SlideShare a Scribd company logo
1 of 15
™




                                  FileLocker For Enterprise
                                             February 2013




                                                              1
Copyright 2012 InfraScale ™ - CONFIDENTIAL
™


 Introducing FileLocker:
 Truly secure and scalable collaboration for all organizations.




                       Collaboration                         Administrative
                                                                  Controls
                                             FileLocker


                                             In-Network or
                                             Offsite Deployment



                                                                              2
Copyright 2012 InfraScale ™ - CONFIDENTIAL
™


 Introducing FileLocker
 For organizations with specific privacy and security needs.

Finance and legal:
• Send large files for client and partner review
• Protect customer data while sharing it with them.
Government:
• Keep data in an undecipherable, encrypted state in the cloud.
• Keep data in-house, inside your own network.

 Healthcare:
 • Data can be stored in FileLocker with UltraSafe™, which prevents it from
   being shared accidentally (or even on purpose)

Art and design:
• Send large files for campaigns and client review
• Complete live, collaborative commenting and editing sessions in the cloud

                                                                              3
Copyright 2012 InfraScale ™ - CONFIDENTIAL
™


 Why? FileLocker
 Because a box is not a safe place for your data.

 The market leading file sharing and collaboration tools carry a
 security risk.

 They leave data unencrypted, often at rest in the data center.

 FileLocker encrypts your data three times:

 1. With a private key, client-side (locally)
 2. In transit in a 256 SSL tunnel
 3. In the cloud with 256 bit AES encryption

 Your data stored with FileLocker is
 undecipherable.



                                                                   4
Copyright 2012 InfraScale ™ - CONFIDENTIAL
™


  Introducing FileLocker:
  What makes FileLocker different?


1. Unmatched Security: Unlike most
   collaboration solutions, it encrypts data
   before sending it to the cloud, in transit,
    and again at rest in the data center.

2. Use any cloud: FileLocker can be installed
   In the cloud of your choice.
   - Your on premise server.
   - Your data center.
   - The Infrascale cloud.                  3. Pricing: Introductory pricing at $5 per user,
                                               per month. Increase users at any time.

                                                 4. Administrative controls: Complete
                                                    audit trail reporting, control features
                                                    by user, monitor activity history.
                                                                                              5
 Copyright 2012 InfraScale ™ - CONFIDENTIAL
™


  FileLocker Features
  World class security




Most collaboration tools
Encrypt data only at rest.
                                        1. Locally   2. In transit   3. In the data
FileLocker encrypts it                                               center
three times.
                                                                                  6
 Copyright 2012 InfraScale ™ - CONFIDENTIAL
™


 Gartner confirms: file synchronization tools are putting your
 private data at risk
 Gartner has identified the following issues as being caused by unauthorized
 and unapproved file sharing and synchronization tools.

 FileLocker has a solution for all of them.
  Impacts Identified                   Gartner's
                                                                                 FileLocker's Offering
  by Gartner                           Recommendation
                                                                                 FileLocker can be acquired
                                       1. Provide users with an approved
                                                                                 and controlled in an
                                       and support personal                  >   organization from the top-
  Huge amounts of                      synchronization service.
  proprietary and                                                                down.
  regulated data are                   2. Write and communicate policy           Employees will have an
  leaking onto non-                    forbidding the use of non-approved    >   approved collaboration
  corporate devices,                   services.                                 solution.
  outside of enterprise
  controls and audit trails.           3. Enforce the policy through             Employees can use
                                       technical controls on endpoints and   >   FileLocker on any device they
                                       the networks.                             choose and remain secure.


                                                                                                                 7
Copyright 2012 InfraScale ™ - CONFIDENTIAL
™


 Gartner confirms: file synchronization tools are putting your
 private data at risk

  Impacts Identified by
                                        Gartner's Recommendation                    FileLocker's Offering
  Gartner

                                        4. Ensure that all data is encrypted,       Ultrasafe password protection can
  Enterprise files on multi-            preferably applied at the endpoint or   >   be applied at endpoint, with the
  tenanted public servers are           within a security gateway.                  desktop application.
  potentially vulnerable to
  attack or unauthorized
  access.                               5. Consider using an on-premises            FileLocker can be deployed on any
                                        server.
                                                                                >   server, including on-premises.


                                        6. Block unapproved sync software on        No need to block FileLocker's sync
  Compromise of desktop                 workstations and multifunction          >   software, as it is controlled by the
  file-sharing software could           devices.                                    organization.
  enable unauthorized
  remote access to the
  enterprise or introduce               7. Evaluate the security and control        FileLocker administrators control
  rapidly spreading malware.            mechanisms of vendor endpoint apps.
                                                                                >   access and usage by each user.


                                                                                                                  8
Copyright 2012 InfraScale ™ - CONFIDENTIAL
™


 FileLocker Features
 Collaboration Features


 Collaboration Features                             Edit, collaborate,
 •   Edit and preview files (including MS Office)     review in the
 •   Sync to multiple desktop folders                     cloud.
 •   Mobile access, preview, and share at
     m.FileLocker.com
 •   Global web access                                Preview and
 •   Send secure links                               share on smart
 •   Eliminate large file sharing via email             phones.
 •   Download files
 •   Upload files
 •   Drag’n’drop files within the application
 •   Upload unlimited versions                       Kill your email!




Copyright 2012 InfraScale ™ - CONFIDENTIAL                               9
™


 FileLocker Features
 Private Cloud Administrative Features
 Co-branding
 •       Add a logo per company
 •       It will be co-branded with FileLocker            Monitor and
                                                         control usage
     Administrative Controls                               by user.
     •    Create administrative reports
     •    Audit trail reporting
     •    Active directory & LDAP integration              Monitor all
     •    Set company wide retention policies
                                                         activity history.
     •    Outbound API call integration
     •    Add plug-ins (Zoho, Scribd)
     •    Share up to 100 different file types
     •    Share files up to 2GB                          Keep audit trail
     •    Force Ultrasafe access for files and folders
                                                            reports.
     •    View file statistics
     •    View user statistics


Copyright 2012 InfraScale ™ - CONFIDENTIAL                                   10
™


 FileLocker Features
 Private cloud or Infrascale cloud


                         Infrascale Cloud    Private Cloud
                              We Host           You Host




          FileLocker hosts in our                  Host FileLocker in your network
           military-grade data center               …or S3/AWS/EC2
          $5/user/month                            $5/user/month
          Full administrative controls             Full administrative controls
          Set company-wide retention               Apply LDAP policies
           policies                                 Set company wide retention policies
          Set up one company



Copyright 2012 InfraScale ™ - CONFIDENTIAL                                          11
™


 FileLocker Features
 Public cloud hosting is available immediately.


 Public cloud hosting offers all collaboration,
 administrative, and security features.

 • Start your free account first!
 • Upgrade at $5/user/month
 • Three-tiered encryption
 • Control usage by user
 • Mobile sharing, preview, and access
   for all users
 • Multi-folder desktop sync for all users




Copyright 2012 InfraScale ™ - CONFIDENTIAL        12
™


 FileLocker Features
 Run it in our cloud, your cloud, or any cloud


 Private cloud technical requirements:
 • At least 5Mbps sustained per 1000 customers, burstable up to 1Gbps
 • At least 8 GB of RAM for the VM to run
 • At least Quad-Core 2.13GHz CPU dedicated
 • Storage: any storage that can be exposed to the VM as iSCSI or CIFS storage

Additional features:
• Apply LDAP controls
• Monitor storage usage inside the end user’s data center

 Run it in any cloud:
 • AWS / EC2 / S3
 • Rackspace
 • Your own co-location data center

Copyright 2012 InfraScale ™ - CONFIDENTIAL                                       13
™


 FileLocker Endorsements
 PCWorld, PCMagazine, GigaOm, and Information Week


 “The service should be particularly attractive to collaborators because all
 versions of files are kept for an unlimited amount of time.”
 - PCWorld, November 13th, 2012


 “Management tools will let employers administer users. Another capability that will
 make IT staff smile is that they'll be able to deploy the FileLocker service on their own
 servers. These folks are often uncomfortable with handing over precious private
 corporate information to third-party hosts outside their firewalls.”
 - PCMagazine, November 13th, 2012




Copyright 2012 InfraScale ™ - CONFIDENTIAL                                                   14
™


 FileLocker
 Getting Started


                           Get your free account at
                           www.filelocker.com/signup
                           Or…

                           Call us to talk about hosting your own
                           FileLocker instance!
                           866.479.7182


Copyright 2012 InfraScale ™ - CONFIDENTIAL                          15

More Related Content

What's hot

Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Sean Xie
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudBob Rhubart
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
Microsoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server DatasheetMicrosoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server DatasheetMicrosoft Private Cloud
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONGS CHO
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsBob Rhubart
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallMundo Contact
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorNewvewm
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortTen Sistemas e Redes
 
Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetElliott Lowe
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
DDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS ConferenceDDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS ConferenceGerardo Pardo-Castellote
 

What's hot (19)

Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
 
OMG DDS Security Standard
OMG DDS Security StandardOMG DDS Security Standard
OMG DDS Security Standard
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Microsoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server DatasheetMicrosoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server Datasheet
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by Porticor
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheet
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
My Final Year Project
My Final Year ProjectMy Final Year Project
My Final Year Project
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
DDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS ConferenceDDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS Conference
 

Similar to Introducing FileLocker, Secure Enterprise File Sharing, Syncing and Collaboration

Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should HaveBoxHQ
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationProofpoint
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud CollaborationProofpoint
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Global Business Events
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
Novell Filr Overview
Novell Filr OverviewNovell Filr Overview
Novell Filr OverviewNovell, Inc.
 
IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperJim Kitchen
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationProofpoint
 
Oracle_Documents_Cloud_Service
Oracle_Documents_Cloud_ServiceOracle_Documents_Cloud_Service
Oracle_Documents_Cloud_ServiceSimone Gray
 
Best Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsBest Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsEstuate, Inc.
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODProofpoint
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReaderDirectReader
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfMassimo Bertaccini
 
AWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS securityAWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS securityAmazon Web Services
 
SME ENTERPRISE FILE FABRIC FOR SOFTLAYER
SME ENTERPRISE FILE FABRIC FOR SOFTLAYERSME ENTERPRISE FILE FABRIC FOR SOFTLAYER
SME ENTERPRISE FILE FABRIC FOR SOFTLAYERHybrid Cloud
 
Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsCurrent challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsDominic Haigh
 

Similar to Introducing FileLocker, Secure Enterprise File Sharing, Syncing and Collaboration (20)

Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud Collaboration
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Novell Filr Overview
Novell Filr OverviewNovell Filr Overview
Novell Filr Overview
 
IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical Whitepaper
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 
Oracle_Documents_Cloud_Service
Oracle_Documents_Cloud_ServiceOracle_Documents_Cloud_Service
Oracle_Documents_Cloud_Service
 
Best Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsBest Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security Products
 
Vaultize corp three-pager v14
Vaultize corp three-pager v14Vaultize corp three-pager v14
Vaultize corp three-pager v14
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYOD
 
Zyncro security
Zyncro securityZyncro security
Zyncro security
 
DDS Security
DDS SecurityDDS Security
DDS Security
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReader
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdf
 
AWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS securityAWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS security
 
SME ENTERPRISE FILE FABRIC FOR SOFTLAYER
SME ENTERPRISE FILE FABRIC FOR SOFTLAYERSME ENTERPRISE FILE FABRIC FOR SOFTLAYER
SME ENTERPRISE FILE FABRIC FOR SOFTLAYER
 
Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsCurrent challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutions
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Introducing FileLocker, Secure Enterprise File Sharing, Syncing and Collaboration

  • 1. FileLocker For Enterprise February 2013 1 Copyright 2012 InfraScale ™ - CONFIDENTIAL
  • 2. ™ Introducing FileLocker: Truly secure and scalable collaboration for all organizations. Collaboration Administrative Controls FileLocker In-Network or Offsite Deployment 2 Copyright 2012 InfraScale ™ - CONFIDENTIAL
  • 3. ™ Introducing FileLocker For organizations with specific privacy and security needs. Finance and legal: • Send large files for client and partner review • Protect customer data while sharing it with them. Government: • Keep data in an undecipherable, encrypted state in the cloud. • Keep data in-house, inside your own network. Healthcare: • Data can be stored in FileLocker with UltraSafe™, which prevents it from being shared accidentally (or even on purpose) Art and design: • Send large files for campaigns and client review • Complete live, collaborative commenting and editing sessions in the cloud 3 Copyright 2012 InfraScale ™ - CONFIDENTIAL
  • 4. ™ Why? FileLocker Because a box is not a safe place for your data. The market leading file sharing and collaboration tools carry a security risk. They leave data unencrypted, often at rest in the data center. FileLocker encrypts your data three times: 1. With a private key, client-side (locally) 2. In transit in a 256 SSL tunnel 3. In the cloud with 256 bit AES encryption Your data stored with FileLocker is undecipherable. 4 Copyright 2012 InfraScale ™ - CONFIDENTIAL
  • 5. ™ Introducing FileLocker: What makes FileLocker different? 1. Unmatched Security: Unlike most collaboration solutions, it encrypts data before sending it to the cloud, in transit, and again at rest in the data center. 2. Use any cloud: FileLocker can be installed In the cloud of your choice. - Your on premise server. - Your data center. - The Infrascale cloud. 3. Pricing: Introductory pricing at $5 per user, per month. Increase users at any time. 4. Administrative controls: Complete audit trail reporting, control features by user, monitor activity history. 5 Copyright 2012 InfraScale ™ - CONFIDENTIAL
  • 6. ™ FileLocker Features World class security Most collaboration tools Encrypt data only at rest. 1. Locally 2. In transit 3. In the data FileLocker encrypts it center three times. 6 Copyright 2012 InfraScale ™ - CONFIDENTIAL
  • 7. ™ Gartner confirms: file synchronization tools are putting your private data at risk Gartner has identified the following issues as being caused by unauthorized and unapproved file sharing and synchronization tools. FileLocker has a solution for all of them. Impacts Identified Gartner's FileLocker's Offering by Gartner Recommendation FileLocker can be acquired 1. Provide users with an approved and controlled in an and support personal > organization from the top- Huge amounts of synchronization service. proprietary and down. regulated data are 2. Write and communicate policy Employees will have an leaking onto non- forbidding the use of non-approved > approved collaboration corporate devices, services. solution. outside of enterprise controls and audit trails. 3. Enforce the policy through Employees can use technical controls on endpoints and > FileLocker on any device they the networks. choose and remain secure. 7 Copyright 2012 InfraScale ™ - CONFIDENTIAL
  • 8. ™ Gartner confirms: file synchronization tools are putting your private data at risk Impacts Identified by Gartner's Recommendation FileLocker's Offering Gartner 4. Ensure that all data is encrypted, Ultrasafe password protection can Enterprise files on multi- preferably applied at the endpoint or > be applied at endpoint, with the tenanted public servers are within a security gateway. desktop application. potentially vulnerable to attack or unauthorized access. 5. Consider using an on-premises FileLocker can be deployed on any server. > server, including on-premises. 6. Block unapproved sync software on No need to block FileLocker's sync Compromise of desktop workstations and multifunction > software, as it is controlled by the file-sharing software could devices. organization. enable unauthorized remote access to the enterprise or introduce 7. Evaluate the security and control FileLocker administrators control rapidly spreading malware. mechanisms of vendor endpoint apps. > access and usage by each user. 8 Copyright 2012 InfraScale ™ - CONFIDENTIAL
  • 9. ™ FileLocker Features Collaboration Features Collaboration Features Edit, collaborate, • Edit and preview files (including MS Office) review in the • Sync to multiple desktop folders cloud. • Mobile access, preview, and share at m.FileLocker.com • Global web access Preview and • Send secure links share on smart • Eliminate large file sharing via email phones. • Download files • Upload files • Drag’n’drop files within the application • Upload unlimited versions Kill your email! Copyright 2012 InfraScale ™ - CONFIDENTIAL 9
  • 10. ™ FileLocker Features Private Cloud Administrative Features Co-branding • Add a logo per company • It will be co-branded with FileLocker Monitor and control usage Administrative Controls by user. • Create administrative reports • Audit trail reporting • Active directory & LDAP integration Monitor all • Set company wide retention policies activity history. • Outbound API call integration • Add plug-ins (Zoho, Scribd) • Share up to 100 different file types • Share files up to 2GB Keep audit trail • Force Ultrasafe access for files and folders reports. • View file statistics • View user statistics Copyright 2012 InfraScale ™ - CONFIDENTIAL 10
  • 11. ™ FileLocker Features Private cloud or Infrascale cloud Infrascale Cloud Private Cloud We Host You Host  FileLocker hosts in our  Host FileLocker in your network military-grade data center  …or S3/AWS/EC2  $5/user/month  $5/user/month  Full administrative controls  Full administrative controls  Set company-wide retention  Apply LDAP policies policies  Set company wide retention policies  Set up one company Copyright 2012 InfraScale ™ - CONFIDENTIAL 11
  • 12. ™ FileLocker Features Public cloud hosting is available immediately. Public cloud hosting offers all collaboration, administrative, and security features. • Start your free account first! • Upgrade at $5/user/month • Three-tiered encryption • Control usage by user • Mobile sharing, preview, and access for all users • Multi-folder desktop sync for all users Copyright 2012 InfraScale ™ - CONFIDENTIAL 12
  • 13. ™ FileLocker Features Run it in our cloud, your cloud, or any cloud Private cloud technical requirements: • At least 5Mbps sustained per 1000 customers, burstable up to 1Gbps • At least 8 GB of RAM for the VM to run • At least Quad-Core 2.13GHz CPU dedicated • Storage: any storage that can be exposed to the VM as iSCSI or CIFS storage Additional features: • Apply LDAP controls • Monitor storage usage inside the end user’s data center Run it in any cloud: • AWS / EC2 / S3 • Rackspace • Your own co-location data center Copyright 2012 InfraScale ™ - CONFIDENTIAL 13
  • 14. ™ FileLocker Endorsements PCWorld, PCMagazine, GigaOm, and Information Week “The service should be particularly attractive to collaborators because all versions of files are kept for an unlimited amount of time.” - PCWorld, November 13th, 2012 “Management tools will let employers administer users. Another capability that will make IT staff smile is that they'll be able to deploy the FileLocker service on their own servers. These folks are often uncomfortable with handing over precious private corporate information to third-party hosts outside their firewalls.” - PCMagazine, November 13th, 2012 Copyright 2012 InfraScale ™ - CONFIDENTIAL 14
  • 15. ™ FileLocker Getting Started Get your free account at www.filelocker.com/signup Or… Call us to talk about hosting your own FileLocker instance! 866.479.7182 Copyright 2012 InfraScale ™ - CONFIDENTIAL 15