disaster recovery solutions for physical, virtual and cloud environments to individuals and businesses in 90 countries worldwide. Acronis' innovative technology enables organizations to reduce risk against the loss of valuable data, control management and storage costs while responding to the always available, everywhere access demands of users. With proven technology for data migration and disaster recovery for hybrid environments, and secure file-sharing and synchronization for the home and business, Acronis is enabling new levels of data protection and mobile collaboration.

For additional information, please visit Follow Acronis on Twitter:

Acronis®, Acronis activEcho®, and Acronis mobilEcho® are registered trademarks of Acronis International GmbH in the United States and other countries. BlackBerry® and related trademarks, names and logos are the property of Research In Motion Limited and are registered and/or used in the U.S. and countries around the world. The Enterprise Strategy Group is a registered trademark of The Enterprise Strategy Group, Inc. SharePoint® and Active Directory® are registered trademarks of Microsoft Corporation in the United States and/or other countries. iPhone® and iPad® are trademarks of Apple Inc., registered in the U.S. and other countries. Other company and product names may be trademarks of their respective owners.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, will review the current landscape of...
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on...
As more intelligent IoT applications shift into gear, they’re merging into the ever-increasing traffic flow of the Internet. It won’t be long before we experience bottlenecks, as IoT traffic peaks during rush hours. Organizations that are unprepared will find themselves by the side of the road unable to cross back into the fast lane. As billions of new devices begin to communicate and exchange data – will your infrastructure be scalable enough to handle this new interconnected world?
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Achim Weiss is Chief Executive Officer and co-founder of ProfitBricks. In 1995, he broke off his studies to co-found the web hosting company "Schlund+Partner." The company "Schlund+Partner" later became the 1&1 web hosting product line. From 1995 to 2008, he was the technical director for several important projects: the largest web hosting platform in the world, the second largest DSL platform, a video on-demand delivery network, the largest eMail backend in Europe, and a universal billing syste...
WebRTC: together these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at WebRTC Summit, Cary Bran, VP of Innovation and New Ventures at Plantronics and PLT Labs, will provide an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it may enable, complement or entirely transform.
As operational failure becomes more acceptable to discuss within the software industry, the necessity for holding constructive, actionable postmortems increases. But most of what we know about postmortems from "pop culture" isn't actually relevant for the software systems we work on and within. In his session at DevOps Summit, J. Paul Reed will look at postmortem pitfalls, techniques, and tools you'll be able to take back to your own environment so they will be able to lay the foundations for h...
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in high-performance, high-efficiency server, storage technology and green computing, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology is a premier provider of advanced server Building Block Solutions® for Data ...
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Containers are all the rage among developers and web companies, but they also represent two very substantial benefits to larger organizations. First, they have the potential to dramatically accelerate the application lifecycle from software builds and testing to deployment and upgrades. Second they represent the first truly hybrid-approach to consuming infrastructure, allowing organizations to run the same workloads on any cloud, virtual machine or physical server. Together, they represent a ver...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, will discuss the impact of technology on identity....
This week, the team assembled in NYC for @Cloud Expo 2015 and @ThingsExpo 2015. For the past four years, this has been a must-attend event for MetraTech. We were happy to once again join industry visionaries, colleagues, customers and even competitors to share and explore the ways in which the Internet of Things (IoT) will impact our industry. Over the course of the show, we discussed the types of challenges we will collectively need to solve to capitalize on the opportunity IoT presents.
SYS-CON Events announced today that Spirent Communications, the leader in testing navigation and positioning systems, will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Spirent Communications enables innovations in communications technologies that help connect people. Whether it is service provider, data centers, enterprise IT networks, mobile communications, connected vehicles or the Inte...
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.