Access Your Network Storage From Anywhere.

Special offer for COVID-19 Crisis

Remote access to critical data on your network file shares while working from home

COVID-19 Details

You are still on the front line for your organization. We’re here to help.

The Offer

During the months of August and September 2020, Condrey Corporation is extending the trail period of its Aurora product to 90 days. The trial software is fully functional and provides secure remote access for an unlimited number of users in an organization at no charge. 

Aurora is very simple to install and configure. However, we are here to help you. Condrey Corporation support technicians can provide installation and deployment assistance to trial software customers at no charge. Assistance will be provided on a scheduled first-come, first-serve basis.

This is an incredible offer providing you the ability to provide your users secure remote access to files stored on your network, without the need for VPN. 

The Details

Condrey Customers

New Acquaintances


You may have received an email from us about Aurora and our offer to help you.

If you do not currently license Aurora, our offer is for your organization to receive a 90-day full-featured product license at no charge during August and September 2020. Additionally, Condrey Corporation can provide installation and deployment help from our Support organization at no charge.

If you do currently license Aurora but need some extra licenses during this time, we will offer additional licenses at no charge as well for 90 days.

If you have licensed our Condrey or Micro Focus-branded software at any point in the past, we still consider you our customers!

Reach out to us by clicking on the “Get the Software” button below. We will provide additional details and get things set up for you.

We are glad that you are here and we stand ready to help you as well.

Our offer to you is to enable you to use Aurora for an unlimited number of users for 90 days and if needed, provide you installation and deployment support – all at no charge.

Click the “Get the Software” button below and we will provide details and get licenses and the software to you. 

Current partners should have received a communication from us.

As always, we stand with you to help the organizations that you serve.  Reach out to us via your contact or just click the “Get the Software” button below.

If you are not a current partner, that’s ok! Just reach out to us by following the link on this page and we will help.

*This offer ends September 30.


Get the software

A simple, lightweight solution for remote access to network file shares.

Users log in using their AD credentials and are provided simple, secure access to their files on the network. The interface is built to look and act like Windows so it's intuitive with little or no training required. Any modern browser on most any OS is supported.

You can have Aurora up and running in 30 minutes for your network and your users. Our support team can help as needed.

Learn More!

This is Aurora

What it looks like

How people use it

How you install it

Here are the details

Remote, Web-based Access to Windows Folders

Have access to user and group share folders from remote, web-based locations.

Robust, Permission-Based File Access

Create folders, upload/download multiple folders and files at once, rename, delete, copy and paste files and folders, along with search and filter options.

Automatically Mounted Storage

No need for login scripts, Aurora automatically mounts all storage without them once a user has authenticated access.

User Defined Access

When users log in to Aurora, their unique identity is matched to their approved storage areas by establishing Microsoft Active Directory authentication. 

Move Beyond Email and FTP

Remove file size limitations and ensure data security by accessing and sharing files directly from your network storage. 

External User File Sharing

Securely share files with users outside your network, through an authenticated web-based guest access portal. 

Maintained Security

Because files from your network don't have to be duplicated or removed from their original folder for access and sharing, all permissions defined by IT continue to govern their security. 

Archived Data Access

Aurora can complete your File Analysis solution by providing end-user web access to archived data that has been vaulted by Senergy to a local or cloud storage gateway appliance. 

Admin Control

System administrators can quickly establish which group shares are accessible to individual users through Aurora's intuitive web-management interface. 


Does Aurora support mobile devices?

Mobile devices can make use of the web interface and documents will be accessed and viewed using that mechanism. 

Can you explain the security built into Aurora?

All file system access is performed using the identity of the logged in user (there is no proxy account). Therefore, users are limited to accessing only files and folders that the specific user has the appropriate rights to access. Moreover, for added security, Aurora verifies that all file system operations fall within the bounds of the provisioned paths for the user. What this means is that it is impossible for a malicious user to craft a Web request to access a file system location outside of what is being displayed in Aurora.

Aurora is configured to always use TLS/SSL so that traffic is encrypted between the users and the server.

The product installer generates a self-signed certificate for Aurora, but the organization’s network administrator is responsible for importing the organization’s own certificate provided from the vendor of their choice (Verisign, Thaute, etc). For documentation on how to import a certificate, see

Regarding Microsoft IIS security, the network administrator is responsible for following IIS security best practices.

Aurora .Ext

Securely share folders outside of your organization. 

Empower Your Users 

Aurora .Ext gives internal users the ability to collaborate more effectively with those outside their organization, without compromising security and without IT intervention. 


Watch the video to learn more >>

See How It Works