1) The document discusses securing content in the changing landscape of mobile enterprise. It highlights challenges of sharing content securely with the rise of mobile devices and consumerization of IT.
2) Mobile content management solutions need to balance usability and security controls to enable access to enterprise content while maintaining control and security.
3) Accellion provides a mobile content management platform that allows users to securely access, share and collaborate on content from any device while respecting enterprise security and compliance requirements.
Generative Artificial Intelligence: How generative AI works.pdf
Accellion SC Congress Chicago Presentation 2014
1. Securing Content in the Changing Landscape of the Mobile Enterprise
SC Congress Chicago, November 20, 2013
Rama Kolappan Director, Product Marketing Accellion, Inc.
2. The Problem:
Sharing Enterprise Content Securely in the New iPad Era
The New Reality
• Proliferation of mobile devices and
tablets, led by the iPad.
• Difficulties accessing enterprise
content on mobile devices.
• Easy access to free cloud-based apps.
• Consumerization of IT creating security
challenges.
Confidential
2
3. The BYOD Challenge
How to make enterprise content accessible on mobile
devices while maintaining control and security?
Confidential
7. Mobile Security – iSMG Survey
What are your biggest mobile
security / privacy concerns?
Which new security controls will
you invest in during 2013?
74%
Data security
48%
Application security
31%
30%
Continuous monitoring
24%
Auditing and logging
28%
Device configuration
31%
Identity and access management
31%
Authentication
33%
Mobile device management solution
39%
Malware
34%
E-mail encryption
43%
Unsecured wireless networks
34%
Anti-malware protection
54%
User behavior
Authentication
Data encryption
66%
Device security
48%
Awareness and training
24%
19%
Mobile application management…
26%
Managing multiple platforms
22%
Managing mobile device inventory
Varying privacy regulations across
geographical regions
Confidential
20%
13%
VPN
8%
0%
15%
Physical access controls
7%
Internal application development
40%
60%
Spring 2013. iSMG Survey: 200+ respondents (CIOs, CISOs, IT
Directors, other senior leaders)
80%
0%
20%
40%
60%
9. Cloud Deployment Options
Private
On-Premise
Private
Hosted
No data co-mingling
Virtual appliance
Full control
Full
security, compliance
• Data Sovereignty
• No data co-mingling
• Security and control
• Low CapEx
•
•
•
•
Public
Multi-Tenant
• Multi-tenant
• Low CapEx
10. Security Controls
Authentication /
Authorization
Enterprise Security
• Anti-Virus
• Data Loss Prevention
• Restricted Admin Access to
Content
•
•
•
•
•
Encryption
• Encryption – Data at Rest and in
Motion
• Encryption Strength
• FIPS 140-2 Certification
Confidential
SSO with SAML/OAuth/Kerberos
Multi-LDAP and AD integration
Two-Factor Authentication
Password Policies
RBAC
Mobile Security
•
•
•
•
•
Secure Mobile Container
Whitelisted Helper Applications
Server Side Viewing
Selective Remote Wipe
Offline PIN
11. Finding the Right Balance
Good Usability
Confidential
Too Many Controls?
12. Mobilize Enterprise Content
• Mobilize existing content
• SharePoint, Windows File
Shares
• Internal/external sharing
• Unified access to all content
• No duplication of content
• Centralized control
Confidential
13. Secure Mobile Productivity
• Create and edit content
securely, without the risk
of data leaks during
transit across 3rd party
apps
• Private cloud –
Create, edit and access
content from private
cloud with Accellion
Mobile Productivity
capabilities
Confidential
• Data encrypted in transit
and at rest; content
expiration supported
18. Accellion Solution Overview
Anytime, Anywhere Access to Enterprise Content
Secure File Transfer
• Send files as secure links
• Very large file support (1 TB+)
• Rich security options
Secure Collaboration & Sharing
•
•
•
•
Secure team workspaces
Desktop-workspace file sync
Versioning, Commenting
Highly flexible access control
Secure Content Access
• Access content stored behind the firewall
• Secure, anytime access to “Document of
Record”
• No VPN required
• Respects permissions of source
Confidential
Mobile Productivity
• Create, edit and share MS Office compatible files
• Fully containerized for end-to-end document
security
• Works with ECM, Collaboration and Secure Send
19. MANAGE
SECURE
ENGAGE
Avoiding BYOD Disaster
Confidential
Enabl
e
Secur
e
Mana
ge
• Support iOS, Android, and Windows devices.
• Support user self-provisioning.
• Provide access to enterprise content stores.
• Provide approved apps.
• Provide secure mobile printing.
• Implement encryption of data at rest and in transit.
• Support remote wipe.
• Integrate user authentication, SSO, Auto credentials
(LDAP, AD).
• Integrate DLP to keep data in.
• Provide configurable user permissions.
• Ensure comprehensive file tracking and reporting.
• Ensure auditable reports for demonstrating
compliance.
• Manage user policies and profiles.
19
21. About Accellion
Accellion provides enterprise-class mobile file sharing
solutions that enable secure anytime, anywhere access to
information while ensuring enterprise security and
compliance.
The world’s leading corporations and government agencies
select Accellion to protect intellectual property, ensure
compliance, improve business productivity and reduce IT
cost.
Learn more about Accellion here: www.accellion.com
Connect with Accellion here: