A good means of file sharing for teleworkers, enabling them to collaborate on essential files and folders securely.
Although well written, the documentation is a 174-page PDF, which means considerable printing.
Whether used at the enterprise level or between several remote workers for file collaboration, Magi Enterprise fulfills a role in the secure exchange of data across the internet.
Either as a closed environment or as a service, Endeavors Technology's Magi Enterprise is a peer-to-peer security solution ideal for end users who have little or no experience with installing security solutions, but who are charged with telecommuting on a regular basis. From the administrator's viewpoint, removing any end-user problems can make the whole job of securing the data flow far easier.
This product allows the user, via a web page, to control the data that they want to share and also allows them to see who they are sharing it with. It promotes a simple way for teleworkers to combine their efforts on projects that would otherwise need them to be office based. This encourages secure collaboration and file sharing within a controlled environment.
Installation of Magi Enterprise on the user's machine is simple enough. Following the on-screen prompts the user only has to register and add to their Buddy Lists. Groups for sharing certain levels of data can be set up and controlled; it requires little knowledge of IT. Information sharing is simplified for the user, who user can see at a glance which Buddy is online at any given time. SSL is used to secure transmissions and navigation is extremely user friendly.
Used as a service this can bring a number of users together to collaborate on essential work. Where a totally enclosed environment is required there is another software bundle available to achieve this, but we did not test this. This extra dimension of Magi Enterprise called 'services' is installed on a company server and handles authentication, presence, dynamic IP addressing, search and connection brokering, according to Endeavors.
The emphasis for us was on the teleworker achieving sustainable resources for the delivery of work in a secure environment without necessarily involving the enterprise administrator in the installation of additional network-side software or hardware solutions. What the solution does not do is provide AV, IDS, VPN and firewall capabilities, which must be delivered using another solution.