SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Securing Content in the Changing Landscape of the Mobile Enterprise
SC Congress Chicago, November 20, 2013
Rama Kolappan Director, Product Marketing Accellion, Inc.
The Problem:
Sharing Enterprise Content Securely in the New iPad Era
The New Reality
• Proliferation of mobile devices and
tablets, led by the iPad.
• Difficulties accessing enterprise
content on mobile devices.
• Easy access to free cloud-based apps.

• Consumerization of IT creating security
challenges.

Confidential

2
The BYOD Challenge
How to make enterprise content accessible on mobile
devices while maintaining control and security?

Confidential
Enterprise Mobile Productivity
Evolution

Email,
Contacts,
Calendar

Content,
Backup, Store,
Sync

Collaboration
& Sharing

Productivity Trend

Confidential

Content
Creation,
Editing,
Printing

ECM &
Content
Access
Mobility and BYOD Trends

Confidential

State of Mobility Survey (6275 Organizations surveyed)
Symantec

5
Enterprise Mobility Management

Mobile
Device
Management
Confidential

Mobile
Application
Management

Mobile
Content
Management
6
Mobile Security – iSMG Survey
What are your biggest mobile
security / privacy concerns?

Which new security controls will
you invest in during 2013?
74%

Data security

48%

Application security

31%
30%

Continuous monitoring

24%

Auditing and logging

28%

Device configuration

31%

Identity and access management

31%

Authentication

33%

Mobile device management solution

39%

Malware

34%

E-mail encryption

43%

Unsecured wireless networks

34%

Anti-malware protection

54%

User behavior

Authentication
Data encryption

66%

Device security

48%

Awareness and training

24%
19%

Mobile application management…

26%

Managing multiple platforms

22%

Managing mobile device inventory
Varying privacy regulations across
geographical regions

Confidential

20%

13%

VPN

8%
0%

15%

Physical access controls

7%

Internal application development
40%

60%

Spring 2013. iSMG Survey: 200+ respondents (CIOs, CISOs, IT
Directors, other senior leaders)

80%

0%

20%

40%

60%
Mobile Content Management
Requirements
Key Considerations

Mobile
Productivity
Mobilize
Existing
Content

Confidential

Cloud
Deployment
Options
Security
Controls
Cloud Deployment Options

Private
On-Premise

Private
Hosted

No data co-mingling
Virtual appliance
Full control
Full
security, compliance
• Data Sovereignty

• No data co-mingling
• Security and control
• Low CapEx

•
•
•
•

Public
Multi-Tenant
• Multi-tenant
• Low CapEx
Security Controls
Authentication /
Authorization

Enterprise Security
• Anti-Virus
• Data Loss Prevention
• Restricted Admin Access to
Content

•
•
•
•
•

Encryption
• Encryption – Data at Rest and in
Motion
• Encryption Strength
• FIPS 140-2 Certification

Confidential

SSO with SAML/OAuth/Kerberos
Multi-LDAP and AD integration
Two-Factor Authentication
Password Policies
RBAC

Mobile Security
•
•
•
•
•

Secure Mobile Container
Whitelisted Helper Applications
Server Side Viewing
Selective Remote Wipe
Offline PIN
Finding the Right Balance

Good Usability

Confidential

Too Many Controls?
Mobilize Enterprise Content
• Mobilize existing content

• SharePoint, Windows File
Shares
• Internal/external sharing
• Unified access to all content

• No duplication of content
• Centralized control

Confidential
Secure Mobile Productivity
• Create and edit content
securely, without the risk
of data leaks during
transit across 3rd party
apps
• Private cloud –
Create, edit and access
content from private
cloud with Accellion
Mobile Productivity
capabilities

Confidential

• Data encrypted in transit
and at rest; content
expiration supported
Mobile Content Management
Requirements
Key Considerations

Mobile
Productivity
Mobilize
Existing
Content

Confidential

Cloud
Deployment
Options
Security
Controls
Accellion - Snapshot
• Founded 1999
• Headquartered in Palo Alto, CA

• 2,000+ Enterprise Customers
• 12+ Million Enterprise Users
• Secure Mobile File Sharing Solutions

Confidential
Accellion Customers

Confidential

16
Gartner MarketScope
Accellion Rated “Strong Positive”
Highest Possible Rating

Confidential
Accellion Solution Overview
Anytime, Anywhere Access to Enterprise Content
Secure File Transfer
• Send files as secure links
• Very large file support (1 TB+)
• Rich security options

Secure Collaboration & Sharing
•
•
•
•

Secure team workspaces
Desktop-workspace file sync
Versioning, Commenting
Highly flexible access control

Secure Content Access
• Access content stored behind the firewall
• Secure, anytime access to “Document of
Record”
• No VPN required
• Respects permissions of source
Confidential

Mobile Productivity
• Create, edit and share MS Office compatible files
• Fully containerized for end-to-end document
security
• Works with ECM, Collaboration and Secure Send
MANAGE

SECURE

ENGAGE

Avoiding BYOD Disaster

Confidential

Enabl
e
Secur
e
Mana
ge

• Support iOS, Android, and Windows devices.
• Support user self-provisioning.
• Provide access to enterprise content stores.
• Provide approved apps.
• Provide secure mobile printing.

• Implement encryption of data at rest and in transit.
• Support remote wipe.
• Integrate user authentication, SSO, Auto credentials
(LDAP, AD).
• Integrate DLP to keep data in.

• Provide configurable user permissions.
• Ensure comprehensive file tracking and reporting.
• Ensure auditable reports for demonstrating
compliance.
• Manage user policies and profiles.

19
Learn More

Web

www.accellion.com
Whitepapers, Datasheets, Videos, Analyst Reports, Blogs

Call

1-855-485-4300

Social Media

Confidential

Twitter @Accellion
LinkedIn
Facebook
About Accellion
Accellion provides enterprise-class mobile file sharing
solutions that enable secure anytime, anywhere access to
information while ensuring enterprise security and
compliance.

The world’s leading corporations and government agencies
select Accellion to protect intellectual property, ensure
compliance, improve business productivity and reduce IT
cost.
Learn more about Accellion here: www.accellion.com
Connect with Accellion here:
Thank You!
For more information visit
www.accellion.com

Confidential

22

Weitere ähnliche Inhalte

Was ist angesagt?

5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365Bitglass
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteBitglass
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusSpencerLuke2
 
Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility kidozen
 
Introducing Microsoft 365 for Business
Introducing Microsoft 365 for BusinessIntroducing Microsoft 365 for Business
Introducing Microsoft 365 for BusinessDavid J Rosenthal
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceAhmad Almarzouk
 
2019-04-27 SPS Doha - Mobility in Office 365 from tools and usages to busines...
2019-04-27 SPS Doha - Mobility in Office 365 from tools and usages to busines...2019-04-27 SPS Doha - Mobility in Office 365 from tools and usages to busines...
2019-04-27 SPS Doha - Mobility in Office 365 from tools and usages to busines...Patrick Guimonet
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsLeading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsOneLogin
 
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).DWP Information Architects Inc.
 
U&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_OnlineU&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_OnlineHamid Rashid
 
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloud
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The CloudCLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloud
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloudadministrator_confidis
 
4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + Security4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + SecurityChris Roche
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7Mark Interrante
 
Grow Your Business with Windows 10
Grow Your Business with Windows 10Grow Your Business with Windows 10
Grow Your Business with Windows 10Amr Khamise [MVP]
 

Was ist angesagt? (20)

5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
 
Fontana fredda20150527
Fontana fredda20150527Fontana fredda20150527
Fontana fredda20150527
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skus
 
Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility
 
Introducing Microsoft 365 for Business
Introducing Microsoft 365 for BusinessIntroducing Microsoft 365 for Business
Introducing Microsoft 365 for Business
 
Dynamics 365
Dynamics 365Dynamics 365
Dynamics 365
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplace
 
2019-04-27 SPS Doha - Mobility in Office 365 from tools and usages to busines...
2019-04-27 SPS Doha - Mobility in Office 365 from tools and usages to busines...2019-04-27 SPS Doha - Mobility in Office 365 from tools and usages to busines...
2019-04-27 SPS Doha - Mobility in Office 365 from tools and usages to busines...
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Strategy for Holistic Security
Strategy for Holistic SecurityStrategy for Holistic Security
Strategy for Holistic Security
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsLeading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
 
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
 
U&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_OnlineU&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_Online
 
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloud
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The CloudCLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloud
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloud
 
Meet windows10
Meet windows10Meet windows10
Meet windows10
 
4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + Security4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + Security
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Grow Your Business with Windows 10
Grow Your Business with Windows 10Grow Your Business with Windows 10
Grow Your Business with Windows 10
 

Ähnlich wie Accellion SC Congress Chicago Presentation 2014

Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationProofpoint
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013Mike Brannon
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODProofpoint
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box IBM Sverige
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)gule mariam
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
CIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the EnterpriseCIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the EnterpriseCloudIDSummit
 
Have content, will travel securely sharing mobile content in the cloud part II
Have content, will travel  securely sharing mobile content in the cloud part IIHave content, will travel  securely sharing mobile content in the cloud part II
Have content, will travel securely sharing mobile content in the cloud part IIProofpoint
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesPT Datacomm Diangraha
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesNetskope
 

Ähnlich wie Accellion SC Congress Chicago Presentation 2014 (20)

Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYOD
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
CIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the EnterpriseCIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the Enterprise
 
Have content, will travel securely sharing mobile content in the cloud part II
Have content, will travel  securely sharing mobile content in the cloud part IIHave content, will travel  securely sharing mobile content in the cloud part II
Have content, will travel securely sharing mobile content in the cloud part II
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
 

Mehr von Proofpoint

You can wear it!
You can wear it!You can wear it!
You can wear it!Proofpoint
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Proofpoint
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePointProofpoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File SharingProofpoint
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsProofpoint
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsProofpoint
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Proofpoint
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityProofpoint
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Proofpoint
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Proofpoint
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityProofpoint
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile PrintingProofpoint
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepointProofpoint
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IIProofpoint
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part IProofpoint
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud. Proofpoint
 

Mehr von Proofpoint (19)

You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part II
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part I
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud.
 

Kürzlich hochgeladen

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Accellion SC Congress Chicago Presentation 2014

  • 1. Securing Content in the Changing Landscape of the Mobile Enterprise SC Congress Chicago, November 20, 2013 Rama Kolappan Director, Product Marketing Accellion, Inc.
  • 2. The Problem: Sharing Enterprise Content Securely in the New iPad Era The New Reality • Proliferation of mobile devices and tablets, led by the iPad. • Difficulties accessing enterprise content on mobile devices. • Easy access to free cloud-based apps. • Consumerization of IT creating security challenges. Confidential 2
  • 3. The BYOD Challenge How to make enterprise content accessible on mobile devices while maintaining control and security? Confidential
  • 4. Enterprise Mobile Productivity Evolution Email, Contacts, Calendar Content, Backup, Store, Sync Collaboration & Sharing Productivity Trend Confidential Content Creation, Editing, Printing ECM & Content Access
  • 5. Mobility and BYOD Trends Confidential State of Mobility Survey (6275 Organizations surveyed) Symantec 5
  • 7. Mobile Security – iSMG Survey What are your biggest mobile security / privacy concerns? Which new security controls will you invest in during 2013? 74% Data security 48% Application security 31% 30% Continuous monitoring 24% Auditing and logging 28% Device configuration 31% Identity and access management 31% Authentication 33% Mobile device management solution 39% Malware 34% E-mail encryption 43% Unsecured wireless networks 34% Anti-malware protection 54% User behavior Authentication Data encryption 66% Device security 48% Awareness and training 24% 19% Mobile application management… 26% Managing multiple platforms 22% Managing mobile device inventory Varying privacy regulations across geographical regions Confidential 20% 13% VPN 8% 0% 15% Physical access controls 7% Internal application development 40% 60% Spring 2013. iSMG Survey: 200+ respondents (CIOs, CISOs, IT Directors, other senior leaders) 80% 0% 20% 40% 60%
  • 8. Mobile Content Management Requirements Key Considerations Mobile Productivity Mobilize Existing Content Confidential Cloud Deployment Options Security Controls
  • 9. Cloud Deployment Options Private On-Premise Private Hosted No data co-mingling Virtual appliance Full control Full security, compliance • Data Sovereignty • No data co-mingling • Security and control • Low CapEx • • • • Public Multi-Tenant • Multi-tenant • Low CapEx
  • 10. Security Controls Authentication / Authorization Enterprise Security • Anti-Virus • Data Loss Prevention • Restricted Admin Access to Content • • • • • Encryption • Encryption – Data at Rest and in Motion • Encryption Strength • FIPS 140-2 Certification Confidential SSO with SAML/OAuth/Kerberos Multi-LDAP and AD integration Two-Factor Authentication Password Policies RBAC Mobile Security • • • • • Secure Mobile Container Whitelisted Helper Applications Server Side Viewing Selective Remote Wipe Offline PIN
  • 11. Finding the Right Balance Good Usability Confidential Too Many Controls?
  • 12. Mobilize Enterprise Content • Mobilize existing content • SharePoint, Windows File Shares • Internal/external sharing • Unified access to all content • No duplication of content • Centralized control Confidential
  • 13. Secure Mobile Productivity • Create and edit content securely, without the risk of data leaks during transit across 3rd party apps • Private cloud – Create, edit and access content from private cloud with Accellion Mobile Productivity capabilities Confidential • Data encrypted in transit and at rest; content expiration supported
  • 14. Mobile Content Management Requirements Key Considerations Mobile Productivity Mobilize Existing Content Confidential Cloud Deployment Options Security Controls
  • 15. Accellion - Snapshot • Founded 1999 • Headquartered in Palo Alto, CA • 2,000+ Enterprise Customers • 12+ Million Enterprise Users • Secure Mobile File Sharing Solutions Confidential
  • 17. Gartner MarketScope Accellion Rated “Strong Positive” Highest Possible Rating Confidential
  • 18. Accellion Solution Overview Anytime, Anywhere Access to Enterprise Content Secure File Transfer • Send files as secure links • Very large file support (1 TB+) • Rich security options Secure Collaboration & Sharing • • • • Secure team workspaces Desktop-workspace file sync Versioning, Commenting Highly flexible access control Secure Content Access • Access content stored behind the firewall • Secure, anytime access to “Document of Record” • No VPN required • Respects permissions of source Confidential Mobile Productivity • Create, edit and share MS Office compatible files • Fully containerized for end-to-end document security • Works with ECM, Collaboration and Secure Send
  • 19. MANAGE SECURE ENGAGE Avoiding BYOD Disaster Confidential Enabl e Secur e Mana ge • Support iOS, Android, and Windows devices. • Support user self-provisioning. • Provide access to enterprise content stores. • Provide approved apps. • Provide secure mobile printing. • Implement encryption of data at rest and in transit. • Support remote wipe. • Integrate user authentication, SSO, Auto credentials (LDAP, AD). • Integrate DLP to keep data in. • Provide configurable user permissions. • Ensure comprehensive file tracking and reporting. • Ensure auditable reports for demonstrating compliance. • Manage user policies and profiles. 19
  • 20. Learn More Web www.accellion.com Whitepapers, Datasheets, Videos, Analyst Reports, Blogs Call 1-855-485-4300 Social Media Confidential Twitter @Accellion LinkedIn Facebook
  • 21. About Accellion Accellion provides enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to information while ensuring enterprise security and compliance. The world’s leading corporations and government agencies select Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT cost. Learn more about Accellion here: www.accellion.com Connect with Accellion here:
  • 22. Thank You! For more information visit www.accellion.com Confidential 22