Share large files securely and without delay

August 2024 Infrastructure, Products & Solutions


Rudi Jansen van Vuuren

Files connect people and their professional input. But most collaborative file-storage services are complicated, expensive, or lack enough security features – all ill-suited for digital workflows.

Different responsibilities often converge through files: a spreadsheet between logistic teams, a CAD file between architects and builders, video footage shared between camera crews and editors, design layouts between marketing leads and their designers, or security footage between digital cameras and security teams.

Yet, sharing files, particularly large ones, creates several problems and risks. Uploading a large file takes time, which delays turnaround by hours. There are headaches, such as version control and ensuring only the right people have access at the right time.

Running costs are another common concern: teams either pay handsomely for a storage system, or they consider it a luxury and try to make things work by cobbling together different solutions. That approach includes many risks, yet still doesn't deliver on features such as file streaming and encrypted transfers.

Overall, collaboratively sharing files has many barriers, which prompted StorVault to develop FileSpace.

"Many people use file sharing platforms that are often insecure, lack good access controls, or charge different fees for access and moving data," said Rudi Jansen van Vuuren, StorVault South Africa's General Manager. "We designed FileSpace as an alternative to the local office file server or using other online storage spaces, giving more control and speed to our customers so they can share their important files on their terms and schedules."

StorVault's FileSpace is an agent-secured service that extends FileSpace's secure cloud storage into local storage. FileSpace stores files in the cloud and streams that data to authorised recipients. It delivers the content quickly onto recipients' local shares so they can start to access those files without waiting for the entire package to download. Every authorised person can access the relevant files on their local instance, controlled by granular access permissions and managed through a central dashboard.

To ensure value and lower costs, FileSpace charges only for storage—there are no surprises such as egress/date movement fees or additional payments for every added user. Some features include:

• No need for file servers or VPNs: Files are uploaded via a locally installed agent that encrypts the data.

• Fully cloud-native: FileSpace needs only a software agent on user machines; everything else is kept in secure cloud storage.

• Local device access: The agent software turns FileSpace's cloud storage into a local device for convenient access.

• Complete access control: Uploaders can set access permissions for files, including access, editing, and copying.

• Secure and encrypted: FileSpace adheres to numerous security and file handling standards, such as ISO 27001.

• Licensed per terabyte: No charges for data egress, number of users, or installed agents.

• Flexible: Depending on a customer's needs, FileSpace can use different cloud infrastructure to accommodate very large files or lower-cost at-scale storage.

• Backups: The FileSpace service creates regular backup snapshots, which users can recover using the self-service platform.

• Developed for SA: Powered by LucidLink, FileSpace is designed for the South African market, and backed by local experts and support teams.

• Multi-platform: Support for Windows, MacOS, and Linux.

• Self-service control: A dashboard provides complete centralised administration and file management.

For more information, go to https://www.storvault.co.za/filespace-2/




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
Workforce management automation for Transguard
IoT & Automation Products & Solutions
Invixium and RTLS-connected worker solutions have been selected to supply 400 rugged biometric solution, IXM TITAN, for time tracking at work sites for Transguard Group, a subsidiary of Emirates Group.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Guarding data privacy
Suprema Access Control & Identity Management Products & Solutions
Suprema’s BioEntry W3 is designed with data privacy as a top priority, addressing concerns through its display-free design and highly secure ‘Template on Mobile’ (ToM) authentication, making data privacy a top priority.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...