Novell Filr Secures Mobile File Sharing for the Enterprise
The launch represents an addition to Novell’s mobility portfolio and a response to enterprise demand for secure mobile file access and sharing.Enterprise software provider Novell announced the release of Filr, a file-sharing platform designed to provide anywhere, any-device access to corporate files, while giving IT complete control of all their shared files. Filr mobilizes the files users have already created, where they’re already stored, without the security or compliance risks that come with storing files in a cloud controlled by a third party. The platform leverages an organization’s existing on-premise infrastructure, eliminating the need to manage third-party services, rebuild access controls or regulate the use of unapproved file-sharing applications. The launch represents the newest addition to Novell’s fast-growing mobility portfolio and a response to enterprise demand for secure mobile file access and sharing. Unlike consumer-oriented and cloud-based file-sharing solutions such as Dropbox, Skydrive or Google Drive, it is built specifically for the enterprise. The platform is designed for bring-your-own-device (BYOD) environments to enhance mobile productivity, while keeping files on the corporate server with their access rights, quotas, backup systems, firewalls, disaster recovery protocols and existing policies intact. Cross-platform integration enables businesses to leverage existing investments, including NetIQ eDirectory and Microsoft Active Directory.
"With our 30-year legacy in file and networking services and our commitment to providing security-focused solutions that drive workplace productivity, we are changing the game with Filr–a true enterprise-quality solution for mobile file access and sharing," Bob Flynn, Novell president and general manager, said in a statement. "Unlike any other file-sharing solution on the market today, Filr provides the access and collaboration capabilities to keep employees happy and productive, while meeting IT’s need for enhanced security, compliance and the ability to leverage established policies and protocols."