Sync illustration

Synchronization

Within everbase your data is synchronized directly between your devices on your local network or internet. Neither everbase nor third parties have access to your data. [more]

Security illustration

Security

End-to-end encryption allows secure transmission and storage of your data. Data is encrypted in-transit and when stored locally on your device. [more]

Control illustration

Control

The administration controls and permissions system allow assigning permissions to users for their respective directories and individual files. [more]

Consistency illustration

Consistency

File, folder or permission conflicts created by parallel edits are recognized within everbase and can easily be resolved. [more]

Domain illustration

Everbase

Everbase is a network of users and devices authorized and administrated by you.

Synchronize your data solely with your devices or use everbase hosted infrastructure with 100% privacy.

Everbase works as a virtual drive in your operating system, allowing you to edit, save and navigate your files the way you’re used to.

Sync illustration

Synchronization

Within everbase all data is synced between all authorized devices using available networks, incl. the internet.

Data transfer is done by an integrated distributed VPN. The setup only takes a few clicks and you can use devices such as laptops or desktops as your server.

Devices within a local network identify themselves automatically. For connections via the internet, use your IP address or DNS address.

Neither everbase nor anybody else has access to your domain or data. Everbase provides you with the necessary software and would be glad to help with any questions you might have.

Security illustration

Security

With a real end-to-end encryption, you benefit from a secure transmission and secure local storage.

Everbase uses RSA 4096 and AES 256 as encryption methods. This hybrid way of encryption fulfills the needs of enterprises as well as governmental organizations. Only authorized users have access to the keys.

Additionally, communication and content is encrypted with an elliptic curve cryptography scheme.

The security is enhanced with local encryption on all devices. Even in case of a hardware loss or theft your data is safe against unauthorized access.

Control illustration

Control

With the user permission management you can grant user, folder and file specific access rights with just a few clicks.

Just create several users and assign devices accordingly. Each user has individual read/write permissions for the files synchronized with everbase.

Access rights and domain structure can be changed as needed.

Permission management and access rights are also encrypted.

Consistency illustration

Consistency

Conflicts that occur by working on files or folders in parallel are detected automatically, and appropriate conflict resolution methods are suggested.

You can work with your files and folders while you are offline. Once you’re online again, everbase checks whether there are any conflicts occurring from edits made by other users.

These conflicts are automatically detected. You can choose which file version is to be kept or whether different versions are saved.

Imprint

EVB Everbase GmbH
Am Kaiserkai 10
20457 Hamburg
Germany
+49 40 609 450 8-0

Managing Director: Ulrich Dreyer
Registered Court: HRB 146618, Local Court Hamburg
VAT-ID.: DE 285 309 525

Responsible according to press law: Ulrich Dreyer
c/o
EVB Everbase GmbH
Am Kaiserkai 10
20457 Hamburg
Germany

Copyright photos: Fotolia, Shutterstock

General Terms and Conditions Companies / Customers
Privacy Policy
Instructions on Withdrawal / Model Withdrawal Form