Collaborate and share files both within your organization and with external partners

Collaboration and sharing
 

Use a single service for collaboration both within your organization and external partners, customers and vendors.

Sync files with granular permissions (such as read-only access), and share them with secure links usable on any web browser.

Publicly shared files cannot be modified, keeping the original safe from any tampering.

Receive data from third parties
 

Create inboxes where third parties can send you files with any web browser. Get them delivered on your devices.

Each inbox is associated with a folder – simply sync it in your device, and you’ll have the files delivered right where you want on your local disk. You can place restrictions on the inboxes: deadlines, file size, number of uploads…
Support external collaboration needs
 

As an administrator, pre-approve self-provisioned “guest users”, enabling internal users to sync, distribute and work on files with external partners.

Guest users have limited capabilities, and can only work on the projects shared with them, so they do not impose any extra storage load.
Conflict management
 

Æoncase detects and flags file edit conflicts by keeping conflicting versions and allows you to resolve them.

Smart reconciliation prevents conflicts where a file is edited on a device and renamed in another.
Universal access
 

Access your files with any web browser no matter where you are, even in folders using direct sync without centralized storage.

When you request a file to the web server, the Sync Appliance will contact the computer that holds it and deliver it right to you!
Secure connections
 

Data in transit is secured with industry-standard Transport Layer Security (TLS) using strong ciphersuites with Perfect Forward Secrecy.

Moreover, the Sync Appliance uses a private, unique root Certificate Authority (CA) to prevent global PKI attacks.

Unlike common sync services oriented to home users, the Æoncase Sync Appliance does not rely on the global Public Key Infrastructure (PKI), and will instead use its own private root CA. This strengthens security by preventing a number of attacks related to the certificates used to secure the connection.