Because Work Doesn't Always Happen In the Office
Your organization's network storage might be mounted locally, but that doesn't mean you are. Having network access to download and share files while working remotely, is essential.
Aurora can be accessed on any computer, tablet, or mobile device. A sleek and updated browser interface gives individuals all the same file usage capabilities as when working locally, eliminating the need for IT assistance.
Always Be Connected
Don't waste time dowloading files from the cloud,
or waiting to have them emailed to you again.
Accessing documents directly from your local storage network eliminates file size limits and empowers users to maintain an environment for group collaboration.
Know Your Files Are Secure
The same access rights defined by your Windows Active Directory
are applied to Aurora, keeping everything secure.
Because files are never removed from your network or their original folder, all defined access and permission rights govern their security.
User Defined Access
An Aurora user's unique identity is matched to their approved storage areas after establishing Microsoft AD authentication.
System Administrators can quickly establish which group shares are accessible to individual users through the Web management interface.
Aurora 2.0 In Action
Get a look at the internal user experience.
For external folder sharing.
Empower Your Users
Aurora .Ext gives internal users the ability to collaborate more effectively with those outside their organization, without compromising security and without IT intervention.
Watch the video to learn more >>
See How It Works
Never Be Disconnected Again
Just fill out a request and let's schedule a complimentary demo!Get Trial
Mobile devices can make use of the web interface and documents will be accessed and viewed using that mechanism.
All file system access is performed using the identity of the logged in user (there is no proxy account). Therefore, users are limited to accessing only files and folders that the specific user has the appropriate rights to access. Moreover, for added security, Aurora verifies that all file system operations fall within the bounds of the provisioned paths for the user. What this means is that it is impossible for a malicious user to craft a Web request to access a file system location outside of what is being displayed in Aurora.
Aurora is configured to always use TLS/SSL so that traffic is encrypted between the users and the server.
The product installer generates a self-signed certificate for Aurora, but the organization’s network administrator is responsible for importing the organization’s own certificate provided from the vendor of their choice (Verisign, Thaute, etc). For documentation on how to import a certificate, see http://technet.microsoft.com/en-us/library/cc732785%28v=ws.10%29.aspx
Regarding Microsoft IIS security, the network administrator is responsible for following IIS security best practices.