Security Architecture

Smoke and mirrors might be good for magic shows, but not for cloud security.

CloudFileSync Architecture Overview

How can CloudFileSync deliver all this functionality without breaching data sovereignty laws or industry compliances?

All CloudFileSync communications can be divided into two channels,
the control channel and the data channel.

The control channel is where we handle all communication of who is authorized to access what data and other resources. These communications are directly between CloudFileSync and the servers and clients connected to the service. An example of this would be a new drive being added to a storage server, and access to that drive being granted to users. The storage servers would be instructed to set up the drive and grant access to the authorized users, and the clients of the authorized users would be told information about the drive, such as how to access it and what credentials to present.

The data channel is where all communication between storage servers and clients happens. This is usually the transfer of files as synced between clients, but also includes setting up sharing links, accessing files via the file explorer and so forth. As the data layer only connects storage servers to authorized users directly without sending files via CloudFileSync servers, you can sync and share files directly with other users and third parties without trusting the files to CloudFileSync for handling.

How to get CloudFileSync
for your business

CloudFileSync is available onlys through approved IT Resellers. Ask your existing IT service provider if they are a CloudFileSync reseller or contact us to find a reseller located near you.

Find a Reseller

About CloudFileSync

CloudFileSync was founded to help businesses improve their productivity by making it easier for staff to securely access and share files and to collaborate on documents using any device.

Based in Melbourne, Australia our team builds innovative security and File Sync and Share technologies that empower businesses to choose, and to have full visibility over, where their data is stored, who has access to this data and who can share this data.