View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
October 29, 2013

New mobile apps from Egnyte eradicate BYOD security risks

The new mobile apps allow secure access to files from any device.

By Kate Heslop

Egnyte, provider of file-sharing platforms for enterprises, has announced the availability of new mobile apps that enable companies to create and manage a secure perimeter stretching from users’ mobile devices to enterprise files stored behind the firewall,

The new apps aim to eradicate any risks associated with Bring Your Own Device (BYOD) in the workplace. They are also fully integrated with Storage Connect.

Egnyte’s new mobile apps provide secure access from any device to any file whether they’re stored in the cloud or locally behind a firewall.

According to Ovum research, more than 57% of full-time employees use a personal device to access corporate data. A recent IDG study reported that 3/5 of companies believe that cloud file sharing has compromised their data security and that up to 61% of all files would always need to be stored locally due to low IT confidence in the security of cloud-only storage methods. This is driving organizations to adopt a BYOD policy that balances employee choice with corporate control.

With Egnyte’s new mobile apps, users can access, search, bookmark and manage all files and folders from a mobile device. It also allows users to download and view any Office document, Google Docs PDF or image. You can share files with clients using web links or shared folders with password protection to ensure that files are kept secure.

Vineet Jain, Egnyte CEO and founder, commented on the new apps: "Access to files located in existing, on-premises storage from a mobile device has always been the last mile in reaping BYOD productivity. "Our new mobile apps not only deliver that last mile of user access, but also create a secure, end-to-end perimeter where files from on-premises storage are encrypted on the mobile device and can be remotely wiped in case the device is lost or stolen."

 

Content from our partners
Powering AI’s potential: turning promise into reality
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU