Secure file sharing app for iOS
Posted on 25 October 2011.
Accellion Mobile Apps for iPad and iPhone with iOS 5 support provide secure mobile file sharing capabilities are currently available from the App Store.


The Accellion Mobile App offers users a collaborative environment to edit, save, share, and comment on files on a mobile device via an encrypted, protected file container.

IT and security teams have access to Accellion’s web-based administrative tool for unprecedented control, including the ability to turn on the Accellion Mobile App Protected Editing mode for designated mobile users or the View Only mode as appropriate, depending on the business and security requirements of an organization.

New Accellion Mobile App features for IT and security teams include:

Deployment options - Accellion supports on premise, public, private or hybrid cloud and FIPS 140-2 certified deployments.

User-based permissions - When administering the Accellion Mobile App, IT and security teams can use Accellion’s web-based tools to allow mobile users to edit files in Protected Editing mode or keep their mobile users in View Only mode as needed to comply with an organization’s information security policies and established LDAP groups.

Reporting - Files can be easily tracked and reported, including who downloaded what file, when and from what device to protect information and demonstrate compliance.

Protected editing - With the Accellion Mobile App for iOS 5, not only are files encrypted in transit, files saved on the mobile device are encrypted with 128-bit AES data encryption at rest and contained in a protected space.

Offline viewing - Files can be downloaded and saved locally in encrypted form for offline viewing without a WiFi or data connection.

Editing - Files can be edited on the mobile device using supported editor applications such as Quickoffice for real-time collaboration.

Encrypted uploads - Files can be edited in Quickoffice and uploaded from the mobile device back to an Accellion Workspace.





Spotlight

What can we learn from the top 10 biggest data breaches?

Posted on 21 August 2014.  |  Here's a list of the top 10 biggest data breaches of the last five years. It identifies the cause of each breach as well as the resulting financial and reputation damage suffered by each company.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //