Accellion unveils kiteworks mobile solution
Accellion has introduced kiteworks, which the company describes as a mobile-first solution featuring a new user experience and three-tier architecture designed to enable people to work and share files securely wherever. The company says its new mobile design offers integrated productivity and universal access to enterprise content stores, making it possible for organizations to realize the productivity gains from a mobile workforce without introducing data security risks.
Accellion says kiteworks enhances its offerings in three main ways:
Mobile-first UX. The user’s experience is seamless across all devices from smart phone to tablet to laptop to desktop--even the admin functionality is available on the smallest mobile devices. The new UX is icon-based with the mobile user in mind, and includes features such as the kiteworks Move Tray, which streamlines the way people share files via mobile devices. The Move Tray enables users to easily and securely share files from different content stores with internal and external users. Other productivity-enhancing features include an integrated set of productivity tools for creating, editing and annotating Microsoft Office documents on mobile devices, features for file-centric collaboration and the assignment and management of file-based tasks.
Secure connectivity to ECM systems. With kiteworks mobile, users have universal access to enterprise content stores including secure, native integration with two new ECM systems--Documentum and SharePoint Online--in addition to file shares previously supported, including Microsoft SharePoint 2007, 2010 and 2013 as well as Windows File Shares.
Three-tier architecture. Accellion says it has introduced the industry’s first three-tier architecture for private cloud file sharing and collaboration with separate Web, application and data layers for defense in depth, scalability and flexibility. The separate layers offer new deployment options for enhanced security, such as putting the Web layer in the DMZ for external users, while keeping the application and data layers behind the firewall to reduce the risk of data breaches. Organizations concerned with data sovereignty, can specify where data is stored based on user geography, access rights or content type.