Useful information about TeamDrive, data exchange and data storage

Our knowledge area is your central contact point for answers to your questions about the TeamDrive product, but also knowledge in the areas of data transfer and data storage.

Discover interesting information on the topics of Cloud Computing, Backup, GDPR/ePrivacy, GOBD, Encryption, Ransomware and Security by Design.

Also take a look at product comparisons between TeamDrive Professional and similar solutions from competitors.

In our FAQ area as well as in our video tutorials we address questions about functionality, downloading and installation , billing and more, but they also offer you help with problems with the operation of TeamDrive.

Knowledge of the TeamDrive Cloud solution

Video tutorials

In our tutorial videos we cover questions about downloading, installing and operating TeamDrive Professional.

Let the topics be explained clearly and easily to understand in the video.

Continue reading
TeamDrive FAQ

In our FAQ section we cover questions about functionality, download and installation, accounts, billing and more.

Find answers about the operation of TeamDrive Professional here.

Continue reading
Comparison with TeamDrive

There is almost always competition. And of course we are not alone on the market with our software solution. Several Sync&Share solutions offer comparable performance features.

However, TeamDrive is often clearly ahead, especially when it comes to security-related topics, audit security, GoBD conformity and certifications, but also when it comes to service and personal support. All aspects that should be important and decisive for you.

Continue reading

Knowledge in the areas of data transfer and data storage

Cloud Computing

In the beginning, cloud computing was primarily understood to mean the provision of storage volumes via central data centers. Instead of buying storage, you could rent storage flexibly and as needed.

This continues to happen today in varying degrees, but the offering has been expanded to include numerous other interesting services from cloud providers.

Backup

A backup is a backup copy of data that can be used to restore data if the original data is damaged, deleted or encrypted.

In the best case scenario, a backup should be stored in a different location than the original data itself - ideally in a cloud. You can find out why this is the case and what this has to do with ransomware attacks here.

GDPR, ePrivacy

With the introduction of the General Data Protection Regulation, DSGVO for short, extended requirements came into effect, especially with regard to personal data protection - including sensitive sanctions for violations of the law.

Read here what effects the GDPR has on you and your company.

The ePrivacy Regulation, which is still a work in progress at the moment, will also be discussed, but will in future formulate binding data protection rules that will apply within the EU.

GoBD

According to the Principles of Proper Accounting (GoBD), data and documents that are to be recognized by the tax authorities for tax evidence must be handled in a special way.

We will explain to you the most important facts about archiving and storing electronic documents.

Encryption

In the digital age, data protection and data security play an outstanding role.

To ensure that electronic data cannot be viewed by third parties and to prevent data misuse, it must be encrypted. This applies both to their storage and, above all, to their transport via the public Internet.

You can get deeper insights into the topic of encryption here.

Ransomware

Ransomware attacks have increased significantly in recent years. After a successful attack, all data on your computer is encrypted. From this moment on you no longer have any access options. The economic damage to companies is often enormous.

Find out here how you can protect yourself against digital blackmail.

Security by Design

Especially with software that is intended to protect your users' data from unauthorized access by third parties, software and data security must be taken into account and integrated into the entire software life cycle.

You can find out why this is very important and how you as a user benefit from it here.