Why VPN-less Access?
VPN file servers are one way to enable secure remote access to an organization’s file servers. A VPN is a private, encrypted tunnel on top of an existing network. However, configuring the VPN, along with end-user training and IT maintenance, can be a significant drain on operational resources. It also doesn’t guarantee that data will be secure — if someone has access to the VPN, they can theoretically gain access to the entire network, unless additional security mechanisms are enabled.
The FileCloud Advantage
FileCloud offers an easier way to gain remote access to existing windows and network file shares, without relying on a VPN or FTP. FileCloud can be easily installed and integrated with existing infrastructure as a global storage overlay, enabling secure, remote access in minutes.
FileCloud honors existing NTFS permissions on network folders, ensuring that migration is a smooth process, without disrupting end user access or requiring admins to recreate permissions.
FileCloud Features for Secure Remote Access without VPN
- Secure servers: Users can store and share documents on secure, remote servers, with dedicated security infrastructure to protect data.
- Secure data sharing: Sharing data is easy — users can choose between public, private, or Zero Trust share options, with granular sharing settings for password-protection, link expiration, download limits, and granular access permissions, depending on the business requirement.
- Data recovery: Files and folders can be easily recovered from the recycle bin; retention policies support an automated data management life cycle, preventing unauthorized deletion and data loss.
- Automatic backups: Unlike access-anywhere VPNs, FileCloud enables automated and routine backups, as well as selective sync, to ensure the right data is retained while supporting operational efficiency.
- Audit Capabilities: FileCloud’s comprehensive audit logs capture detailed information about file and user activity, including IP address, username, and user action. Combined with custom reports, SIEM integration, and other monitoring options, admins can identify unauthorized access and data leakages to take prompt, decisive action.