February 13, 2017   |   by Brian W Levine

Syncplicity delivers Privacy and Data Protection by Design

By Brian W. Levine, Syncplicity Security and Compliance Officer

As RSA 2017 kicks off, it’s exciting to look out at today’s security and privacy horizon and see how Syncplicity is uniquely positioned to help enterprises meet the most critical challenges in data protection and digital workplace transformation.

It’s almost a cliché to state that we have seen tectonic shifts in global privacy and security over the last 18 months (but I’ll recap anyway). Consider the rise of IoT botnets crippling the internet, corporations held hostage by crypto-ransomware, and nation-state hacks targeting US elections. In the privacy realm, the US-EU Safe Harbor treaty for data transfer was thrown out and its upgrade, EU-US Privacy Shield, stands on trial to decide if it will face a similar dismissal. Further, the EU-GDPR go-live date looms, and companies slow to adapt will be sure to find themselves in a courtroom facing fines starting at the entry-price of 20 Million Euros per violation. Deep breath, yes these are interesting times.

While cyberattacks increase and data protection laws are in flux, one thing is certain; a proactive transformation strategy which places user privacy and the protection of company data at the foundation is the clear route through the shifting landscape. Leading with these principles, Syncplicity has developed innovative solutions to meet these challenges, while enabling digital transformation and empowering your mobile workforce. 

For our customers, the concepts of data protection by default and privacy by design mean that we place confidentiality and privacy of personal information and company data as primary requirements. Here are examples of how this design objective is embedded into our products and processes:  

  • While the physical location of data has become an increasing concern, Syncplicity’s hybrid cloud architecture offers multiple options to address data sovereignty. Customers choose where to host their file storage - on-premises, in a private cloud, or in one of Syncplicity’s regional public clouds. Policy-driven storage allows multiple storage locations to be defined within a single tenant account, meaning users have a seamless sharing experience while the back-end infrastructure complies with global data protection concerns.
  • In 2016, we launched Syncplicity PrivacyRegions, an innovative solution which ensures personal information and company meta-data is stored and processed only in the local PrivacyRegion, and is not subject to cross-border data transfer regulations. The additional protection comes at no cost to the user experience; users can still seamlessly share files with trusted recipients in any geographic region.
  • Fears of government action and potential ‘back doors’ in technology products have sparked a fever pitch of scrutiny and will continue to be debated topics in this environment. StorageVault Authentication is a patented security control that ensures it’s technically and physically impossible for Syncplicity to provide third-party access to customer data, as well as restricts insiders from any unauthorized access. This zero content knowledge approach ensures compliance with the most secure data processing and confidentiality requirements.
  • Visibility and transparency is critical and we provide compliance certifications and audit reports for all our systems, processes, and data-centers. We have partnered with TRUSTe to validate our privacy practices and certify our commitment to privacy protection, choice, and accountability.
  • Enterprises need to be proactive, not reactive, to ensure confidentiality and prevent data leakage before it becomes an issue. Our rich set of group-based policies and access controls allow companies to set the right level of data protection based on a user’s specific profile.
  • End-to-end security controls like Syncplicity’s Secure Shared Files applies an encrypted rights management container around documents, so that when files are sent externally, they remain protected and the enterprise maintains ownership of encryption keys.
  • Customers should not have to choose between security, privacy, and a great end-user experience. As we know, if you impede user productivity, users will find their own insecure alternatives. Syncplicity’s clients and Web apps are designed to enable frictionless productivity and collaboration without compromising on security and privacy.
  • On every project, our developers perform an impact analysis to evaluate potential security and privacy issues before writing a single line of code. We use multiple third-party security teams to penetration test our systems using a variety of attack vectors and techniques. 

Syncplicity has committed to delivering the highest levels of security, data governance, and privacy available in the file sync and share market, and we continually engage with our customers, R&D, and support teams to unlock new use cases for user productivity and enterprise transformation.

We welcome the challenges of 2017 and beyond and are passionate in our belief that we offer a unique value proposition to address today’s secure file sharing requirements. We look forward to engaging with you at the RSA Conference to demonstrate first-hand how we empower the digital workplace and modernize IT infrastructure while maintaining the highest levels of data protection and privacy.

P.S. Be sure to stop by our booth #N4243 to learn more and also receive a coffee mug with a #hashtag you will find interesting, and as always we welcome your thoughts and comments @Syncplicity @BrianLevinePM

January 26, 2017   |   by Brian W Levine

Why All Companies Should Have a Ransomware Recovery Plan

Cyber criminals are not only becoming more and more sophisticated but also bolder. The most insidious computer crime today doesn’t involve viruses or stealing credit card numbers. Instead, it comes in the form of ransomware – rogue programs that hold an entire organization’s data hostage with unbreakable encryption and demand a ransom for the decryption key.

These attacks are becoming increasingly common. In 2015, there were 2,453 reported ransomware incidents, in which victims paid about $24.1 million, according to the FBI. Security researchers found that the number of users who came across crypto ransomware in the last year increased by more than 500 percent from the previous year.

In the past few months alone, new and more powerful ransomware has appeared, with criminals targeting sensitive entities like healthcare facilities. For example, MedStar Health, a major healthcare provider in the Washington, D.C., region, was forced to disable its network for several days after a ransomware attack early this year, while Hollywood Presbyterian Medical Center in Los Angeles, California, paid $17,000 in response to an attack in February.

Ransomware is flourishing for two basic reasons.

First, it’s simple economics. Rather than dealing with the trouble and risk involved in stealing credit card files and peddling them on the black market, criminals using ransomware can simply sit back and wait for the victims to pay. Of course, the criminals don’t always send the decryption key in return – these are thieves, after all.

The second reason is that a ransomware attack is incredibly difficult to prevent. It only takes a single click within an email or on a website for an unsuspecting employee to activate the code that encrypts an entire system and triggers a ransom demand. Even if an enterprise has the most updated anti-virus software or access restrictions on sensitive files, it remains vulnerable to ransomware via just one unsuspecting user.

While it’s difficult for an enterprise to feel completely confident in preventing a ransomware attack, it can take steps to mitigate the effects of this new and destructive type of malware – and recover normal operations in minutes or hours – if the proper precautions and recovery plans are in place.

The most important recovery element is real-time protection of data, which means backup copies of all files and data are stored securely in the cloud rather than local desktops. To be most effective, this needs to be accomplished automatically, with a copy being synced up to the cloud every time a file is edited or saved. These backups let a business “roll back” to the moments before a ransomware attack and recover all its files – even in cases where the ransomware has affected large numbers of users within the organization.

It’s also important that the software or service you use to create these backups is capable of excluding the kinds of encryption files known to be associated with ransomware – so you don’t wind up restoring the very files that created the problem in the first place.

Finally, businesses must establish a retention policy. Whether you choose to retain deleted files forever or for a specified time period, a retention policy will allow your original files to be retrieved after they are deleted or encrypted by ransomware. This is a critical part of a recovery plan as it can allow files to be restored quickly and won’t hold you back with a time-consuming and expensive recovery process.

Cybercriminals are an unfortunate reality in today’s marketplace, and it’s easy to fall victim if you’re unprepared. By being aware and maintaining the right backup strategy, however, your company can minimize the damage from these attacks and turn the tables on this latest generation of attackers.

Brian Levine is Senior Director of Security and Compliance at Syncplicity.

December 21, 2016   |   by Kristie Conner

SyncDrive: Size Does Not Matter

SyncDrive: Size Does Not Matter

The amount of unstructured data in home directories, group shares and network drives across the enterprise is staggering and the overall amount of information is growing exponentially as the world becomes more digital. The reality is that we are just at the beginning – the volume of data is exploding, more data has been created in the past two years than in the entire history of the human race. That is a lot of data – and it begs the question: what do we do with that data, and exactly how do knowledge workers access it?

Syncplicity has an answer – SyncDrive. While we might not be solving all your unstructured data needs (okay, 90% of them), if you choose Syncplicity we can help you untangle your home directories and group shares and at the same time modernize your file storage infrastructure – along with providing access to all your data via the desktop, laptop and mobile devices. Imagine, being able to give your enterprise users VPN-less access to all their enterprise content from any device, where data size does not matter. 

Now, imagine being a user and, never having to worry (again) about having enough space on your device or maneuvering and moving files so you have just the right ones when you need them. SyncDrive redefines how users work with large volumes of data across the enterprise. Users can selectively sync the files they need, and the intelligent cache feature ensures they never need to worry about running out of storage.

SyncDrive is a revolutionary feature that will have an immediate impact on the user and IT. What about the value to the overall enterprise? For a typical Fortune 1,000 company, just a 10 percent increase in data accessibility will result in more than $65 million additional net income. With SyncDrive, we make this possible.

This new SyncDrive feature is now available and extends our digital transformation lead by enabling enterprises to modernize their IT infrastructure and access petabytes of data stored in legacy file shares.”

Read ‘Syncplicity’s New SyncDrive Feature Unlocks Unprecedented Access to Data’ press release here.

December 19, 2016   |   by Kristie Conner

Syncplicity PrivacyRegions Answers Data Protection Requirements

Syncplicity PrivacyRegions Answers Data Protection Requirements

Syncplicity is raising the technology architecture bar with a new EFSS innovation that ensures corporate compliance without getting in the way of user productivity. Syncplicity PrivacyRegions allows companies to remain compliant with region-specific data protection and residency regulations while still allowing their users to seamlessly share folders and files with users and companies based in other regions. Personal information (PII) and corporate meta-data is never processed or stored in other regions.

Syncplicity PrivacyRegions uniquely combines regional cloud services, policy-driven hybrid cloud storage and a new privacy driven architecture. Today, we’re pleased to announce that Syncplicity European Union (EU) PrivacyRegion is generally available. This design enables EU-based enterprises to confine the storage and processing of all their files, meta-data, and personal information to the EU region. 

Seamless User Experience

Syncplicity is the only EFSS provider to offer regional cloud services that do not restrict user sharing. We allow users to seamlessly collaborate across regions with a single account, while maintaining all the information—including meta-data—within a designated region. For example, with Syncplicity, an enterprise’s storage and control plane can be in Europe. Other EFSS vendors allow customers to choose a geographic zone for file storage, but they process and store all meta-data, such as filenames, PII, and significant indexing of regional files’ content in U.S.-based cloud services. By contrast, Syncplicity PrivacyRegions segregates a company’s meta-data, PII and file storage to its chosen region. For example, customers who choose Syncplicity EU PrivacyRegion are assured all of their information is kept within Europe.

Syncplicity is the first vendor to provide regional cloud services allowing users to seamlessly collaborate across regions without requiring multiple user accounts for each region. Syncplicity’s solution is unique in segregating all data to specific regions, while still providing users ‘a single-pane-of-glass’ experience and seamless collaboration across regions.

Syncplicity’s release of PrivacyRegions builds upon a long-standing posture of data privacy compliance. Our ‘data protection by default’ strategy provides a flexible architecture with the necessary granular privacy, confidentially and data sovereignty controls built-in, giving our customers the right tools to adapt to evolving regional legislation and business requirements across the enterprise.

To learn more about how Syncplicity ensures compliance with global privacy and security regulations, please click here.

December 6, 2016   |   by Jon Huberman

Hybride Speicher und Datenschutz: So sorgen Sie für Compliance

Mit Big Data und dem Internet of Things kommen auf klassische Storage-Architekturen neue Aufgaben zu, denen sie immer weniger gerecht werden können – sie sind oft zu starr und unflexibel. Ein Ausweg könnte Enterprise File Sync & Share (EFSS) sein, das vorhandene und neue Speicher zu hybriden Strukturen zusammenführt. Wo liegen die Stärken eines EFSS-Systems und welche Faktoren insbesondere im Datenschutz spielen eine besondere Rolle? Lesen Sie dazu mehr in diesem Artikel.

Nicht alle Daten müssen in die Cloud. Bei einigen ergibt dies jedoch durchaus Sinn. EFSS hilft bei der Umsetzung.

Weltweit nehmen die Datenmengen durch Big Data oder Internet of Things zu. Bisherige Ansätze wie die exklusive Speicherung von Daten auf eigene Storage-Strukturen bedienen oftmals die neuen Anforderungen nur noch unzureichend. Besonderer Flaschenhals kann dabei das klassische Storage-Management werden. Ein Ende dieser Entwicklung ist bei einem globalen Gesamtdatenvolumen von 8,5 Zettabyte kaum absehbar – bis zum Jahr 2020 erwarten Marktforscher eine Steigerung auf 40 Zettabyte.

In Deutschland kommen zu dieser Entwicklung darüber hinaus auch noch verschiedene Auflagen des Datenschutzes hinzu. Wegen dieser besonderen Ausgangslage können Unternehmen nicht einfach den günstigsten Cloud-Storage-Anbieter wählen, sondern müssen explizit die Vereinbarkeit der einzelnen Lösungen mit den jeweils geltenden Vorschriften abgleichen.

Weltweit nehmen die Datenmengen durch Big Data oder Internet of Things zu. Bisherige Ansätze wie die exklusive Speicherung von Daten auf eigene Storage-Strukturen bedienen oftmals die neuen Anforderungen nur noch unzureichend. Besonderer Flaschenhals kann dabei das klassische Storage-Management werden. Ein Ende dieser Entwicklung ist bei einem globalen Gesamtdatenvolumen von 8,5 Zettabyte kaum absehbar – bis zum Jahr 2020 erwarten Marktforscher eine Steigerung auf 40 Zettabyte.

In Deutschland kommen zu dieser Entwicklung darüber hinaus auch noch verschiedene Auflagen des Datenschutzes hinzu. Wegen dieser besonderen Ausgangslage können Unternehmen nicht einfach den günstigsten Cloud-Storage-Anbieter wählen, sondern müssen explizit die Vereinbarkeit der einzelnen Lösungen mit den jeweils geltenden Vorschriften abgleichen.

Bei der Wahl zwischen Cloud- und On-Premise-Storage stehen Entscheider vor einem Dilemma. Während lokale Strukturen rasch an die Grenzen der eigenen Kapazität stoßen können, fehlt bei Cloud-Angeboten die Nachvollziehbarkeit des konkreten Speicherorts der manchmal unternehmenskritischen Daten. Die Nachvollziehbarkeit der Ablage ist allerdings je nach Branche und Art der Daten aufgrund von staatlichen oder unternehmensinternen Regularien erforderlich. Deswegen kommen hier Cloud-Anbieter mit Speicherorten außerhalb der Europäischen Union, beispielsweise US-Provider, nicht in Frage.

Flexibilität und Sicherheit
Die Frage, ob bei der Datenspeicherung mehr Flexibilität oder mehr Sicherheit gewünscht wird, lässt sich auf einfache Weise beantworten: beides, denn beides ist für die Unternehmen von zentraler Bedeutung. Der Ansatz, um hier die Bedürfnisse der Kunden erfolgreich zu adressieren, heißt Enterprise File Sync & Share (EFSS). Mit EFSS sind die Vorteile beider Welten verfügbar. Hier können weniger sensible Daten in die Cloud wandern, die automatisch mit den Anforderungen mitwächst. Unternehmenskritische Daten hingegen sind auf lokalen Strukturen besser aufgehoben. Mit einer Policy Engine, wie sie beispielsweise Syncplicity anbietet, können Administratoren Richtlinien zur Behandlung verschiedener Datentypen festlegen.

Bei global agierenden Unternehmen lassen sich Daten so automatisch auf den Servern oder Cloud-Diensten der einzelnen Regionen speichern, während sie den länderübergreifenden Arbeitsgruppen zur Verfügung stehen. Der Unterschied zum klassischen Administrationsansatz, bei dem dies prinzipiell auch zu bewerkstelligen ist, ist die Automation sowie der bessere Überblick über die vorhandenen Daten. Nebenbei umgehen Unternehmen so auch überflüssige Redundanzen. Ein Aspekt der bei der gesetzeskonformen Speicherung gerne übersehen wird, sind die Meta-Daten. Falls die originären Daten gesetzeskonform zwar in der EU liegen, ist in vielen Fällen ausländischen Behörden ein Rückschluss auf die Unternehmensaktivitäten durch die Auswertung der Metadaten möglich. Im Idealfall regelt eine Policy Engine mittels der PrivacyRegions die korrekte Distribution dieser speziellen Daten gleich mit.

Seite 2 - Hybride Speicher und Datenschutz: So sorgen Sie für Compliance

Daneben können Unternehmen mit einem EFSS-System flexibler auf veränderte Datenvolumen reagieren. Hier lassen sich weniger kritische Daten temporär von On-Premise auf die Cloud auslagern, ohne dass versehentlich kritische Informationen mitwandern. Eine EFSS-Lösung weist dabei den Speicherort gemäß den vorab definierten Policies automatisch zu. Damit bietet EFSS eine skalierbarere Umgebung als klassische Speicherlösungen.

Alleine schon aus rechtlichen Gründen ist die Nutzung eines EFSS-Systems bei komplexeren Problemstellungen ratsam, denn die gleichzeitige Nutzung von Cloud-Storage und lokalen Speichern könnte ohne eine gemeinsame Einbettung in ein Managementsystem dazu führen, dass klassifizierte Daten an einem ungeeigneten Standort gesichert werden. So haben beispielsweise Personal- und Gehaltsdaten nichts auf einem Cloud-Speicher zu suchen, dessen Sicherheitsmaßnahmen durch den Provider nicht abschließend geklärt werden konnten.

Organisatorische Erleichterung durch EFSS
Jedoch hilft eine EFSS-Lösung auch dabei, die Organisation in der IT zu vereinfachen. So fällt bereits einiges an Aufwand alleine dadurch weg, dass nicht jede Speicherplattform für sich organisiert werden muss. Speicher- und Synchronisationszugriffe erfolgen unter einem Dach. Dadurch werden auch mehrere in verschiedenen Versionen gespeicherten Daten vereint. Ein konsolidierter Datenstand steht auf diese Weise zur Verfügung.

Nicht zuletzt ergeben sich Einsparpotentiale, denn die dynamische und Policy-gestützte Datenverteilung hilft, die Strukturen schlank zu halten und die Bereitstellung überflüssiger Ressourcen zu vermeiden. Dies ist bei der Nutzung von Cloud-Storage auch möglich, doch nur zu dem Preis der mangelnden Einflussnahme auf die Verteilung der Daten. Dies gilt natürlich auch für einen Filialbetrieb, bei dem die Vorhaltung lokaler IT vollkommen reduziert werden kann.

Arbeitswelt im Wandel
Mit der zunehmenden Nutzung eigener Endgeräte oder flexibleren Arbeitsmodellen wie dem Home Office stellt sich für die Unternehmens-IT die Frage, wie mit Daten auch in Hinblick auf eine unternehmensferne oder dezentrale Nutzung zu verfahren ist. Informationen stehen hier in nicht kontrollierten Raum zur Verfügung und die Gefahr eines Datendiebstahls steht permanent im Raum. Aus diesem Grund sollte ein ausgeklügeltes Synchronisationsmanagement die Dateien zur Verfügung stellen, die für die Bearbeitung von Geschäftsprozessen unbedingt erforderlich sind. Auch hier stellt ein EFSS-System sicher, dass der Zugriff entweder zeitlich oder auf Geräteebene begrenzt gewährt wird, damit unternehmenskritische Informationen an ihrem vorgeschriebenen Ort verbleiben.

Mehr Schutz vor Ransomware
Der Albtraum eines jeden Administrators ist es, wenn sich die Rechner der Nutzer mit einer Verschlüsselungs-Schadware infizieren. Selbst nach der Zahlung eines Lösegelds an den Cyberkriminellen, der die Ransomware entwickelt hat, ist der Zugriff auf die Daten keinesfalls garantiert. Die EFSS-Lösung von Syncplicity etwa bietet hier einen guten Schutz. Durch das Storage-Management werden Daten permanent in verschiedenen Generationen gesichert, sodass eine Restaurierung wichtiger Informationen jederzeit möglich ist.

Im Gegensatz zu herkömmlichen Cloud-Synchronisationen kommt hier nicht nur ein "magischer Ordner" zum Einsatz, bei dem die Verschlüsselung durchsynchronisiert wird, sondern mehrere. Diese lassen sich dann voneinander isoliert behandeln. Damit minimiert sich das Risiko, dass alle Datenbereiche unbrauchbar werden. Außerdem stellt EFSS sicher, dass riskante Dateitypen von der Synchronisation ausgenommen werden. Ferner können bei Nutzung der Share-Funktion Mailanhänge seltener verwendet werden, was auch hier du einer Verringerung des Risikos führt. Sollte der Worst Case allerdings eingetreten sein, erstellt EFSS einen Recovery Plan, nach dem sich die befallenen Dateien sukzessive rasch wiederherstellen lassen.

Fazit
Herkömmliche Storage-Architekturen sie sind oft zu starr und unflexibel. Ein Ausweg könnte Enterprise File Sync & Share bieten, das vor allem beim Datenschutz seine Stärken ausspielt und es vermag, vorhandene und neue Speicher zu hybriden Strukturen zusammenzuführen.

Read original article here.

December 1, 2016   |   by Brian W Levine

Ransomware is on the rise prepare your business for the worst

Cyber criminals are increasingly turning to ransomware as a form of blackmail to exploit public and private enterprises. It’s estimated that the cost of ransomware attacks will total over $1bn this year – and researchers warn that the problem is only going to grow. Hackers are not only increasingly sophisticated, but also getting bolder in their approach and so the most insidious computer crime today doesn’t involve viruses or stealing credit card numbers but comes in the form of ransomware. These rogue programs have the ability to hold an entire organisation’s data hostage with unbreakable encryption, while the cybercriminals demand a ransom for the decryption key.

These attacks are becoming increasingly common. In the past few months alone, new and more powerful ransomware has appeared, with criminals targeting sensitive entities such as NHS hospitals and local councils. In fact, almost 30 NHS trusts admit that they have been the victims of ransomware attacks in the past 12 months, while 30% of UK councils were victims of ransomware in 2015.

The reasons for ransomware flourishing are two-fold.

Firstly, basic economics. Stealing credit card details and selling them on the black market can be time-consuming with a potential payoff of less than a dollar per card, so cybercriminals are turning to ransomware to sit back and wait for victims to pay up. Less work for greater returns!

Secondly, ransomware is very difficult to avoid. A single click within an email or website is all it takes for an unsuspecting employee to activate the code that encrypts an entire system and triggers a ransom demand. Even if an enterprise has the most updated anti-virus software or access restrictions on sensitive files, it remains vulnerable to ransomware via just one unsuspecting user.

However, all is not lost. Organisations can take steps to mitigate the effects of attacks and recover normal operations in minutes or hours – if the proper precautions and recovery plans are in place. The most important recovery element is real-time protection of data, which means backup copies of all files and data are stored securely off-site rather than on local servers. In order for this to be effective, it needs to be accomplished automatically, whereby a copy is made every time a file is edited or saved. Backups like this let a business “roll back” to the moments before a ransomware attack and recover all its files – even in cases where the ransomware has migrated across the local network and servers.

To do this, the software or service a business uses to create the backup must be capable of excluding all encryption files known to be associated with ransomware. Businesses need to avoid restoring the files that delivered the ransomware in the first place.

Last but not least, businesses need an effective retention policy – whether that is to retain deleted files forever or for a specified time period. Establishing a retention policy will allow the business to retrieve the original files after the ransomware attack. This is an integral part of any recovery plan as it removes the need for costly recovery processes, which are often time-consuming, meaning the business can be up and running again with the least disruption to the operation.

In today’s technological age cybercriminals are an unfortunate reality. Businesses therefore should think ‘not if, but when we are attacked’ and take all the necessary precautions to ensure that the attack causes the least amount of damage to the business. By being aware and maintaining the right backup strategy, your company can minimise the damage from these attacks and turn the tables on this latest generation of attacks.

Read original theCsuite.co.uk article written by Brian W. Levine, Syncplicity Security Officer here.

November 30, 2016   |   by Kristie Conner

Thank you, CIOReview!

If you have not opened the latest issue of CIOReview Magazine, then let us tell you first!  We were recognized by CIOReview as one of the “20 Most Promising Compliance Solution Providers of 2016”.  It’s an annual listing by CIOReview of 20 companies that are on the forefront of providing compliance solutions and impacting the marketplace.

“Syncplicity’s role in modernizing legacy infrastructure to keep data safe and compliant is noteworthy.  The company offers users an easy to use file sharing and collaboration solution with complete control of their data while fully adhering to compliance requirements.”

To read the full article on Syncplicity “Bolstering Secure Frameworks for File Sharing” click here

To learn how we can help your organization kickstart IT infrastructure modernization to reduce costs and empower your digital workplace, please email us at sales@syncplicity.com

November 3, 2016   |   by Kristie Conner

A Different Kind of Sharing

Most of us have been to tradeshows and fallen for the free giveaways.  Those little trinkets look so alluring under the lights and in the excitement of the show.  One year I recall bartering with another vendor for one of their selfie sticks, thinking that is kind of cool, but in reality I don’t take selfies – so it sits around in its unused glory taking up space.  And, it’s cheaply made. How many times have I brought stuff home just to be thrown away or collect dust?

The #truthis I don’t pick up any stuff anymore, or almost never.  

For our upcoming show Gartner ITExpo in Barcelona the marketing team came up with a new idea. We decided to select a charity and for every person who gets scanned at our booth we will donate 2 Euros to an important cause.  The cause chosen for the Gartner ITExpo in Barcelona is Solar Aid, an International charity that combats poverty and climate change by providing access to solar lights in some of the most remote regions of Africa.

If you are headed to Barcelona stop by our booth to get scanned, get a “I donated to Solar Aid through Syncplicity” sticker and support an organization that is doing great work #ADifferentKindofSharing!

Just Five Scans

Just 5 Scans at our booth will result in 3 Solar Lights, 13 People Reached, £435 Saved by Families, 3018 Extra hours of child study time, 3.2 tonnes of CO2 emissions everted and 6 people experiencing better health.

Visit the Syncplicity Booth (#403) and participate in a Different Kind of Sharing.

October 3, 2016   |   by Kristie Conner

Affiliate Sharing: Helping Enterprises Build their Digital Ecosystem of Trust

In a recent Enterprise Strategy Group (ESG) research study, they found that 98% of IT and security professionals were extremely concerned with having technologies in place to ensure policies are applied to the sharing of sensitive data. Our newest product enhancement, affiliate sharing, does just that.  Affiliate sharing extends sharing and collaboration capabilities to include a trusted network of specific partners and customers, in essence helping enterprises build their digital ecosystem of trust.

IT often blocks external sharing due to the perceived security risks, but their digital workers are looking for ways to share large files and folders with partners and customers, even if that means using consumer (shadow IT) file sharing tools.  Our latest product enhancement gives digital workers a secure and seamless way to share files and folders within their digital ecosystem, building a ‘trusted network’, while maintain the level of security control required by IT.

“External sharing is critical to Texas A&M University, and Syncplicity’s new controls give me confidence that my teams can share files and folders securely among our trusted group of organizations,” said Danny Miller, CISO System Chief Information Security Officer at Texas A&M University. “In today’s digital world, the firewall is no longer the boundary for data and information sharing. These new Syncplicity enhancements enable us to lock down sharing within a trusted group of affiliated organizations, helping us stay compliant and secure – maintaining central control while enabling easy end-user collaboration.”

Affiliate Sharing offers a comprehensive set of controls that allow you to:

  • Build a trusted digital environment for extending file sharing with partners and customers by assigning specific groups of users the domains with whom external sharing is approved.
  • Extend security controls and sharing policies to both outbound and inbound folder sharing separately, based on Active Directory group membership.
  • Leverage new folder re-sharing rights controls to override company wide and group-based external sharing policies to ensure that users who are approved to share externally cannot expose specific confidential information.
  • Shut down data leakage by optionally setting inbound folder sharing for specific groups of users to be read-only.

To start building your digital ecosystem of trust, checkout the new additions to Syncplicity’s group-based policies and security controls, or to learn more about these and other security features contact your Syncplicity Customer Success Manager.

August 17, 2016   |   by Doug Benson

Collaborate in Microsoft Office with the Syncplicity App Tab

The pace of today’s collaborative work often requires editing files that are shared among multiple people. But collaborating with others in real-time can create problems. Does someone else have the document open right now? Will my changes get overwritten? Am I looking at the latest version?

There have been several approaches to this problem, including real-time editing within a browser. But the vast majority of Enterprise documents are created and edited in desktop versions of Microsoft Office applications. These applications are the gold standard, and present in nearly every office environment worldwide. So Syncplicity set out to address the real-time viewing and editing problem directly at the source.

The Syncplicity App Tab is a collaboration feature that works with desktop versions of Microsoft Word, Excel and PowerPoint, from Office 2007 through Office 2016 (included with Office 365). The App Tab was introduced in the Syncplicity desktop client version 4.1.0 for Windows. In future releases we will bring the feature to Mac and mobile clients as well.

When you use Microsoft Word, Excel or PowerPoint to open a file inside a shared folder, the Syncplicity App Tab displays. The App Tab helps you avoid accidental file conflicts when collaborating on shared files, with visible notifications when a file’s status changes. Popup notifications display directly inside Microsoft Office when other people view a file that you are also viewing, when someone else starts editing that file, or when a newer version of that file becomes available.

Learn More

Get an entertaining and in-depth tour of the new App Tab in just over 7 minutes by watching our Syncplicity App Tab Video Guide. Amaze your friends! We also created a written guide to Using the Syncplicity App Tab, if reading is more your thing.

Enjoy collaborating with the Syncplicity App Tab, and send us feedback!

< Older

DemoSee How it Works

Call Sales1-888-908-4276
or We'll Call You

Live Chat

Thank you.
Our team will contact you soon!