SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Enterprise Essentials for Evaluating Cloud File
Sharing Solutions Webinar: Accellion with ESG –
Enterprise Strategy Group.
Confidential
Webinar Presenters
Kristine Kao
Analyst
Enterprise Strategy Group
Hormazd Romer
Senior Director
Accellion, Inc.
Nina Seth
Senior Product Marketing Manager
Accellion, Inc.
3
What We Will Cover
© 2013 by The Enterprise Strategy Group, Inc.
Consumerization: changing how we access and share files
File sharing challenges in a consumerized world
The range of solutions
Infrastructure choices
Solution evaluation criteria
Trends to watch
4
Technology Role Reversal
© 2013 by The Enterprise Strategy Group, Inc.
5
Technology Role Reversal
© 2013 by The Enterprise Strategy Group, Inc.
6
Data Sharing & Collaboration Challenges
© 2013 by The Enterprise Strategy Group, Inc.
• Data security and control
• Data portability between devices and collaborators
• Data growth and sprawl
• Maintaining Security
• Adoption
7
Consumerization…
© 2013 by The Enterprise Strategy Group, Inc.
Changing how we access and manage data
• 83% of organizations that support
BYOD allow employees to use the
device for both personal and
business use
• 40% allow employees to
access, receive, and store
confidential data
• More than 1/3 allow employees to
access, receive, and store customer
and regulated data
8
Driving a New Solution Category
© 2013 by The Enterprise Strategy Group, Inc.
Cloud File Sharing and Collaboration Market
Solutions that help users share and access documents stored in either a public, hybrid
or private cloud over the Internet, allowing for easy access by and collaboration across
multiple endpoint devices and enhancing mobile user productivity.
9
OFS Infrastructure Choices
© 2013 by The Enterprise Strategy Group, Inc.
Public
Control plane + data in cloud
Private
Control plane + data in
organization’s data center
Hybrid
Control plane in cloud, data
in cloud and/or organization’s
data center
10
IT’s Consumerization Compliance Conundrum
© 2013 by The Enterprise Strategy Group, Inc.
Online file storage and collaboration solutions are
already widespread within the enterprise in
individually owned accounts
Data goes with the account owner!
IT needs to provide corporately endorsed solutions
that are easy for individuals to use but provide IT
with security, control, and accountability
11
Evolving Offerings
© 2013 by The Enterprise Strategy Group, Inc.
• Easy for end-users
• Broad device support
• Sync and share
• “Freemium” models
• Broad adoption
• Brand awareness
Solutions Evolving from
Consumer Markets
• Focus on administration
and security
• Enterprise application
integration
• Broadening device
support
• Sync, share, collaborate
Solutions Created for
Business Use
Public, Private, Hybrid Service Offerings
12
Key Criteria for Evaluating Solutions
© 2013 by The Enterprise Strategy Group, Inc.
• Base Functionality
 Sync/share/collaborate
 Send
 Search
 Endpoint device support
 File size limits
• Pricing Models
 Seat-based
 Capacity-based
 Hybrid
 All inclusive
 Chargeable add-ons
• Administration and Control
 Integration with existing IT
applications and tools
 Ease of provisioning and de-
provisioning
 Sharing and collaboration policies
 User and group quotas
 DRM functionality
 Granular audit reports
 Admin search
13
Key Criteria for Evaluating Solutions
© 2013 by The Enterprise Strategy Group, Inc.
• Availability and Support
 Depth of versioning
 Phone or e-mail support
 Response times
 SLA
Additional considerations for public & hybrid deployment
 Data center security
 Network security
 Disaster resilience/recovery
 Backup and contingency plans
14
Key Criteria for Evaluating Solutions
© 2013 by The Enterprise Strategy Group, Inc.
• Security
 Antivirus
 Encryption in flight/at rest in servers and on local devices
 Key management policies
 Granular policies around protecting content (password
requirements, DLP, DRM, etc)
 Mobile security features (remote wipe, MAM/MDM integrations)
 Auditing and Reporting
Additional considerations for public & hybrid deployment
 Data center certifications
 Privacy/Data Ownership policies
 Archiving/e-discovery options
 Industry/Compliance requirements
15
Trends to Watch in this Market
© 2013 by The Enterprise Strategy Group, Inc.
• Competing requirements
 Business users: mobility and ubiquitous access
 IT: Administration and security
• The investment justification battle
 Business productivity: remote / mobile workforces
 Infrastructure savings: storage costs, minimal IT help desk support
• Integrations/Partnerships with other technology vendors
 Identity management
 MAM/MDM
 DLP/DRM
 Archiving
• Reporting and analytics
 Detailed Auditing and Reporting
 Analytics (natively or via partnerships)
Accellion - Snapshot
• Founded 1999
• Headquartered in Palo Alto, CA
• 1,900+ Enterprise Customers
• 11+ Million Enterprise Users
• Secure Mobile File Sharing Solutions
16
17
Enterprise Mobility Management
Mobile
Device
Management
Mobile
Application
Management
Mobile
Content
Management
Enterprise Mobile Productivity
Evolution and Trend
18
Email, Conta
cts, Calenda
r
Content
Backup, Stor
e, Sync
Collaboration
and Sharing
Productivity Trend
Content
Creation &
Editing,
Printing
ECM and
Content
Access
Secure File Transfer
▪ Send files as secure links
▪ Very large file support (1 TB+)
▪ Rich security options
Secure Collaboration
▪ Secure team workspaces
▪ Desktop-workspace file sync
▪ Versioning, Commenting
▪ Highly flexible access control
Accellion Solution Overview
Secure SharePoint/ECM Access
▪ Access content stored behind the firewall
▪ Secure, anytime access to “Document of Record”
▪ No VPN required
▪ Supports ECM systems and File Stores
▪ Respects permissions of source
Anytime, Anywhere Access to Enterprise Content
Mobile Productivity
▪ Create, edit and share MS Office compatible files
▪ Fully containerized for end-to-end document security
▪ Works with kiitepoint, Collaboration and Secure Send
20
Cloud Deployment Options
Private
On-Premise
Private
Hosted
Public
Multi-Tenant
• Virtual appliance
• Full control
• Full security, compliance
• Single-tenant
• Secure
• Cloud agility
• Multi-tenant
• Cloud agility
21
Mobilize Enterprise Content
• Mobilize Existing Content
• Internal/External Sharing
• Unified Access to All Content
• No Duplication of Content
• Centralized Control
• No VPN!
22
• Secure content creation and editing
• Eliminate risk of data leaks between apps
• Private Cloud storage, sharing and access
• Encryption in transit and at rest
• Content expiration supported
Secure Mobile Productivity
23
Secure Mobile Printing
Accellion Mobile Apps for iOS and Android now feature
embedded printing technology from Ricoh
24
Device Data Protection
• Data protection
Confidentiality protected in case of
lost or stolen device.
• BYOD support
Boost IT confidence in deploying
BYOD
• Prevent Data Leaks
Control which apps can open
content preventing data leaks
• Prevent Unauthorized Access
Avoid access to corporate data by
malicious apps
App White-listing Remote Wipe
25
Thank You!
Kristine Kao, Analyst
kristine.kao@esg-global.com
508.381.5189
Accellion Account Team
www.accellion.com
650.687.3130
Download This
Webinar
Accellion provides enterprise-class mobile file sharing
solutions that enable secure anytime, anywhere access to
information while ensuring enterprise security and
compliance.
The world’s leading corporations and government agencies
select Accellion to protect intellectual property, ensure
compliance, improve business productivity and reduce IT
cost.
Learn more about Accellion here: www.accellion.com
Connect with Accellion here:
About Accellion

Weitere ähnliche Inhalte

Mehr von Proofpoint

Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsProofpoint
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsProofpoint
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Proofpoint
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityProofpoint
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Proofpoint
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Proofpoint
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityProofpoint
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile PrintingProofpoint
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud CollaborationProofpoint
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationProofpoint
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepointProofpoint
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODProofpoint
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IIProofpoint
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part IProofpoint
 
Have content, will travel securely sharing mobile content in the cloud part II
Have content, will travel  securely sharing mobile content in the cloud part IIHave content, will travel  securely sharing mobile content in the cloud part II
Have content, will travel securely sharing mobile content in the cloud part IIProofpoint
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud. Proofpoint
 

Mehr von Proofpoint (19)

Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud Collaboration
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYOD
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part II
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part I
 
Have content, will travel securely sharing mobile content in the cloud part II
Have content, will travel  securely sharing mobile content in the cloud part IIHave content, will travel  securely sharing mobile content in the cloud part II
Have content, will travel securely sharing mobile content in the cloud part II
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud.
 

Kürzlich hochgeladen

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Kürzlich hochgeladen (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Enterprise Essentials for Evaluating Cloud File Sharing Solutions Webinar: Accellion with ESG – Enterprise Strategy Group

  • 1. Enterprise Essentials for Evaluating Cloud File Sharing Solutions Webinar: Accellion with ESG – Enterprise Strategy Group.
  • 2. Confidential Webinar Presenters Kristine Kao Analyst Enterprise Strategy Group Hormazd Romer Senior Director Accellion, Inc. Nina Seth Senior Product Marketing Manager Accellion, Inc.
  • 3. 3 What We Will Cover © 2013 by The Enterprise Strategy Group, Inc. Consumerization: changing how we access and share files File sharing challenges in a consumerized world The range of solutions Infrastructure choices Solution evaluation criteria Trends to watch
  • 4. 4 Technology Role Reversal © 2013 by The Enterprise Strategy Group, Inc.
  • 5. 5 Technology Role Reversal © 2013 by The Enterprise Strategy Group, Inc.
  • 6. 6 Data Sharing & Collaboration Challenges © 2013 by The Enterprise Strategy Group, Inc. • Data security and control • Data portability between devices and collaborators • Data growth and sprawl • Maintaining Security • Adoption
  • 7. 7 Consumerization… © 2013 by The Enterprise Strategy Group, Inc. Changing how we access and manage data • 83% of organizations that support BYOD allow employees to use the device for both personal and business use • 40% allow employees to access, receive, and store confidential data • More than 1/3 allow employees to access, receive, and store customer and regulated data
  • 8. 8 Driving a New Solution Category © 2013 by The Enterprise Strategy Group, Inc. Cloud File Sharing and Collaboration Market Solutions that help users share and access documents stored in either a public, hybrid or private cloud over the Internet, allowing for easy access by and collaboration across multiple endpoint devices and enhancing mobile user productivity.
  • 9. 9 OFS Infrastructure Choices © 2013 by The Enterprise Strategy Group, Inc. Public Control plane + data in cloud Private Control plane + data in organization’s data center Hybrid Control plane in cloud, data in cloud and/or organization’s data center
  • 10. 10 IT’s Consumerization Compliance Conundrum © 2013 by The Enterprise Strategy Group, Inc. Online file storage and collaboration solutions are already widespread within the enterprise in individually owned accounts Data goes with the account owner! IT needs to provide corporately endorsed solutions that are easy for individuals to use but provide IT with security, control, and accountability
  • 11. 11 Evolving Offerings © 2013 by The Enterprise Strategy Group, Inc. • Easy for end-users • Broad device support • Sync and share • “Freemium” models • Broad adoption • Brand awareness Solutions Evolving from Consumer Markets • Focus on administration and security • Enterprise application integration • Broadening device support • Sync, share, collaborate Solutions Created for Business Use Public, Private, Hybrid Service Offerings
  • 12. 12 Key Criteria for Evaluating Solutions © 2013 by The Enterprise Strategy Group, Inc. • Base Functionality  Sync/share/collaborate  Send  Search  Endpoint device support  File size limits • Pricing Models  Seat-based  Capacity-based  Hybrid  All inclusive  Chargeable add-ons • Administration and Control  Integration with existing IT applications and tools  Ease of provisioning and de- provisioning  Sharing and collaboration policies  User and group quotas  DRM functionality  Granular audit reports  Admin search
  • 13. 13 Key Criteria for Evaluating Solutions © 2013 by The Enterprise Strategy Group, Inc. • Availability and Support  Depth of versioning  Phone or e-mail support  Response times  SLA Additional considerations for public & hybrid deployment  Data center security  Network security  Disaster resilience/recovery  Backup and contingency plans
  • 14. 14 Key Criteria for Evaluating Solutions © 2013 by The Enterprise Strategy Group, Inc. • Security  Antivirus  Encryption in flight/at rest in servers and on local devices  Key management policies  Granular policies around protecting content (password requirements, DLP, DRM, etc)  Mobile security features (remote wipe, MAM/MDM integrations)  Auditing and Reporting Additional considerations for public & hybrid deployment  Data center certifications  Privacy/Data Ownership policies  Archiving/e-discovery options  Industry/Compliance requirements
  • 15. 15 Trends to Watch in this Market © 2013 by The Enterprise Strategy Group, Inc. • Competing requirements  Business users: mobility and ubiquitous access  IT: Administration and security • The investment justification battle  Business productivity: remote / mobile workforces  Infrastructure savings: storage costs, minimal IT help desk support • Integrations/Partnerships with other technology vendors  Identity management  MAM/MDM  DLP/DRM  Archiving • Reporting and analytics  Detailed Auditing and Reporting  Analytics (natively or via partnerships)
  • 16. Accellion - Snapshot • Founded 1999 • Headquartered in Palo Alto, CA • 1,900+ Enterprise Customers • 11+ Million Enterprise Users • Secure Mobile File Sharing Solutions 16
  • 18. Enterprise Mobile Productivity Evolution and Trend 18 Email, Conta cts, Calenda r Content Backup, Stor e, Sync Collaboration and Sharing Productivity Trend Content Creation & Editing, Printing ECM and Content Access
  • 19. Secure File Transfer ▪ Send files as secure links ▪ Very large file support (1 TB+) ▪ Rich security options Secure Collaboration ▪ Secure team workspaces ▪ Desktop-workspace file sync ▪ Versioning, Commenting ▪ Highly flexible access control Accellion Solution Overview Secure SharePoint/ECM Access ▪ Access content stored behind the firewall ▪ Secure, anytime access to “Document of Record” ▪ No VPN required ▪ Supports ECM systems and File Stores ▪ Respects permissions of source Anytime, Anywhere Access to Enterprise Content Mobile Productivity ▪ Create, edit and share MS Office compatible files ▪ Fully containerized for end-to-end document security ▪ Works with kiitepoint, Collaboration and Secure Send
  • 20. 20 Cloud Deployment Options Private On-Premise Private Hosted Public Multi-Tenant • Virtual appliance • Full control • Full security, compliance • Single-tenant • Secure • Cloud agility • Multi-tenant • Cloud agility
  • 21. 21 Mobilize Enterprise Content • Mobilize Existing Content • Internal/External Sharing • Unified Access to All Content • No Duplication of Content • Centralized Control • No VPN!
  • 22. 22 • Secure content creation and editing • Eliminate risk of data leaks between apps • Private Cloud storage, sharing and access • Encryption in transit and at rest • Content expiration supported Secure Mobile Productivity
  • 23. 23 Secure Mobile Printing Accellion Mobile Apps for iOS and Android now feature embedded printing technology from Ricoh
  • 24. 24 Device Data Protection • Data protection Confidentiality protected in case of lost or stolen device. • BYOD support Boost IT confidence in deploying BYOD • Prevent Data Leaks Control which apps can open content preventing data leaks • Prevent Unauthorized Access Avoid access to corporate data by malicious apps App White-listing Remote Wipe
  • 25. 25 Thank You! Kristine Kao, Analyst kristine.kao@esg-global.com 508.381.5189 Accellion Account Team www.accellion.com 650.687.3130 Download This Webinar
  • 26. Accellion provides enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to information while ensuring enterprise security and compliance. The world’s leading corporations and government agencies select Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT cost. Learn more about Accellion here: www.accellion.com Connect with Accellion here: About Accellion

Hinweis der Redaktion

  1. Accellion Mobile Productivity Suite addresses the challenges mentioned earlier:Security: No open in- Save back model and no use of 3rd party consumer grade and rogue apps. User can create, edit and access content securely.Integrated Solution: We are one of the first in the industry to offer an all-in one integrated solutionOffers seamless and secure access to enterprise contentCreate, edit and view MS office compatible files- Word, Excel, PowerPoint in a secure container.Collab and Share: Not only create and edit contents, a user can securely share and collaborate content securely with his/her team and outside stakeholders