Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom Lenovo Newsroom Nutanix Newsroom Cisco Live Newsroom HPE Zone Tech Provider Zone

The CRN Test Center's 2014 Products Of The Year

The technological leaps and bounds continue as the CRN Test Center faces the tough task of selecting the best products to come through its labs this year. This is one winner's circle with a big wow factor.

Back 1   2   3   ... 26 Next



Winner: nCryptedCloud Enterprise

For the enterprise attempting to eke out a living in the Wild West of today's cloud file storage and sharing, nCrypted Cloud Enterprise is Wyatt Earp. For about $10 per user, the solution puts a user-managed security layer atop Box, Dropbox, Google Drive or One Drive without burdening the IT department with lots of administrative overhead. The service combines cloud-based services with browser, desktop and mobile client apps to automatically add as many as five levels of security to files at the discretion of file owners using that cloud system's own native interface. When the CRN Test Center evaluated the Dropbox-only solution earlier this year, we found a stable, intuitive security layer that's as flexible and easy to use as Dropbox itself.

The nCrypted client implements a virtual view of a Dropbox folder. Normal icons appear with a series of new icons on top indicating security status of the folders within. Special icons indicate encrypted personal data, shared encrypted data, and corporate-owned and encrypted folders that are secured with corporate keys. Encryption policies stay with files, even when they're moved outside the system. To remind workers to be good corporate citizens, the software not only prompts users when an impending action would be insecure or unauthorized, it provides a prompt to secure the file with a single click. If an unauthorized person requests access to a file, the requester is prompted with an equally simple method of requesting permission from the owner, who can also use email to accept or deny. An automated invitation system can help get security up and running quickly. Files placed in a folder with a higher security level automatically inherit the stronger security. And top-secret files are prevented from being viewed offline without a corporate PIN. Offline options include a three-day period during which protected files may be viewed by authorized people.

Back 1   2   3   ... 26 Next

sponsored resources