Egnyte HybridCloud Office review

This cloud-storage service aims to entice IT admins by including 256-bit AES encryption, logging and reporting features.

Price
£29

Unlike the multitude of cloud-storage services such as Dropbox, Egnyte is specifically designed for business. We take a look at the key features to see if this is suitable for use within the enterprise.

Permissions and security

Egnyte aims to provide tight security. Data transfers, including automated backups, are protected with 256-bit AES encryption over SSL. By default, only authenticated users who provide their login credentials can access a shared folder.

The service allows you to create user logins from the web interface. Though the first time a new user logs in they will be forced to change their admin-assigned password. It is possible to create a folder available without protection: handy if you want to quickly share files with a third party. Access can also be revoke after sharing.

Permissions available are read-only, read-write and read-write-delete so admins can configure this as appropriate. If things get complicated you can put your users into groups and assign permissions to the groups, allowing you to work more quickly.

Egnyte - Permissions

With Egnyte, you can specify each user's permissions folder by folder, so they can be shared without compromising your security policies

A good report

Egnyte has introduced a user login report. This records who logged in to the system and the IP address they used. As an administrator, you also get notified by a message to your inbox when users whose accounts you created log in for the first time.

Advertisement
Advertisement - Article continues below

Egnyte can also generate a range of other reports: allowing you to audit user permissions, the status of cloud-synced backups and folder sizes. Reports are easy to run, it takes just one or two clicks, and you can export them to Excel.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Most Popular

Visit/business-strategy/digital-transformation/354201/boston-dynamics-dog-like-robots-sniff-out-bombs-for
digital transformation

Boston Dynamics dog-like robots sniff out bombs for Massachusetts police

26 Nov 2019
Visit/business-strategy/mergers-and-acquisitions/354191/xerox-to-pursue-hostile-hp-takeover-after-30bn
mergers and acquisitions

Xerox to pursue hostile HP takeover after $30bn gambit fails

28 Nov 2018
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019
Visit/security/data-breaches/354192/t-mobile-data-breach-affects-more-than-a-million-users
data breaches

T-Mobile data breach affects more than a million users

25 Nov 2019