Aurora 2.0

Now Available

Expand your collaboration capabilities with remote web access to your local network storage, and secure file sharing with external users. 

Get It Here

Aurora

Always Be Connected

Because Work Doesn't Always Happen In the Office

Your organization's network storage might be mounted locally, but that doesn't mean you are. Having network access to download and share files while working remotely, is essential. 

Aurora can be accessed on any computer, tablet, or mobile device. A sleek and updated browser interface gives individuals all the same file usage capabilities as when working locally, eliminating the need for IT assistance.

Always Be Connected

Don't waste time dowloading files from the cloud,

or waiting to have them emailed to you again. 

Accessing documents directly from your local storage network eliminates file size limits and empowers users to maintain an environment for group collaboration. 

Know Your Files Are Secure

The same access rights defined by your Windows Active Directory

are applied to Aurora, keeping everything secure.  

Centralized Management 

Because files are never removed from your network or their original folder, all defined access and permission rights govern their security. 

User Defined Access

An Aurora user's unique identity is matched to their approved storage areas after establishing Microsoft AD authentication. 

Admin Control 

System Administrators can quickly establish which group shares are accessible to individual users through the Web management interface.

Aurora 2.0 In Action

Get a look at the internal user experience. 

Aurora .Ext

For external folder sharing. 

Empower Your Users 

Aurora .Ext gives internal users the ability to collaborate more effectively with those outside their organization, without compromising security and without IT intervention. 

 

Watch the video to learn more >>

See How It Works 

Features

Remote, Web-based Access to Windows Folders

Have access to user and group share folders from remote, web-based locations.

Automatically Mounts Storage

No need for login scripts, Aurora automatically mounts all storage without them once a user has authenticated access.

Easy-to-Use, Intuitive Interface

Web browser based management interface

Eliminate the Need for Email Attachments

This soon-to-be released module will provide file sharing capabilities that allow providers to grant intended customers access to files or entire folders on the network. Administrators will manage policies and rules for access both in and outside of the organization.

Robust, Permission-Based File Access

Create folders, upload/download multiple folders and files at once, rename, delete, copy and paste files and folders, along with search and filter options.

External User File Sharing

Securely share local files with users outside your network, through an intuitive web-based access portal.

Aurora 2.0

Never Be Disconnected Again

Just fill out a request and let's schedule a complimentary demo!

Get Trial

FAQ

Does Aurora support mobile devices?

Mobile devices can make use of the web interface and documents will be accessed and viewed using that mechanism. 

Can you explain the security built into Aurora?

All file system access is performed using the identity of the logged in user (there is no proxy account). Therefore, users are limited to accessing only files and folders that the specific user has the appropriate rights to access. Moreover, for added security, Aurora verifies that all file system operations fall within the bounds of the provisioned paths for the user. What this means is that it is impossible for a malicious user to craft a Web request to access a file system location outside of what is being displayed in Aurora.

Aurora is configured to always use TLS/SSL so that traffic is encrypted between the users and the server.

The product installer generates a self-signed certificate for Aurora, but the organization’s network administrator is responsible for importing the organization’s own certificate provided from the vendor of their choice (Verisign, Thaute, etc). For documentation on how to import a certificate, see http://technet.microsoft.com/en-us/library/cc732785%28v=ws.10%29.aspx

Regarding Microsoft IIS security, the network administrator is responsible for following IIS security best practices.