244 Copyright © Acronis International GmbH, 2002-2015
Improvements to desktop syncing when Microsoft Office files are edited directly in the activEcho
Folder.
Various bug fixes in desktop syncing.
Bug fixes in activEcho server installer to fix future upgrades.
activEcho 2.0.1 (Released: March 2012)
BUG FIXES:
Improvements to the server administration user experience.
Various bug fixes in desktop syncing.
Improvements to the client installer upgrade process.
activEcho 2.0.0 (Released: February 2012)
Initial release
8.3.2 mobilEcho
Acronis Access Server 6.0
The mobilEcho and activEcho products have been combined into a single new product called Acronis
Access Server. This changes the branding and product names in the mobile and desktop clients as
well as the web application. Acronis Access Server 6.0 can be installed as an upgrade to mobilEcho
and/or activEcho and existing licenses will continue to work. Customers are entitled to exchange
their existing mobilEcho and/or activEcho license(s) for a new Acronis Access license that will enable
the full functionality of the combined product. To request this upgrade, please submit this web form.
For the latest information, please visit the What' New in Acronis Access Server (p. 214) article.
mobilEcho 5.1.0
ENHANCEMENTS
Users with mobilEcho 5.1 or later on iOS can now create their data sources directly from the
application to access any file share or SharePoint location. Users enter UNC paths or SharePoint
URLs from the client. New policy settings have been introduced on the management server to
control whether clients are allowed to create these data sources, and which Gateway Servers are
used for these requests.
Multiple Gateway Servers can now share a common configuration via a Cluster Group. Changes
to the settings and policies assigned to the Cluster Group are automatically pushed to all
members of the Group. This will typically be used when multiple Gateway Servers are placed
behind a load balancer for high availability.
Gateway Servers now support authentication using Kerberos. This can be used to in scenarios
using Kerberos Constrained Delegation to authenticate mobilEcho iOS clients through a reverse
proxy using client certificates. It also can be used to authenticate mobile devices with client