ShareFile User Management powered by AppSense

Synchronization and secure file migration

It offers users simple and secure access to their files from any device.

Bringing new added value to your existing storage environment. Our solution guarantees:

  • That IT has complete control over where files are stored. Our solution integrates with the client's existing file servers and document systems, such as: SharePoint.


  • Let users have the same simple, ubiquitous file access experience they expect, without the risks of a cloud storage service.


  • That existing access controls are applied while adding an extensive collection of additional policies and auditing capabilities for IT. Thus increasing the security of corporate data.


  • May a complete and fully personalized workspace accompany users from wherever they access.

Simple and convenient for users


Users simply crave simplicity and reliability. Our solution brings this to your existing storage through:

  • Native and intuitive user experience.

  • End-to-end security that doesn't force users to skip corporate security.


  • Ultra-reliable with fast file synchronization.


  • There is no need to migrate data or change existing workflows.


  • Full file synchronization coverage, including Outlook PST files.

Works with existing storage

The point at issue is not about selling more storage in the data center or in the cloud. It's about making what you have easier and safer to use in multi-device work environments.

  • Integrating with your existing Active Directory environment to establish user data access rights.


  • Offering users a simple, unified method of accessing directories, file shares, Microsoft SharePoint and Windows, Mac, iOS, Android and the Web WebDAV servers.

Developed to meet security requirements

Simplicity for users does not come at the expense of information security. Ready security measures include:


  • Total awareness and execution of native security controls.

  • 256-bit AES encryption of data in transit.

  • Encryption at rest on untrusted mobile devices.

  • An extensive collection of data access policy enforcement controls.

  • Extensive log auditing capabilities that are fully compatible with third-party analysis tools.