texting

Acronis Launches Secure Network Access Solution for Nearly Any Mobile Device

Add Your Comments

Data protection software provider Acronis has unveiled a solution that will allow mobile devices to securely connect and work with files on a network while maintaining control and regulatory compliance.

The new service, Acronis Access, is designed to mitigate the risks of mobile devices entering and leaving networks while not crippling them in the process. It essentially combines Acronis products mobilEcho, which allows mobile phones and tablets to securely access network resources, and activEcho, which provides tools for managing, monitoring and securing data and meeting NIST compliance standards.

Employees using the Acronis Access client can access and share corporate content with internal and external constituents while still allowing network administrators to enforce data policies and that data doesn’t leak out of the organization through email or cloud services that may be unapproved such as Dropbox.

This sort of solution is helpful for organizations where employees use their own mobile devices to connect to the network in so-called Bring-Your-Own-Device scenarios. But it is also helpful for stemming the growth of “Shadow IT”, a practice in which staff bring in cloud services that help them and their teams solve problems, unaware that these applications could cause security risks and compliance breaches.

“The age of one-size-fits-all is over. People have more choices than ever, so it’s crucial that IT departments give employees products they’ll actually want to use and the flexibility to use the device of their choice,” Acronis product management VP Anders Lofgren said in a statement.

Acronis Access is compatible with devices running iOS, Android 2.2 or later, Windows XP SP3 and later, and Mac OS X 10.6 and higher, as well as web browsers Firefox, Internet Explorer, Google Chrome and Safari. The Acronis Access client provides a military-grade, FIPS 140-2 certified encryption module and CAC/PIV authentication.

From an end-user perspective, however, they can access content from file servers, NAS and SharePoint, as well as their own desktop and laptops, and share files with people inside and outside their organization with all this activity logged for security and compliance.

This can be useful when, for instance, companies and government agencies need to collaborate with one another without exposing sensitive data to risk.

Add Your Comments

  • (will not be published)