Nasuni latest to roll out mobile access to cloud-based network storage

By Brandon Butler, Network World |  Cloud Computing, cloud storage

Within a few years, mobile access to cloud-based storage will be a "checkmark" feature that will be fairly ubiquitous among the major vendors, predicts 451 Research Group analyst Simon Anderson. We're not quite there yet, but more and more vendors are rolling out the feature.

The latest is Nasuni, which delivers a cloud-based network-attached storage option for enterprises. The release of the fourth version of the company's software this week extends the capability of Nasuni to access data from mobile devices.

OOPS: OpenStack board member says letting VMware into project was a mistake

SLIDESHOW: 12 hot cloud computing companies worth watching

Nasuni's offering leverages a hybrid cloud approach, which combines on-premise storage controllers that collect and encrypt data behind the enterprise's firewall, then send the encrypted data up into its public cloud, which is hosted in Amazon Web Services and Microsoft Azure. The behind-the-firewall encryption means only the customer has access to the keys to unencrypt the data, not Nasuni or its network of cloud providers.

The newest mobile access capability, which was made generally available this week, allows users to access and upload images, videos and files via iOS and Android devices. Users are authenticated through Active Directory, giving IT departments the ability to control data flow to the individual device level, and segment which data sets are available to which groups of employees. Data can be deleted from devices remotely as well.

Terri McClure, an analyst with Enterprise Strategy Group, says Nasuni's offering hits at an emerging pain point in the enterprise. Users want access to their work files outside of their office, so many turn to consumer-oriented applications, such as Dropbox, Google Drive and SugarSync. The problem, she says, is when workers do that, IT loses control of which data is where, allowing for the possibility to sensitive data to be brought outside the firewall unprotected.


Originally published on Network World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.

     

    Learn more

Cloud ComputingWhite Papers & Webcasts

See more White Papers | Webcasts

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question
randomness