When asked about competitive services from Dropbox, Mozy, and Carbonite, Trend stressed that the real competition is that most individuals or small businesses do nothing to backup their data at all.
While Trend is a leader in data protection and online security there are some concerns with using an in-the-cloud file storage service. First is the level of authentication used. A simple username and password, as used by Humyo, is not good enough. If a hacker guesses your password they can steal all of your data. The other concern is that your data is stored in clear text in the cloud where administrators and law enforcement can access it. Humyo assured me that they have strict controls in place to prevent unauthorized access to your data from their own support staff. Their physical location in the UK makes it less likely that US law enforcement would be accessing your information thanks to jurisdictional frictions.
Trend has an opportunity to combine some of the secure cloud projects they have with the Humyo offering to provide a service that is even more secure than most small businesses have internally.
In the meantime, I am signing up for Humyo myself. I hope to use it in place of Flickr for storing photos and sharing them with friends. I will also use it for large file transfer and collaboration.
Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more
For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more
In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more
With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more