SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
Protecting Innovation
through Next-Generation
Enterprise File Sharing
Mike Lees
VP Enterprise Business,
Intralinks Inc.

#IntralinksVIA
Copyright © Intralinks 2013 all rights reserved

1
Intralinks™: A Business Built on Trust

16+ years

As the leader in secure, beyond the
firewall content collaboration.

$23.5 trillion

Worth of transactions executed on
Intralinks SaaS platform.

#1 vendor

Gartner ranks Intralinks as the Lead
Vendor in the Collaboration / Social
Software Suites category for 7 years.

100% success
Copyright © Intralinks 2013 all rights reserved

In over 100 penetration
tests.

Source: Gartner ‗Market Share All Software Markets, Worldwide, 2012,‘ March 2013, G00250533
Copyright © Intralinks 2013 all rights reserved

3
Dramatic Changes in the Work Environment
Generational change…

Work styles are
changing…
…the threats
are changing…
Copyright © Intralinks 2013 all rights reserved

4
Hard facts about data loss
"What were the most common ways in which the breach(es) occurred in the past 12 months?‖

12%

Abuse by malicious insider

12%

Inadvertent use by ‗partner/advisor‘
and loss/theft of a corporate asset

25%

External attack
targeting corporate
servers

58%
Copyright © Intralinks 2013 all rights reserved

Inadvertent use
by insider and
loss/theft of a
corporate asset

Base: 583 North American and European IT security decision-makers at companies who have had a breach in the past 12 months - Source: Forrsights Security Survey, Q2
2012

5
Productivity vs. Security
Business Communities

UNshare

Security &
Control

Lifetime content
control
Share
You
Are
Here

Copyright © Intralinks 2013 all rights reserved

Collaboration beyond
boundaries

Freedom & Productivity

6
Restricted: information
not intended for release
to the public. If this
information was available
to competitors or
customers, it could
seriously damage the
organization.
Confidential: information
that could seriously
damage the organization
if disclosed.

PII
Trade
Secrets

Personnel
Records

R&D
Board of
Directors

Restricted

Public: information that is
made available to the
larger public or specific
individuals that request it.

Customer
List

Litigation

Financial

Product
Roadmap
Business
Plans

Public

Information Types

Confidential

What Information Do You Need to Share and Protect?

Product
Design

Source
Code
Contracts

PR

Internal
Copyright © Intralinks 2013 all rights reserved

M&A
Activities

Marketing
Collateral

Supplier
Records

External
Mobility of Information

7
―Sharing Isn‘t Working‖
• Getting work done goes
beyond file sharing
• Control isn‘t just about
security
• It‘s about managing work
wherever it goes

Copyright © Intralinks 2013 all rights reserved

8
Intralinks‘ Enterprise Offerings

Specialization

Enterprise
(Controlled)

Enterprise
(Basic)

General Use
Copyright © Intralinks 2013 all rights reserved

9
What Makes Enterprise Grade?
Consumer
grade

Enterprise
grade

Audit and compliance monitoring

?
?
?

✓
✓
✓

Integration with existing
infrastructure

?

✓

Content tasking/workflow

?
?
?

✓
✓
✓

Security and encryption

Lifetime document controls

Administration & Reporting

Comprehensive, global support
Copyright © Intralinks 2013 all rights reserved

―Consumer-grade
services are
demonstrably immature
compared
to mature enterprisegrade tools. they haven‘t
‗grown-up‘ in regulated
industries handling
sensitive data. They‘ve
grown up in the
consumer market
handling photos and
music.‖
— ARCHITECTS ZONE,
APRIL 26, 2012
10
Vodafone McLaren Mercedes
•

Started racing in 1966 and built a strong reputation and pedigree

•

Since 1966 Vodafone McLaren Mercedes have been the most successful
team in Formula 1 history

•

Since inception have won 1 in every 4 races, with a McLaren driver on the
podium 47%

•

The only team to have won Formula 1, Le Mans 24, and the Indianapolis
500

Copyright © Intralinks 2013 all rights reserved

11
Every Second Counts
•
•

Copyright © Intralinks 2013 all rights reserved

On average, the car changes every 20
minutes
Formula 1 is about technology
innovation, speed, design and glamour

12
Germany

Belgium
Britain
Canada
USA, Texas

Hungary
Russia (2014)

Europe
USA, New York
(2014)

Spain
Monaco

Korea

Italy
Abu Dhabi

Japan

China
India

Bahrain

Singapore
Malaysia
Brazil
Australia

Copyright © Intralinks 2013 all rights reserved

13
Meet Stuart
Stuart Birrell, CIO at McLaren Group, Ltd.

Copyright © Intralinks 2013 all rights reserved

14
Delivering race specs to the
FIA, the governing body for
world motor sport

Copyright © Intralinks 2013 all rights reserved

Legal due diligence &
collaboration

Sharing information to a
global dealer network

Trackside Disaster recovery &
remote support
Secure supply chain
collaboration with short & long
term partners

Supplying engine telemetry
software for NASCAR
General ad-hoc collaboration
across the McLaren Group
intralinks.com/mclaren
15
A Service that Business and Users Adopt
User Adopted
Share and access content up to 2 GB
wherever it is needed; web, desktop and
mobile

Collaborate effectively using work streams,
discussion threads and version control
Extend familiar
tools and experiences such as Outlook

Business Sponsored
UNshare: empower users to keep your
critical information protected at all times
Control and monitor the collaborative
process through detailed audit reports
24/7/365 multilingual, global support for all
collaborative participants
Copyright © Intralinks 2013 all rights reserved

16
That IT will Endorse
IT Endorsed
Protect your business with
regulatory-ready and bank-grade
security
Manage business group file
sharing and sync policies
Remote wipe synchronized content
– even when devices are offline
Report on file sharing activity and
platform usage
Extend business globally with
proven scale and presence

Copyright © Intralinks 2013 all rights reserved

17
Intralinks VIA™
Free 30 day trial
www.intralinks.com/try

Come See Us @ booth 1030
Copyright © Intralinks 2013 all rights reserved

18

Weitere ähnliche Inhalte

Was ist angesagt?

Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 DaysDigital Guardian
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ
 
Boldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big DataBoldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big Databoldonjames
 
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' ThreatsA Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' ThreatsKirsty Donovan
 
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...TrustArc
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incDruva
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research Druva
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]TrustArc
 
Combatting Insider Threats Presentation
Combatting Insider Threats PresentationCombatting Insider Threats Presentation
Combatting Insider Threats PresentationSara Thomason
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramNetIQ
 
The journey to Private AI, where Privacy-Preserving ML meets DLT
The journey to Private AI,  where Privacy-Preserving ML meets DLTThe journey to Private AI,  where Privacy-Preserving ML meets DLT
The journey to Private AI, where Privacy-Preserving ML meets DLTOmid Mogharian
 
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...TrustArc
 
C7 defending the cloud with monitoring and auditing
C7   defending the cloud with monitoring and auditingC7   defending the cloud with monitoring and auditing
C7 defending the cloud with monitoring and auditingDr. Wilfred Lin (Ph.D.)
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric SecurityWatchful Software
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesSteven Meister
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Preventiondj1arry
 

Was ist angesagt? (20)

Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Boldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big DataBoldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big Data
 
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' ThreatsA Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
 
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
 
Combatting Insider Threats Presentation
Combatting Insider Threats PresentationCombatting Insider Threats Presentation
Combatting Insider Threats Presentation
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
 
The journey to Private AI, where Privacy-Preserving ML meets DLT
The journey to Private AI,  where Privacy-Preserving ML meets DLTThe journey to Private AI,  where Privacy-Preserving ML meets DLT
The journey to Private AI, where Privacy-Preserving ML meets DLT
 
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
 
C7 defending the cloud with monitoring and auditing
C7   defending the cloud with monitoring and auditingC7   defending the cloud with monitoring and auditing
C7 defending the cloud with monitoring and auditing
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 

Andere mochten auch

The Next Generation (of) IT
The Next Generation (of) ITThe Next Generation (of) IT
The Next Generation (of) ITUwe Friedrichsen
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Securityneoma329
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
Next Generation Enterprise Architecture
Next Generation Enterprise ArchitectureNext Generation Enterprise Architecture
Next Generation Enterprise ArchitectureMapR Technologies
 

Andere mochten auch (6)

Next generation enterprise
Next generation enterprise Next generation enterprise
Next generation enterprise
 
The Next Generation (of) IT
The Next Generation (of) ITThe Next Generation (of) IT
The Next Generation (of) IT
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Next Generation Enterprise Architecture
Next Generation Enterprise ArchitectureNext Generation Enterprise Architecture
Next Generation Enterprise Architecture
 

Ähnlich wie Protecting Innovation Through Next Generation Enterprise File Sharing

Bootstrapping UX
Bootstrapping UXBootstrapping UX
Bootstrapping UXJim Lane
 
ConnectTheGrid Overview Webinar - June 10, 2015
ConnectTheGrid Overview Webinar - June 10, 2015ConnectTheGrid Overview Webinar - June 10, 2015
ConnectTheGrid Overview Webinar - June 10, 2015West Monroe Partners
 
BayBio - Facilitating R&D Collaborations through the Cloud
BayBio - Facilitating R&D Collaborations through the CloudBayBio - Facilitating R&D Collaborations through the Cloud
BayBio - Facilitating R&D Collaborations through the CloudSri Chilukuri
 
Validus investor pitch deck 03212014 rjc updates
Validus investor pitch deck 03212014 rjc updatesValidus investor pitch deck 03212014 rjc updates
Validus investor pitch deck 03212014 rjc updatesRick Catalano
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
 
[Europe merge world tour] CIC SCM from Developer Tool to Corp Versioning
[Europe   merge world tour] CIC SCM from Developer Tool to Corp Versioning[Europe   merge world tour] CIC SCM from Developer Tool to Corp Versioning
[Europe merge world tour] CIC SCM from Developer Tool to Corp VersioningPerforce
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Using Kafka in Your Organization with Real-Time User Insights for a Customer ...
Using Kafka in Your Organization with Real-Time User Insights for a Customer ...Using Kafka in Your Organization with Real-Time User Insights for a Customer ...
Using Kafka in Your Organization with Real-Time User Insights for a Customer ...confluent
 
Preparing for Major Disruptions in Digital Asset Management
Preparing for Major Disruptions in Digital Asset ManagementPreparing for Major Disruptions in Digital Asset Management
Preparing for Major Disruptions in Digital Asset ManagementNuxeo
 
Mobility, Gamification & SOA as the Basis for Better User Experience
Mobility, Gamification & SOA as the Basis for Better User ExperienceMobility, Gamification & SOA as the Basis for Better User Experience
Mobility, Gamification & SOA as the Basis for Better User ExperienceTorry Harris Business Solutions
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Versioning: It's more than just for software
Versioning: It's more than just for software Versioning: It's more than just for software
Versioning: It's more than just for software Perforce
 
Survey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSurvey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSolarWinds
 
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Inflectra Enterprise Agile Planning Briefing for Gartner 2018Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Inflectra Enterprise Agile Planning Briefing for Gartner 2018Adam Sandman
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights finalSal Marcus
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceCloudera, Inc.
 
PMLINK360 - Stakeholder Management Software that delivers results for your pr...
PMLINK360 - Stakeholder Management Software that delivers results for your pr...PMLINK360 - Stakeholder Management Software that delivers results for your pr...
PMLINK360 - Stakeholder Management Software that delivers results for your pr...Steve Artis
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps EraMike Kavis
 
Iasa Architect responsibilities in the cloud
Iasa Architect responsibilities in the cloudIasa Architect responsibilities in the cloud
Iasa Architect responsibilities in the cloudiasaglobal
 
Digitization - What Does This Mean to Internal Audit?
Digitization - What Does This Mean to Internal Audit?Digitization - What Does This Mean to Internal Audit?
Digitization - What Does This Mean to Internal Audit?jennyhollingworth
 

Ähnlich wie Protecting Innovation Through Next Generation Enterprise File Sharing (20)

Bootstrapping UX
Bootstrapping UXBootstrapping UX
Bootstrapping UX
 
ConnectTheGrid Overview Webinar - June 10, 2015
ConnectTheGrid Overview Webinar - June 10, 2015ConnectTheGrid Overview Webinar - June 10, 2015
ConnectTheGrid Overview Webinar - June 10, 2015
 
BayBio - Facilitating R&D Collaborations through the Cloud
BayBio - Facilitating R&D Collaborations through the CloudBayBio - Facilitating R&D Collaborations through the Cloud
BayBio - Facilitating R&D Collaborations through the Cloud
 
Validus investor pitch deck 03212014 rjc updates
Validus investor pitch deck 03212014 rjc updatesValidus investor pitch deck 03212014 rjc updates
Validus investor pitch deck 03212014 rjc updates
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
[Europe merge world tour] CIC SCM from Developer Tool to Corp Versioning
[Europe   merge world tour] CIC SCM from Developer Tool to Corp Versioning[Europe   merge world tour] CIC SCM from Developer Tool to Corp Versioning
[Europe merge world tour] CIC SCM from Developer Tool to Corp Versioning
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Using Kafka in Your Organization with Real-Time User Insights for a Customer ...
Using Kafka in Your Organization with Real-Time User Insights for a Customer ...Using Kafka in Your Organization with Real-Time User Insights for a Customer ...
Using Kafka in Your Organization with Real-Time User Insights for a Customer ...
 
Preparing for Major Disruptions in Digital Asset Management
Preparing for Major Disruptions in Digital Asset ManagementPreparing for Major Disruptions in Digital Asset Management
Preparing for Major Disruptions in Digital Asset Management
 
Mobility, Gamification & SOA as the Basis for Better User Experience
Mobility, Gamification & SOA as the Basis for Better User ExperienceMobility, Gamification & SOA as the Basis for Better User Experience
Mobility, Gamification & SOA as the Basis for Better User Experience
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Versioning: It's more than just for software
Versioning: It's more than just for software Versioning: It's more than just for software
Versioning: It's more than just for software
 
Survey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSurvey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management Solutions
 
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Inflectra Enterprise Agile Planning Briefing for Gartner 2018Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights final
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
PMLINK360 - Stakeholder Management Software that delivers results for your pr...
PMLINK360 - Stakeholder Management Software that delivers results for your pr...PMLINK360 - Stakeholder Management Software that delivers results for your pr...
PMLINK360 - Stakeholder Management Software that delivers results for your pr...
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps Era
 
Iasa Architect responsibilities in the cloud
Iasa Architect responsibilities in the cloudIasa Architect responsibilities in the cloud
Iasa Architect responsibilities in the cloud
 
Digitization - What Does This Mean to Internal Audit?
Digitization - What Does This Mean to Internal Audit?Digitization - What Does This Mean to Internal Audit?
Digitization - What Does This Mean to Internal Audit?
 

Kürzlich hochgeladen

Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 

Kürzlich hochgeladen (20)

Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 

Protecting Innovation Through Next Generation Enterprise File Sharing

  • 1. Protecting Innovation through Next-Generation Enterprise File Sharing Mike Lees VP Enterprise Business, Intralinks Inc. #IntralinksVIA Copyright © Intralinks 2013 all rights reserved 1
  • 2. Intralinks™: A Business Built on Trust 16+ years As the leader in secure, beyond the firewall content collaboration. $23.5 trillion Worth of transactions executed on Intralinks SaaS platform. #1 vendor Gartner ranks Intralinks as the Lead Vendor in the Collaboration / Social Software Suites category for 7 years. 100% success Copyright © Intralinks 2013 all rights reserved In over 100 penetration tests. Source: Gartner ‗Market Share All Software Markets, Worldwide, 2012,‘ March 2013, G00250533
  • 3. Copyright © Intralinks 2013 all rights reserved 3
  • 4. Dramatic Changes in the Work Environment Generational change… Work styles are changing… …the threats are changing… Copyright © Intralinks 2013 all rights reserved 4
  • 5. Hard facts about data loss "What were the most common ways in which the breach(es) occurred in the past 12 months?‖ 12% Abuse by malicious insider 12% Inadvertent use by ‗partner/advisor‘ and loss/theft of a corporate asset 25% External attack targeting corporate servers 58% Copyright © Intralinks 2013 all rights reserved Inadvertent use by insider and loss/theft of a corporate asset Base: 583 North American and European IT security decision-makers at companies who have had a breach in the past 12 months - Source: Forrsights Security Survey, Q2 2012 5
  • 6. Productivity vs. Security Business Communities UNshare Security & Control Lifetime content control Share You Are Here Copyright © Intralinks 2013 all rights reserved Collaboration beyond boundaries Freedom & Productivity 6
  • 7. Restricted: information not intended for release to the public. If this information was available to competitors or customers, it could seriously damage the organization. Confidential: information that could seriously damage the organization if disclosed. PII Trade Secrets Personnel Records R&D Board of Directors Restricted Public: information that is made available to the larger public or specific individuals that request it. Customer List Litigation Financial Product Roadmap Business Plans Public Information Types Confidential What Information Do You Need to Share and Protect? Product Design Source Code Contracts PR Internal Copyright © Intralinks 2013 all rights reserved M&A Activities Marketing Collateral Supplier Records External Mobility of Information 7
  • 8. ―Sharing Isn‘t Working‖ • Getting work done goes beyond file sharing • Control isn‘t just about security • It‘s about managing work wherever it goes Copyright © Intralinks 2013 all rights reserved 8
  • 10. What Makes Enterprise Grade? Consumer grade Enterprise grade Audit and compliance monitoring ? ? ? ✓ ✓ ✓ Integration with existing infrastructure ? ✓ Content tasking/workflow ? ? ? ✓ ✓ ✓ Security and encryption Lifetime document controls Administration & Reporting Comprehensive, global support Copyright © Intralinks 2013 all rights reserved ―Consumer-grade services are demonstrably immature compared to mature enterprisegrade tools. they haven‘t ‗grown-up‘ in regulated industries handling sensitive data. They‘ve grown up in the consumer market handling photos and music.‖ — ARCHITECTS ZONE, APRIL 26, 2012 10
  • 11. Vodafone McLaren Mercedes • Started racing in 1966 and built a strong reputation and pedigree • Since 1966 Vodafone McLaren Mercedes have been the most successful team in Formula 1 history • Since inception have won 1 in every 4 races, with a McLaren driver on the podium 47% • The only team to have won Formula 1, Le Mans 24, and the Indianapolis 500 Copyright © Intralinks 2013 all rights reserved 11
  • 12. Every Second Counts • • Copyright © Intralinks 2013 all rights reserved On average, the car changes every 20 minutes Formula 1 is about technology innovation, speed, design and glamour 12
  • 13. Germany Belgium Britain Canada USA, Texas Hungary Russia (2014) Europe USA, New York (2014) Spain Monaco Korea Italy Abu Dhabi Japan China India Bahrain Singapore Malaysia Brazil Australia Copyright © Intralinks 2013 all rights reserved 13
  • 14. Meet Stuart Stuart Birrell, CIO at McLaren Group, Ltd. Copyright © Intralinks 2013 all rights reserved 14
  • 15. Delivering race specs to the FIA, the governing body for world motor sport Copyright © Intralinks 2013 all rights reserved Legal due diligence & collaboration Sharing information to a global dealer network Trackside Disaster recovery & remote support Secure supply chain collaboration with short & long term partners Supplying engine telemetry software for NASCAR General ad-hoc collaboration across the McLaren Group intralinks.com/mclaren 15
  • 16. A Service that Business and Users Adopt User Adopted Share and access content up to 2 GB wherever it is needed; web, desktop and mobile Collaborate effectively using work streams, discussion threads and version control Extend familiar tools and experiences such as Outlook Business Sponsored UNshare: empower users to keep your critical information protected at all times Control and monitor the collaborative process through detailed audit reports 24/7/365 multilingual, global support for all collaborative participants Copyright © Intralinks 2013 all rights reserved 16
  • 17. That IT will Endorse IT Endorsed Protect your business with regulatory-ready and bank-grade security Manage business group file sharing and sync policies Remote wipe synchronized content – even when devices are offline Report on file sharing activity and platform usage Extend business globally with proven scale and presence Copyright © Intralinks 2013 all rights reserved 17
  • 18. Intralinks VIA™ Free 30 day trial www.intralinks.com/try Come See Us @ booth 1030 Copyright © Intralinks 2013 all rights reserved 18