Hello, everyone. My name is Phillip. I'm the founder and CEO of Synology
and welcome to Synology 2022. It's a great honor to be able to engage
with all of you, even virtually. I founded Synology over 20 years ago
when I had one simple idea to build a NAS that anyone could use. To store and share their data,
anytime and anywhere. At that time when I shared the idea to friend, they laughed at it and they said finding a PC and installing Linux
would do the job. Why bother? It was a frustrating moment,
and it took me a few years to show that a purpose-built Synology NAS
can be a lot more effective in managing our ever growing data. Over the past few years,
we have sold millions of Synology NAS. One reporter asked me: "What is so special
about Synology and Synology NAS?" "What is your secret sauce to success?" Long story short, I will say it is because
we invest heavily into innovations. From QuickConnect, Cloud Station,
Synology Drive, and Snapshot Replication and many more,
such as our Active Backup suite. It is created because
we wanted to provide you a complete backup and restore tool
that is pain free and license free. And we are always introducing
new capabilities such as our newly released
Hybrid Share service, connecting remote teams
and sites together. We are helping businesses
remove data silos. These are only a few examples
of how we build the solution, hide the complexity,
and make them easy and accessible. I am very thankful and proud
that we have invested so much into creating a strong team
and a do it ourselves culture so that we can develop
a solid ecosystem piece by piece, from good to great, and in the future, one of the best. Please join me as we take you
through our latest innovations. Thank you and let us begin. Hello, I'm Mike.
It's great to be here talking about the solutions
that we have worked so hard on. Now, everyone knows 2020 and 2021
were both exceptionally challenging years. It was no different for Synology. The world has changed
with the shifts in workplace habits that,
like it or not, are here to stay. Throughout this, we delivered
our largest software update yet. DSM 7.0, just a few months ago. Underneath the 7.0 release
is the cumulative efforts of all our teams, focusing on three main pillars
that define our products. Performance,
reliability, and security. We don't see 7.0
as just the newest or latest release, but a huge achievement
in terms of everything below the surface. Let's just look
at a few performance metrics. Searching over SMB connection is
over 56 times faster than before. The time needed to launch applications
has been reduced by up to 70 percent, and straight up boosted
RAID 6 array performance by up to 80 percent. There are still many more performance
improvements that all ultimately contribute to a better,
more responsive user experience. Now, what good is all that performance
if the system doesn't stay operational? As any good system administrator
would let you know, proper maintenance with the procedures
to do so, are extremely important in maintaining availability
and minimizing possible downtime. In DSM 7.0, we introduced
several storage maintenance features that did just that. Starting with the new drive replacement
features that did not degrade the system. We added a new option
to enable automatic drive swap and repair. And finally, a new array rebuild option
that only processes parts of the drive with data stored on it,
massively increasing the efficiency for certain deployments. And we also completely overhauled
our Synology High Availability clusters. It is not only much faster
in failovers or switchovers, but we also reduced the time
needed for system upgrades, and therefore the amount of downtime
needed by up to 80 percent. In terms of system and data security, we've been focusing on this
for many years already. DSM 7.0 is one of the first releases
that truly represents security by design. It is much more
than just a software stack. Even before development
begins, we've implemented new tracking and auditing procedures
to ensure proper source code control, in particular with open source projects. We've also restructured
the way system services and packages work on DSM,
minimizing potential attack vectors by reducing and limiting privileges. And a large amount of work went
into modernizing the protocols used for authentication,
encryption, and more, such as our new Secure SignIn app:
FIDO2 and U2F support for DSM. Our focus on security
doesn't end with development, either. Synology's Bounty Program
has been running for several years, attracting hundreds of researchers. All of these only make up part
of the picture for 7.0, and based on what we've seen,
it's one of the fastest adopted DSM releases yet. That brings us to what's coming next. What is the next big thing
for Synology and DSM? Our next update
to the platform is 7.1. While it is obviously not as massive,
it is needless to say, going to focus on improving several highly requested areas
for our customers. First, large-scale management. It's important
to provide clear statuses for each device. Even more importantly,
all devices at once. We introduced Active Insight
with DSM 7.0, our cloud-powered system status
and monitoring solution. In 7.1, we're making it much more
powerful with expanded information about system updates and the option
to batch deploy them across sites. This makes it simpler
to manage larger installations, which helps ensure
more devices receive the latest security updates and features. We're also integrating
smarter authentication systems to detect potentially suspicious attempts. Based on usage patterns, Active Insight
is able to notify admins if something doesn't look right, such as unusual login
locations and times, when older user accounts
suddenly become active, or frequent login failures. Active Insight will
suggest actions to take, to try and minimize the impact
of compromised credentials. And that's not all. We'll be introducing monitoring
for Hyper Backup tasks. This reduces the time and the work
needed to manually check each device
or email notification, and in the future
we'll be expanding support to other apps. But with Hyper Backup
being one of the most important solutions for making offsite backups,
we believe this would be a great addition to bring to the market
as soon as possible. Next in DSM 7.1 is support
for out-of-band management, which will provide
our system administrators another method to access important logs
and hardware power controls. DSM itself is designed to be robust
and managed remotely. But devices with out-of-band ports
will further reduce the need for IT teams to be physically on site,
in order to perform simple tasks such as power cycling Above all, it will assist in figuring out
what might have gone wrong. Going forward,
we will be incorporating this feature into an expanded number of devices. Another important challenge
in larger deployments is the actual management of file servers. For large businesses
or more data-intensive teams. You might already be using
multiple file servers, either for different purposes
or to hit certain performance or capacity requirements. While it isn't difficult
to simply connect to each server, wouldn't it be more convenient
if you only need one address or one portal? DSM 7.1 will introduce support
for combining multiple file servers into one portal with DFS support over SMB. We will also be introducing
SMB multichannel support, which will greatly speed up file transfer performance by leveraging
all available network adapters. Now, let's move on to directory services
and device backup. DSM can replace
many essential IT services cost-effectively while also reducing
the manpower and the time needed. One of these is a user directory service with our
Synology Directory Server package. Together with 7.0 we added support
for secondary domain controllers for load balancing
and increased availability. Now, in 7.1,
we will be introducing support for adding read-only domain controllers. This can be an important way
of securely deploying a local, low latency node, but in a way that reduces potential risk,
when operating in a not as secure environment. Now, before I introduce our new backup features for 7.1, let's take a look
at the current backup solutions that are available on DSM. For backing up data on
other devices into Synology. Our suite of Active Backup
and Synology Drive apps will take care of endpoints,
servers, virtual machines and SaaS (software as a service) for you. To protect the data now residing
on Synology, Hyper Backup and Snapshot Replication
are the primary two apps that are used to securely
back up and replicate data to a local or remote location. Hyper Backup is designed more
as a traditional backup solution by packaging backups
into compressed and deduplicated archives. Hyper Backup also does
client-side AES-256 encryption, which makes it work great
with cloud services. It also backs up specific system
and package configurations, which are useful
if you want to restore data and services onto a new Synology device. Snapshot Replication differs,
by that it leverages snapshot using our btrfs file system
to create a much faster point in time versions of your files and LUNs. This can then be restored much faster
than Hyper Backup. Extremely high snapshot frequencies
and failover support can then be used
to minimize RPOs and RTOs. Now, in DSM 7.1,
we're adding what we're calling complete DSM Backup,
which provides bare-metal level, comprehensive backup
for the entire Synology system and all data stored on it. This is designed to address situations
where the admin wants to restore entire systems as quickly
and with as little manual configuration as possible. DSM Backup is designed
to be fast, efficient, supporting many
of the same backup technologies we're all used to seeing
on other Synology apps. Of course, flexible scheduling,
retention and most importantly, recovery methods will be supported. Compared to Hyper Backup,
DSM Backup is more comprehensive and enables
near one-click restoration to fully replicate a device
and settings, plus data. Compared to Migration Assistant,
there's no need for both devices to be available. Which doesn't make much sense, when we are doing a restoration,
as that usually means something has gone wrong. With DSM Backup,
the entire platform now has a solution available that should fit any requirement. DSM 7.1 itself will introduce
many significant platform improvements that enable us to better serve
and support businesses of all sizes. But like I mentioned at the beginning,
the modern workplace is changing, and today teams
are often working together remotely, meaning there is a need
for innovative ways to work around data silos
and bandwidth constraints. One new companion service we also introduce
with DSM 7.0 is Hybrid Share. Hybrid Share leverages
our C2 cloud infrastructure to bridge together high performance
and easily usable on-prem storage with the scalability
and flexibility of cloud services. Once created, Hybrid Share folders
behave like any other, having the same SMB
and Synology Drive support, for example. But one key difference
being that it is also securely stored on our C2 Storage service. This provides several benefits. One being when they need
to synchronize the data with multiple sites they can do
so quickly and save bandwidth as that becomes delegated to C2. Hybrid Share folders
are also configured with a flexible local cache
with the rest being accessed on the fly. This means even devices
with lower capacities can access huge repositories. Altogether, Hybrid Share presents a new option
to flexibly connect multiple sites together to the same pool
of data in an efficient manner. Best of all, existing C2 Storage
Advanced plan subscribers can use any free storage space
to create Hybrid Share folders at no additional cost. And Hybrid Share is also
receiving many improvements. One of the most significant ones
being a global file system (GFS). GFS tackles the problem
when multiple people at different sites attempt to access the same file. Previously, this would result
in a file conflict if everyone tried to overwrite the same file
with their own edits, creating multiple copies afterwards. Hybrid Share can now lock files,
even across different devices, ensuring that all teams know
when the specific file is in use and can receive a notification
when the file is now available. Under the hood, Hybrid Share is getting
HTTP/3 support for improved performance and also a new cache warm-up feature, instead of only fetching files
that get requested. Hybrid Share has the option
to preload frequently used files. Synology is already one
of the leading providers of data storage and management solutions
for businesses of up to several thousand employees. And while existing solutions
have been deployed to installations with more users, we're often asked: "Is Synology planning
to introduce even higher end devices?" "How about systems that can support
tens or hundreds of petabytes?" "What is Synology's plan to address
the ever growing demands for performance and capacity?" Today, I'm giving everyone a sneak peek
into what we're currently exploring within our labs. It's no surprise
that highly scalable storage solutions today are designed
around scale-out concepts compared to traditional scale-up methods. Scale-out has many benefits. These include increased
service availability, scalability and simpler management. For availability, one defining difference
here is that scale-out solutions are built for redundancy at the node level,
which we can think of as RAID, but for entire systems. When storing data,
based on the configuration we define, that data is then propagated
and synchronously stored on multiple nodes. RPO, RTO is zero here
when any node goes down, as all of it will be transparently
handled by the system. The number of a node failure allowed
is configurable. The upside to this topology
is that the full system maintenance is completely non-disruptive. Servicing software or node level hardware
wouldn't even affect in process data transfers. To increase the capabilities and capacity
of the entire system, an additional node can
be added in at any time, and there's no fundamental limit. Unlike scale-up solutions, where we're often limited
by specific hardware on a certain device, such as storage controllers. And finally, management can be simpler,
as the entire cluster of storage nodes can all be managed together
on one management interface, similar to how DSM can be managed and monitored through CMS
and Active Insight. Scale-out is an exciting new field for us. And while we're still
in the pathfinding stage, we can't wait to introduce
our vision of it in the near future. Coming back to the present,
the Synology ecosystem today is so much more than just storage, the operating system,
but also the applications and services. We, of course,
expanded our key applications, Most notably, Synology Drive
and Active Backup for Business. Over this past year, Synology Drive
saw a 70 percent increase in the number of users. Synology Drive is one of the most used
applications for file management and sharing across multiple platforms,
and we will soon be improving the mobile experience
even further with a redesigned Drive app and improved mobile browser view
for recipients of files you shared. And Active Backup to date has
over 2.5 million users actively backing up their data. We have seen several deployments
back up tens of thousands of Microsoft 365 accounts
onto just one of our units. In Active Backup for Business,
we've added new traffic management capabilities, so that day-to-day
operations aren't as affected, even if there are
multiple backups happening. And one more thing
for both of these solutions. We're now able to introduce
on-demand syncing for macOS on Synology Drive.
Finally. And also bare-metal backup
for Macs through Active Backup. This will bring more
comprehensive coverage to enable IT deployments
of all sizes and compositions to benefit from all our suite of apps. And that's not all. Synology's ecosystem extends out
to more than just files and backups. Two of our more standalone product lines
are video surveillance and wireless networking. I'll have my colleague Joanne,
to introduce our next generation solutions over there. Thank you, Mike. Now that we covered
our core advances in storage. Let's take a brief look ahead
at two other key solutions we created: Video surveillance
and wireless networking. Like with DSM, we have also been pushing
the capabilities of Surveillance Station and added much requested functionality
to Synology Router Manager (SRM), our wireless router operating system. Let's first take a look
at Surveillance Station. Around one fifth of Synology NAS users
run Surveillance Station on their devices and many
use their NAS only for security. In 2021, our solutions served more than
two million connected cameras and devices. Today, we present a redesigned 9.0
with a focus on easier large scale deployment,
better user experience and enhanced protection
against data breaches and data loss. Surveillance Station is designed
to be a great solution whether you're installing
just a few cameras or professionally
deploy hundreds of devices across different sites. In Surveillance Station 9.0
we are making such large-scale deployments faster than ever before. Our new IP camera wizard
can now quickly link up hundreds of supported cameras in a span of minutes. Admins can import large batches
of surveillance gear using spreadsheets, making migration faster and simpler. We have also made it easier to manage
many Synology recording servers at once. An improved Surveillance Station CMS
offers more powerful tools to keep all your recording servers up to date, even for
completely offline installations. Surveillance Station 9.0
features a revamped user interface that is designed for efficiency. How customers use
Surveillance Station varies greatly. While some of our users
may occasionally monitor their homes, whereas others may have warehouses
or offices protected 24/7 by professional security teams. But all users need two core functions: To view camera streams in real time
and to rewind footage when they need to follow up
on an alert or event. In previous versions
of Surveillance Station, checking earlier footage
meant leaving the Live View interface and opening the separate Timeline app
to rewind through recordings. In this upgrade,
we're combining the application into a single Monitor Center,
a much more powerful, flexible and integrated tool. Now let's dive right in
and see how that works. To start things off,
we need to add a few cameras for our environment. These cameras were previously set up,
so we use a spreadsheet to import all
their credentials and settings. This method provides
a fast and reliable way to deploy cameras around any sites
and to migrate existing cameras from other surveillance solutions. As you can see,
it's all set up now. So let's pull up the new monitor view
to create ourselves a security dashboard. We have kept a similar interface,
but added flexibility and lots of built-in tools. This is a far more powerful place from
which to start protecting your assets. To accommodate our streams,
we create a three by three layout. These feeds are from our company office
so we can add a floor layout to show us what we are seeing
and drag some of those new cameras onto the overview. Now, let's try to find out
why some of the previously added cameras are showing motion alerts. With the timeline function
built into Monitor Center, we can just pull back the time
and see what happened. That concludes our preview
for this session. Surveillance Station 9.0 doesn't
just focus on scalability and usability. In keeping with our overall focus
on data security, this newest upgrade also delivers a boost
in keeping your data private and safe. The 9.0 upgrade will allow
you to encrypt surveillance footage with a separate key,
making it much harder for the unauthorized
to view or share sensitive images, even if they have administrative rights. This encryption at rest is joined
by support for secure network communications between
HTTPS or SRTP enabled IP cameras and your Synology NAS,
to ensure that no one can evesdrop on your video feeds. Finally, together with
the Surveillance Station 9.0, we are launching a new service that will let users dramatically increase
the resilience of their setup in case of physical attacks
or disaster at their premises. Dual recording to C2 Surveillance
minimizes any data loss to under five seconds,
providing you with the evidence and footage you need following an event. Meanwhile, the footage
is end-to-end encrypted, so only authorized personnel
can access any stored videos. This new service comes with monthly plans
starting from $1 per feed. With C2 Surveillance,
we're making it affordable to add an extra layer
to protect their cameras. Now, just before we wrap up this section,
there's a piece of hardware news we would like to share with you. With our deep video analytics
NVR line, we have steadily been introducing
more AI-powered, analytics tasks,
such as facial recognition, mask detection and more. Today, we're introducing
the DVA1622. A smaller device
that enables small businesses, and even home users to benefit
from the same smart features. The DVA1622 supports up to 16 cameras
and two analytics tasks at any time. It will become available
in the first half of 2022. Surveillance Station 9.0 is set to launch
in the first quarter of next year. And as you have seen,
it will allow users to set up and manage larger installations and
more cameras with the least effort yet. Everyone will be able to benefit
from the improved security options, dual recording capabilities
and the refreshed user interface in this upgrade. Let's now move on to the advancements in our other major product line,
wireless networking. Synology made waves in 2015
when we launched our first ever Wi-Fi router,
the RT1900ac. And we have since consistently added
and improved on the software that comes with our networked devices
as part of Synology Router Manager (SRM). When the ongoing pandemic hit in 2020,
Synology router users are well-prepared on the dual challenges
of working from home and increased activities
by malicious actors on the internet. We saw a jump of more than 200 percent
in the use of our security and remote connectivity related features. Throughout these years,
we continued to add on the capabilities that keep you safely connected. In 2022, we're happy to announce
major upgrades to our hardware, operating system, and mobile app. We will see the much anticipated launch
of our new router, the Synology RT6600ax. With the RT6600ax,
we are joining the Wi-Fi 6 era. The Wi-Fi 6 standard
prepares your communication gear for a world of tomorrow,
where our homes and offices are crowded with ever more connected IoT devices. Wi-Fi 6 helps make
your network future-proof, allowing for more connections
at the same time. Our router will be one
of the first devices from the get-go
to support the 5.9 GHz band, recently opened up by the US FCC. This creates much more room
for devices in Wi-Fi heavy places. It also opens up a true 160 MHz channel
for ultra-fast devices. The way we use our devices
and the unavoidable entrance of IoT products means
that our highly connected environments need better security solutions that are also easier to implement. Synology Router Manager (SRM) provides users with
a very powerful web filtering and parental control tools
that can block out known malicious sites and content. But how do you check the surge
of actual devices on your network? What if you want to keep certain devices
isolated from each other and also safe from horizontal attacks? In SRM 1.3, we're introducing support
for multiple networks, wired and wireless. This enables simple
but powerful partitioning of your network. VLANs were among the most frequent
inquiries we received over the past few years, and we understand why for many
of our IT savvy users, network separation is a priority. But how can we make this feature simple
for everyone to use and help users to do so properly? In SRM 1.3,
which will become available for all our routers (RT2600ac and MR2200ac)
next year, we have gone all out to provide powerful options
for both regular and professional users. Most important is our new support
for multiple Wi-Fi SSIDs. This feature allows you to set up
separated wireless networks for different purposes. It has always been possible
to create a guest network. But now, you could, for instance,
set up a dedicated IoT network where WPS (Wi-Fi Protected Setup), the option to connect
at a push of a button is enabled. Each network
can also further be defined by physical ports on the router
and according to specific devices. So, if you have a PoE (Power over Ethernet) switch
connected with multiple IP cameras or sensors, you could quickly map
all these devices on one port to belong to a specific network. Now, let's look at a use case
to see how configuration works: creating a network
for surveillance cameras. Out of security considerations, network isolation
is enabled by default on the products, meaning that unless you change this,
no communication is allowed between your networks. This is great if your devices never need
to communicate between networks, but if you want to cast files
to your smart TV, share files, or link up to those IP cameras
on your Synology NAS, you may want to bridge
your different networks together. While doing this, you may wish
to maintain separated policies. For example,
enforcing automatic traffic limitations or parental controls. And to better secure communications
between bridged networks, you can create a one-way policy
that allows only traffic that is initiated
by one network to cross over to another. A quick demo
will make it more clear on how it works. So let's say we want to connect
those IP cameras to Surveillance Station. That means we need the NAS
to communicate with the cameras, but we don't want the cameras
to be able to reach other devices. To make that happen, we can first create
a new network for the cameras. Let's open up Wi-Fi Connect in SRM
and create a new wireless network. To keep it short, we name the network IPC. This will automatically create
both a network and a Wi-Fi SSID. But it is possible to create networks
without wireless access too. Now, for configuration, let's head back to Network Center
and select our newly created IPC network to perform some changes. First, we need to disable
network isolation as our NAS is
located on the primary network, and it needs to connect to the cameras
on our new network. Then, let's assign Port 4 (on the router),
which is connected to the switch with cameras to the new network. This means that the same rule
will be applied, whether the cameras are connected through Wi-Fi or the physical port. Next, let's hop over to the Security tab,
to open our firewall settings because we only want a one-way connection
from the NAS to the cameras, we will create a rule
between the networks. From the new network
to the primary network. Now, with this new rule in place, only connections initiated
from the primary network are allowed. This still allows the video streams
to be sent back to the NAS while blocking unwanted traffic. With SRM 1.3, it's that simple
to create separate networks, giving you plenty of control
while making sure the setup is simple for everyone. Lastly, we also want to share with you
that we have completely overhauled how you do mobile management. A redesigned DS router app
enables not only easy router setup, but also many advanced management
functions directly from your phone, such as creating wireless networks,
managing firewall rules, and Safe Access profiles, and much more. With DS router, SRM 1.3,
and the new RT6600ax, we're making it easier
to build out secure and fast networks from small scale enthusiasts
to enterprise deployments, in both wireless networking
and video surveillance. We're pushing ahead to improve ease of use
and introduce advanced functionalities. Most importantly,
we will continue making sure that all our users
have access to great solutions to protect their privacy
and data security. And now let's get back to Mike. Thank you, Joanne. As you've seen,
we have a number of exciting developments that are happening for our on-premises
and hybrid cloud solutions. DSM 7.1 and for example,
Surveillance Station 9.0, will be available just around the corner
in the first half of 2022. Now, many of our existing users
will also know that Synology isn't just about
on-prem or even our NAS and routers. This year, we introduced a suite
of cloud-powered solutions designed to address
specific market challenges. I'll leave it to Chad
to walk you through Synology's newest C2 solutions. Hi, I'm Chad. Synology has been building
private cloud solutions for the better part of two decades. Since Synology was established,
we have aimed to make technology accessible to everyone. Just like how we designed
our entire on-prem ecosystem. And it involves two parts. First, ease of use. Making services and products
intuitive and accessible is crucial. Second, and the most important part:
Affordability. We believe all users share a majority
of demands and concerns, and those shouldn't be limited
by budget constraints. And this is why we are investing
in cloud services. Now, I am extremely excited
to introduce a major expansion to our C2 platform. All our new solutions are built
using security-first principles with end-to-end encryption technology. It's aiming to solve several IT challenges
by leveraging the best architectures, whether it's on-prem,
hybrid, or cloud services. Let's start with C2 Backup. I believe no one is not familiar
with ransomware by now. It attacks targets of all sizes. Studies show that every ten seconds, there is a company
that becomes the victim of ransomware. The infamous WannaCry campaign
caused hundreds of thousands of computers to be infected globally. But even a few years after that,
many still haven't done anything. We still hear of ransomware attacks
every other day, and the key takeaway for many
is that they don't have effective backups, usually because backup solutions
are often too complicated to set up or too expensive for smaller businesses. And this is why C2 Backup can help. With C2 Backup,
protecting your Windows PCs and many upcoming platforms
is made extremely simple. The bare-metal backup technology
can easily protect all data, system settings,
and external storage in one single backup task. You just need one backup task
for all types of data, and it automatically avoids
network rush hours across all devices. And by default,
your computers will be backed up once a day. For the best part, restoring files
or the entire device is simple. It's easy to jump across
the timeline on the portal and pull individual files, folders
or create a recovery image to completely restore a PC. C2 Backup also covers third-party
cloud services, like Microsoft 365 and Google Workspace. This is because they usually don't provide
native backups for your data. In fact, the default settings
only protect data for 30 to 90 days on average. This can lead to a lot of complications
when you believe their systems are protected
and later find that items have disappeared. C2 Backup protects both
on-premises and cloud workloads from a centralized
and secure cloud platform. Synology has always advocated
for strong privacy and security means, and it is a significant expectation
from our customers. When we designed C2 Backup, we employed end-to-end encryption
to protect your data, meaning all uploaded data
is completely private and only accessible to you,
using your private C2 encryption key. Without it, no one
can read or access your data. And our pricing is completely transparent. You only need to purchase
the storage capacity you need. That means there's no device
or user limitations and no additional licenses
and no hidden charges. While C2 Backup keeps business endpoints protected, what about managing them? We have a solution to do that:
using C2 Identity. The larger a business or team gets,
the more important it is to have
a centralized identity management service. Having one set of well-managed credentials
to access everything you need is not only convenient,
but also helps improve security. Since C2 Identity
is primarily cloud-hosted, it provides extra flexibility
that reduces integration issues with remote or online services
that are caused by complexities, with traditional on-premises solutions
like Microsoft Active Directory. C2 Identity authenticates both
on-premises and cloud-hosted services, including Synology NAS
and any intranet services. It also manages Windows, Mac,
and Linux devices to cover all IT requirements. Single sign-on (SSO) support
through standard SSO protocols also delivers streamlined authentication
between your local or cloud apps. C2 Identity offers device management tools
for connected Windows and Mac systems,
helping IT teams define system policies, including screen lock timers,
deploying software, or even initiating remote data wipes
if the device is stolen. While traditional
on-premises directory services are often locked
to only allow local access, this isn't a concern for C2 Identity. Endpoint devices can connect securely
to our C2 servers. Administrators can also deploy
a local LDAP node through an existing Synology NAS
or docker container, which is useful for intranet services that are blocked off
from direct internet access. This hybrid approach
maximizes C2 Identity's flexibility without requiring IT
to change their existing policies. C2 Identity adopts
Secure Remote Password (SRP) protocols to prevent man-in-the-middle (MITM) attacks and also ensure our C2 servers
never store password-equivalent data or secrets during user authentication. Combined with other
security-by-design functionality, we believe C2 Identity
can help companies better manage their devices
and user credentials while being easy to deploy and manage. And the same ideas carry over
to C2 Transfer, which solves an often overlooked part
of day-to-day business operations, file transfers. It's not often a problem
transferring files that reside on internal systems or devices,
which companies have control over. But what about sharing and receiving files
from external parties? It's fairly common for internal systems
to have data protection policies that restrict sharing
to only company accounts. And for your employees to get around this,
it's like a walk in a park. Using personal emails,
instant messaging, or public cloud services are commonly used to transfer files
with external stakeholders. These solutions are not necessarily secure
and can be a headache for IT teams to track and manage. C2 Transfer is designed specifically
to solve these headaches. In contrast with standard
sharing practices, we're also ensuring files are
delivered to the correct person, even if the links are accidentally
sent to the wrong one. Say we want to send a classified document
to our partner on C2 Transfer, and we also want to add
some watermarks to images. It can all be done in one place. C2 Transfer requires you
to first input the receiver's email address
or phone number, which will be used
for identity verification. The file is then encrypted client-side
and becomes ready to be securely shared. Now we can send this link in any way
we want and let the recipient know that they need to verify their identity. As the recipient, once we do that
and provide the authentication code, we gain access to the file. Even if the links
are sent to the wrong person, this zero-trust architecture
makes it nearly impossible for them to gain access. And this also works in reverse. C2 Transfer makes requesting files
just as easy and secure. We believe this service
will be extremely useful for all types of industries
that routinely handle personal information or sensitive files. So far, we've looked
at protecting devices and services, managing users and devices,
and securing external file transfers. Finally, let's look at solving
the long-lasting problem of insecure and forgotten credentials
found across all devices and web services. And our solution is C2 Password. As you can see,
the issue of credential management is still a very big problem today. An average of 450,000 searches
per month for "Forgot Google password" and around 300,000 monthly searches
for "Recovering Apple accounts". A major reason for this
is because many services require increasingly complex passwords. And it's highly recommended
to have a different password for each service,
making it incredibly difficult to memorize each and every one of them. And this is where C2 Password shines. You can easily store
your user credentials for all services. C2 Password is even
your secure cloud storage for personal information like addresses,
payment methods, and important documents. Now, let's take a look. I saved something
in my Amazon shopping cart. I've had my eye on this cool
on-premises storage solution for a while, and let's go through the checkout process. Many sites can save your address
and payment details, but C2 Password makes it easy
to keep all of your information safely updated in a single place,
which can then be filled in automatically by the browser extension. And that's how
simple and effortless it is. And what about sensitive files
you might need? Like a scan of your ID card,
passport, or bank statement? C2 Password incorporates
file sharing capabilities similar to C2 Transfer,
enabling you to securely store and share these documents
with the right recipients. C2 Password is also built
with end-to-end encryption, meaning that only the devices you have
and only with the C2 encryption key can you access your data. We hope more people can begin
adopting stronger passwords and better security habits,
which is why we offer C2 Password free for everyone. It also comes with a Plus plan,
which allows you to share passwords between up to six family members. And the most important thing is,
it'll be just $4.99 (USD) a year. $4.99, for a whole year,
for up to six family members. Isn't that exciting? Protecting your credentials
and sensitive data has never been more accessible, and it will be available this month. Over the past two years,
Synology C2 usage has grown tremendously. We have just expanded our capacities
at both Seattle and Frankfurt data centers and just launched
a new location in Taipei. These three data centers
can serve pretty much all users around the world and also
give them the option to meet regulatory and security policies associated with data residency. And as a preview
for what's coming next year, we are going to introduce
C2 Object Storage, providing an S3-compliant interface
for IT professionals to power their storage applications,
gateways, and other platforms. It is a general-purpose
object storage platform that can help IT reduce
the complexity of a self-built system, but with more flexible storage capacity
and less maintenance. We are making Synology C2
not just a platform that complements
our leading on-premises systems, but also as powerful solutions
that greatly expand the type of IT problems we can solve. And best of all,
we're just getting started. Now, handing it back to Philip. Thank you for joining us
today from on-prem and to the cloud. You have seen how Synology
continues to innovate and continues to empower you,
as our users. And we are still hungry, still foolish. We are building an even bigger ecosystem
together with all of you. Again.
Thank you for joining us. And see you next time.