Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

4/3/2012
02:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

TeamDrive iOS App Brings Enterprise-Grade Security To Cloud File-Sharing For iPhone And iPad

TeamDrive 3.0 is now in the App Store

Hamburg – April 3rd 2012 – TeamDrive 3.0 for iOS has launched and is now in the App Store, delivering truly secure and private access to cloud data for iPhone and iPad business users. Availability of the iOS version of the world’s only cloud synchronization tool with a data protection seal of approval eases the task of IT directors trying to balance the use of mobile devices with the collaboration benefits of cloud storage, while also maintaining the absolute security of data. The option of running a TeamDrive server within a company’s own datacenter as well as on public and private cloud makes it a highly attractive enterprise ready approach.

Volker Oboda, CEO of enterprise cloud synchronization provider TeamDrive, said, “The iPad and iPhone are hugely popular choices for enterprise users, especially under Bring Your Own Device policies. Yet, until today, no cloud synchronization tool was available to provide genuine, enterprise-grade security for those devices. Today’s announcement makes BYOD policies far easier for IT directors to propose, implement and manage without worrying about the loss or compromise of confidential data or intellectual property when employees access files ‘on the go’ when the devices go AWOL.”

TeamDrive’s highly secure cloud file-sharing approach means that all data are encrypted on the originating device before upload, preventing meaningful unauthorised interception. RSA-2048 encryption is used on invitations to share AES-256 encrypted files on any TeamDrive Space. The sum of its security features ensures that TeamDrive is Safe Harbor-compliant.

To accommodate the needs of every business, especially those concerned about the implications of keeping intellectual property on cloud storage, TeamDrive may be used with any choice of server: private cloud, public cloud, TeamDrive cloud or on-site. This means that, instead of being pushed into a public cloud, an enterprise may use TeamDrive to operate its own private file-sharing service. The contents remain entirely under company control, on company-owned and company-managed servers.

TeamDrive 3.0 was launched on March 6th 2012 with a promise to release its iOS and Android apps imminently. TeamDrive’s Android app will be announced shortly, with support for Blackberry and Windows Mobile Phones following in the summer.

[ends]

Notes to editors For a short video overview that explains TeamDrive and how it works, visit http://www.youtube.com/watch?v=Psd5jj5NjXY

About TeamDrive Systems TeamDrive Systems enables secure, cross-company as well as cross-platform collaboration with total privacy, maximum security and full self-administration. TeamDrive offers a combination of cloud computing (private and public) and the free choice of servers, which delivers unlimited cost-effective scalability and independency.

TeamDrive’s dependable, scalable platform and services currently enable millions of business users to sync, share and collaborate beyond company borders. TeamDrive customers included leading global firms such as Airbus, h&z Unternehmensberatung AG, universities, the military and government institutions. For a customized solution evaluation of TeamDrive, please contact [email protected]

Further information: TeamDrive Systems GmbH, Max-Brauer-Allee 50, D-22765 Hamburg, Germany, phone +49(0)40/389044-33, e-mail: [email protected], web: www.teamdrive.com or follow on twitter: @TeamDrive

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Edge-DRsplash-10-edge-articles
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
Commentary
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-18178
PUBLISHED: 2021-05-18
Path Traversal in HongCMS v4.0.0 allows remote attackers to view, edit, and delete arbitrary files via a crafted POST request to the component "/hcms/admin/index.php/language/ajax."
CVE-2020-20214
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from an assertion failure vulnerability in the btest process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet.
CVE-2020-20222
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20236
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.46.3 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.
CVE-2020-20237
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.46.3 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.