Regain control over your data, decrease costs and maintenance workload
The Æoncase Sync Appliance runs on your own infrastructure, and your data never leaves your organization if you don’t want it to, keeping you safe from the data breaches that affect public cloud services regularly.
Æoncase’s ease of use, integration with existing workflows, and its extensive features drive user adoption and help to limit uncontrolled data flow through shadow IT.
The Æoncase Sync Appliance can run on inexpensive, commodity hardware. In addition to its sync capabilities, it doubles as a cost-efficient centralized storage and backup solution that decreases your storage costs by performing data deduplication and transparent compression.
The Æoncase Sync Appliance can be deployed in a matter of minutes: no need to configure database servers, web servers, caching services, email servers…
No extra services needed to integrate with your infrastructure, no hidden costs.
It integrates with your existing LDAP/Active Directory setup and your existing user management policies.
Download now
DownloadThe Sync Appliance updates itself with no user intervention, and no service disruption: no lengthy and risky database migrations required.
Users can administrate data retention within their quota: file versions and snapshots count against it, so you have no need to guess how much space will have to be provisioned for a given quota.
Users can recover space within their quota by purging no longer needed data. No admin intervention required.
Sync Appliance services run in isolated containers with an un-priviledged user with limited permissions.
The Sync Appliance is engineered to thwart whole classes of attacks using sound implementation techniques.
Internal SQL queries are constructed and analyzed statically, so as to prevent SQL injection attacks.
HTML generation in the web server is performed using typed structures validated statically so as to prevent HTML injection attacks.
User passwords (when not using external LDAP/AD authentication) are hashed using the bcrypt key derivation function.