Check Out
Aurora 2
Expand your collaboration capabilities with remote web access to your local network storage and secure file sharing with external users.
Start Trial Schedule DemoWhat's New in Version 2
AURORA 2.1 AVAILABLE NOW
Expanded capabilities for enhanced file sharing and network storage access.
YOUR ORGANIZATION'S NETWORK STORAGE MIGHT BE MOUNTED LOCALLY, BUT THAT DOESN'T MEAN YOU ARE.
Don't waste time downloading files from the cloud, or waiting to have them emailed to you again. Access documents directly from your local storage network, eliminate file size limits, and empower users to maintain an environment for group collaboration.
User Defined Access
Your users have network storage areas within which they can navigate, access and store the file data they need, as defined by Active Directory authentication. This secure process for user-defined access is directly translated to Aurora, where each user's unique identity is matched to their existing, approved storage areas through the same Microsoft AD authentication.
Maintained Security
Duplicate copies of circulated files can begin to lessen the integrity of the data. There is no way to ensure the information is most up-to-date, and the security of the file can become compromised. This can lead to files becoming stale and orphaned, being storage in disperate locations, and resulting in expensive data glut.
Admin Control
File security is never in question and group collaboration can be seamlessly maintained with Aurora's IT management interface. User-defined access to designated shares can be easily managed by system administrators, and users are never kept from their necessary files.
Archived Data Access
Vaulting data is an essential part of an efficient and compliant file management solution, however retrieving this data when necessary can be a difficult task. Aurora provides an easy and reliable platform for access and management of your archived data, while providing an audit log of all end-user access to files.
When paired with our Senergy and Galileo products, Aurora completes our File Analysis solution. Use Aurora to access archived data vaulted by Senergy and dark data that has been discovered by Galileo to achieve effective data management.
Aurora .Ext
For external folder sharing.
Empower Your Users
Aurora .Ext gives internal users the ability to collaborate more effectively with those outside their organization, without compromising security and without IT intervention.
Watch the video to learn more >>
See How It Works
Our Products Come with 5 Star Technical Support
100% Customer Satisfaction rating for 12 months in a row.
Aurora 2.0 In Action
Get a look at the internal user experience.
Features
Aurora 2.0
Never Be Disconnected Again
Just fill out a request and let's schedule a complimentary demo!
Get TrialFAQ
Does Aurora support mobile devices?
Mobile devices can make use of the web interface and documents will be accessed and viewed using that mechanism.
Can you explain the security built into Aurora?
All file system access is performed using the identity of the logged in user (there is no proxy account). Therefore, users are limited to accessing only files and folders that the specific user has the appropriate rights to access. Moreover, for added security, Aurora verifies that all file system operations fall within the bounds of the provisioned paths for the user. What this means is that it is impossible for a malicious user to craft a Web request to access a file system location outside of what is being displayed in Aurora.
Aurora is configured to always use TLS/SSL so that traffic is encrypted between the users and the server.
The product installer generates a self-signed certificate for Aurora, but the organization’s network administrator is responsible for importing the organization’s own certificate provided from the vendor of their choice (Verisign, Thaute, etc). For documentation on how to import a certificate, see http://technet.microsoft.com/en-us/library/cc732785%28v=ws.10%29.aspx
Regarding Microsoft IIS security, the network administrator is responsible for following IIS security best practices.