MokaFive Adds Encrypted Cloud Sync to its Popular Desktop and Mobile Solutions

VMworld 2012, Moscone Center, San Francisco (Booth 537) -- 08/27/12
Back To Press & Events

Company to showcase new functionality at VMworld 2012

MokaFive™, whose products provide a secure computing experience from any device, today announced it will be demonstrating a new product capability, Trickleback with cloud sync, at this week’s VMworld 2012 Conference in San Francisco. Trickleback with cloud sync leverages commercial cloud-storage providers, such as Amazon S3, to provide MokaFive users with secure, encrypted synchronization of data across all of their computers and mobile devices.

Trickleback with cloud sync works with both MokaFive Suite and MokaFive for iOS.

“Our customers are telling us that they want to use cloud storage but that they have been dissatisfied with the security of data in the public cloud,” said John Whaley, CTO of MokaFive. “With the addition of Trickleback with cloud sync, we are making it easier than ever for companies to keep their data safe… not only inside MokaFive’s encrypted data container on the endpoint device, but even while it is being stored or synced up to or retrieved from a commercial cloud-storage provider.”

Continuous innovation driving market traction

MokaFive has been gaining rapid market momentum with each new release of its software. The company’s fast-paced innovation and addition of new features—including Trickleback with cloud sync and recent iOS product—has driven the company’s sales to record highs. Following its late April release, the company’s new MokaFive for iOS was quickly adopted by a large number of firms concerned about mitigating the security risks posed by employee-owned personal devices in enterprise environments.

MokaFive Suite and MokaFive for iOS unite work and personal computing on both computers and mobile devices, keeping corporate data encapsulated and secure, even if a device is lost or stolen. It is the only solution that enables corporate IT administrators to manage and secure every computer, tablet, and smart phone in the enterprise from a single console.

Share On Twitter Linkedin