Regain control over your data, decrease costs and maintenance workload

Fight data leaks and shadow IT

The Æoncase Sync Appliance runs on your own infrastructure, and your data never leaves your organization if you don’t want it to, keeping you safe from the data breaches that affect public cloud services regularly.

Æoncase’s ease of use, integration with existing workflows, and its extensive features drive user adoption and help to limit uncontrolled data flow through shadow IT.

Decrease storage costs

The Æoncase Sync Appliance can run on inexpensive, commodity hardware. In addition to its sync capabilities, it doubles as a cost-efficient centralized storage and backup solution that decreases your storage costs by performing data deduplication and transparent compression.

Easy deployment

The Æoncase Sync Appliance can be deployed in a matter of minutes: no need to configure database servers, web servers, caching services, email servers…

No extra services needed to integrate with your infrastructure, no hidden costs.

The Sync Appliance satisfies off-the-box the needs of thousands of users on inexpensive, commodity hardware.

It integrates with your existing LDAP/Active Directory setup and your existing user management policies.

Easy administration

The Sync Appliance updates itself with no user intervention, and no service disruption: no lengthy and risky database migrations required.

Security updates are delivered automatically via a secure system based on The Update Framework, and multiple versions of the appliance are retained to enable immediate rollbacks if there is any problem.
Self-serviced quota management

Users can administrate data retention within their quota: file versions and snapshots count against it, so you have no need to guess how much space will have to be provisioned for a given quota.

Users can recover space within their quota by purging no longer needed data. No admin intervention required.

Strengthened environment

Sync Appliance services run in isolated containers with an un-priviledged user with limited permissions.

The attack surface can be further reduced by disabling non-critical operations on stored data with larger security footprints like image processing.
Security from the bottom up

The Sync Appliance is engineered to thwart whole classes of attacks using sound implementation techniques.

Public-facing services are implemented using memory-safe languages to prevent buffer overflows and related attacks.

Internal SQL queries are constructed and analyzed statically, so as to prevent SQL injection attacks.

HTML generation in the web server is performed using typed structures validated statically so as to prevent HTML injection attacks.

User passwords (when not using external LDAP/AD authentication) are hashed using the bcrypt key derivation function.