SlideShare una empresa de Scribd logo
1 de 27
MIS Training Institute Session # - Slide 1
© COMPANY NAME
Do You Know Where Your Data Is?
InfoSec World 2013 Conference & Expo
John Pincus, Senior VP Products.
2
Key points
• Public cloud file sharing has risks as well as
advantages
• Private cloud and hybrid solutions can be
good alternatives
• Whether public or private, some key
considerations for evaluation
3
The Problem:
Sharing Enterprise Content Securely in the iPad Era
4
What Does BYOD Look Like?
5
What Does BYOD Feel Like?
6
The BYOD Challenge
How to make
enterprise content
accessible on
mobile devices while
maintaining control
and security?
7
Definitions
• Cloud computing
• Public cloud
• Private cloud
• Hybrid
8
What IT needs …
LDAP/AD Integration
SSO (SAML, Kerberos, …)
Access control
Encryption in transit, at rest
Logging & Reporting
AV and DLP Integration
Access to Enterprise Content
Archival Integration
9
File sharing in context
Enterprise
Content
DLP
Anti-virus
Archiving
MDM
File Sharing
10
… and what users want
Mobile Access
Collaboration
File Commenting
File Version Tracking
Synced Files/Folders
File Transfer
Notification
11
Why users love the public cloud
“It just works”
“Can get at it from
anywhere”
“Can use whatever device I
want”
“Can share with anybody”
“Don’t have to work with IT!”
12
Dropbox has become “problem child” of cloud security
iCloud Hacking Could Tarnish Apple’s Image
Patriot Act can “obtain” data in
Europe, Researchers Say
Gmail, Google Drive, Chrome experience
outages
Feds Tell Megaupload Users to Forget
About Their Data
Safe Harbor not Safe Enough for EU Cloud Data
13
Why do you believe that public cloud computing services
will have little or no impact on your organization’s IT
strategy over the next five years?
Souce: Evaluating Cloud File Sharing and Collaboration Solutions, ESG,
2012
14
Security concerns
• Public cloud sites are big targets
• You’re at the mercy of their operation
security
• Who has access to the data?
• Some sites don’t encrypt data or restrict
additional sharing
• But …
• Public cloud security is generally
improving
• Some sites do pay a lot of attention to
security
• Have to weigh risks …
15
Legal and privacy concerns
• Third-party doctrine
• Data location
– Country-of-origin rules
– Article 29 Working Party
– PATRIOT Act concerns
• Will you get notified (and have a chance to fight) about any
court orders?
• What rights does the service provider claim with respect to
your data?
16
Terms of Service: Google Drive
http://www.google.com/intl/en/policies/terms/
"When you upload or otherwise submit content to our Services,
you give Google Drive (and those we work with) a worldwide
license to use, host, store, reproduce, modify, create derivative
works (such as those resulting from translations, adaptations or
other changes we make so that your content works better with
our Services), communicate, publish, publicly perform, publicly
display and distribute such content. The rights you grant in this
license are for the limited purpose of operating, promoting, and
improving our Services, and to develop new ones. This license
continues even if you stop using our Services…”
17
Terms of Service: Google Drive
http://www.google.com/intl/en/policies/terms/
"When you upload or otherwise submit content to our
Services, you give Google Drive (and those we work with) a
worldwide license to use, host, store, reproduce, modify, create
derivative works (such as those resulting from
translations, adaptations or other changes we make so that your
content works better with our
Services), communicate, publish, publicly perform, publicly
display and distribute such content. The rights you grant in this
license are for the limited purpose of operating, promoting, and
improving our Services, and to develop new ones. This license
continues even if you stop using our Services…”
18
All about control
• Our must-have feature checklist:
• Proven functionality that “works”
• Tight security controls:
• File tracking and reporting
• Access permissions
• Encryption at rest and transit
• LDAP/Active Directory integration
• Around-the-clock reliability
• BYOD support
• Multiple OSs and devices
• File synchronization
• Remote wiping
• Support for all file sizes and formats
• We wanted control within our own datacenter
19
Private cloud as an alternative
• Hosted in your own data center
• Under your control
20
Why users love the private cloud
“It just works”
“Can get at it from anywhere”
(subject to corporate policies)
“Can use whatever device I want”
(subject to corporate policies)
“Can share with anybody”
(subject to corporate policies)
“Don’t have to work with IT!”
(once the system’s up and running)
21
Private Cloud or Public Cloud?
• Mininimize investment? Achieve
excellence?
Investment in IT and
operational security?
• CFO preference?CapEx vs OpEx?
• Patriot Act, Safe Harbor Privacy
Data Physical
Location?
• No solution is 100% secureCorporate DNA and
tolerance for risk?
Enterprise Considerations for File
Sharing and Collaboration
• Security controls
• Compliance and reporting
• Scalability and availability
• Leverage existing content stores
• Enterprise integrations
22
Whether public or private cloud …
Accellion Confidential 23
Compliance and Reporting
Reporting
Granularity of auditing and
reporting
Export to 3rd party reporting
Log formatting for export
SNMP (Monitoring)
Compliance
PCI /SOX / HIPAA
FIPS Compliance
Archiving and E-Discovery
Integration with SIEM, IT GRC
Accellion Confidential 24
Security Controls
Enterprise Security
•Anti-Virus
•Data Loss Prevention
•Restricted Admin Access to Content
•Hardened Server Appliance
•Data Residency
Authentication / Authorization
•SSO with SAML / OAuth / Kerberos
•Multi-LDAP and AD integration
•Two-Factor Authentication
•Password Policies
•RBAC
•Granular Authorization
Encryption
•Encryption – Data at Rest and in Motion
•Encryption Strength
•Ownership of Encryption Keys
•FIPS 140-2 Certification
Mobile Security
•Secure Mobile Container
•Whitelisted Helper Applications
•Server Side Viewing
•Remote Wipe
•Offline PIN
Accellion Confidential 25
And don’t forget about the users!
“It just works”
“Can get at it from anywhere”
(subject to corporate policies)
“Can use whatever device I want”
(subject to corporate policies)
“Can share with anybody”
(subject to corporate policies)
26
Conclusion
• No one right answer
• Public cloud has risks along with benefits
• Private cloud is a viable alternative
• Hybrid approaches (mix of public and private
cloud) may be the best answer
• Security evaluation criteria apply no matter
whether it’s public or private
Accellion provides enterprise-class mobile file sharing
solutions that enable secure anytime, anywhere access to
information while ensuring enterprise security and
compliance.
The world’s leading corporations and government agencies
select Accellion to protect intellectual property, ensure
compliance, improve business productivity and reduce IT
cost.
Learn more about Accellion here: www.accellion.com
Connect with Accellion here:
About Accellion

Más contenido relacionado

La actualidad más candente

Enterprise File Fabric for Igneous
Enterprise File Fabric for IgneousEnterprise File Fabric for Igneous
Enterprise File Fabric for IgneousHybrid Cloud
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersGokul Alex
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkDavid Strom
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...Ulf Mattsson
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security IntroductionGLC Networks
 
How to keep track of cloud costs
How to keep track of cloud costsHow to keep track of cloud costs
How to keep track of cloud costsDavid Strom
 
Dutch Microsoft & Security Meetup - How to protect my data in Office 365?
Dutch Microsoft & Security Meetup - How to protect my data in Office 365?Dutch Microsoft & Security Meetup - How to protect my data in Office 365?
Dutch Microsoft & Security Meetup - How to protect my data in Office 365?Maarten Eekels
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Albert Hoitingh
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingDavid Strom
 
Content Collaboration - Prevent data loss in a global digital future
Content Collaboration - Prevent data loss in a global digital futureContent Collaboration - Prevent data loss in a global digital future
Content Collaboration - Prevent data loss in a global digital futureAxway
 
Cisco web ex cloud security
Cisco web ex cloud securityCisco web ex cloud security
Cisco web ex cloud securityebingeorge2010
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...Ulf Mattsson
 
Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model Denodo
 
Azure for beginners series session 4
Azure for beginners series session 4Azure for beginners series session 4
Azure for beginners series session 4Lalit Rawat
 
(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security ProfessionalHatem ElSahhar
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011Donald E. Hester
 

La actualidad más candente (20)

Enterprise File Fabric for Igneous
Enterprise File Fabric for IgneousEnterprise File Fabric for Igneous
Enterprise File Fabric for Igneous
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
How to keep track of cloud costs
How to keep track of cloud costsHow to keep track of cloud costs
How to keep track of cloud costs
 
Dutch Microsoft & Security Meetup - How to protect my data in Office 365?
Dutch Microsoft & Security Meetup - How to protect my data in Office 365?Dutch Microsoft & Security Meetup - How to protect my data in Office 365?
Dutch Microsoft & Security Meetup - How to protect my data in Office 365?
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
 
SHIP Brochure
SHIP BrochureSHIP Brochure
SHIP Brochure
 
Content Collaboration - Prevent data loss in a global digital future
Content Collaboration - Prevent data loss in a global digital futureContent Collaboration - Prevent data loss in a global digital future
Content Collaboration - Prevent data loss in a global digital future
 
Cisco web ex cloud security
Cisco web ex cloud securityCisco web ex cloud security
Cisco web ex cloud security
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...
 
Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model
 
Azure for beginners series session 4
Azure for beginners series session 4Azure for beginners series session 4
Azure for beginners series session 4
 
(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
 

Destacado

TechWiseTV Workshop: Stealthwatch Learning Network License
TechWiseTV Workshop: Stealthwatch Learning Network LicenseTechWiseTV Workshop: Stealthwatch Learning Network License
TechWiseTV Workshop: Stealthwatch Learning Network LicenseRobb Boyd
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsUppala Anand
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 

Destacado (6)

TechWiseTV Workshop: Stealthwatch Learning Network License
TechWiseTV Workshop: Stealthwatch Learning Network LicenseTechWiseTV Workshop: Stealthwatch Learning Network License
TechWiseTV Workshop: Stealthwatch Learning Network License
 
Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar a Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference presentation

Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)PT Datacomm Diangraha
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingCipherCloud
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itHentsū
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODProofpoint
 
LT-1 Language Technology and the Sharing Economy
LT-1 Language Technology and the Sharing EconomyLT-1 Language Technology and the Sharing Economy
LT-1 Language Technology and the Sharing EconomyJoseph Wojowski
 
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for itAndy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for itNordic Infrastructure Conference
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityJisc
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityAndy Powell
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Windows Azure Security & Compliance
Windows Azure Security & ComplianceWindows Azure Security & Compliance
Windows Azure Security & ComplianceNuno Godinho
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewAlert Logic
 
cloud-20deployments-20model-131226165813-phpapp01.pptx
cloud-20deployments-20model-131226165813-phpapp01.pptxcloud-20deployments-20model-131226165813-phpapp01.pptx
cloud-20deployments-20model-131226165813-phpapp01.pptx20DC11NOUFALN
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsMichael Scheidell
 
Modernize Your Network Shares
Modernize Your Network SharesModernize Your Network Shares
Modernize Your Network SharesAxway
 
Concept of Cloud Computing
Concept of Cloud ComputingConcept of Cloud Computing
Concept of Cloud ComputingAnne Starr
 
Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Fuji Xerox Asia Pacific
 

Similar a Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference presentation (20)

Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYOD
 
LT-1 Language Technology and the Sharing Economy
LT-1 Language Technology and the Sharing EconomyLT-1 Language Technology and the Sharing Economy
LT-1 Language Technology and the Sharing Economy
 
Understanding the Cloud
Understanding the CloudUnderstanding the Cloud
Understanding the Cloud
 
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for itAndy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Windows Azure Security & Compliance
Windows Azure Security & ComplianceWindows Azure Security & Compliance
Windows Azure Security & Compliance
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
cloud-20deployments-20model-131226165813-phpapp01.pptx
cloud-20deployments-20model-131226165813-phpapp01.pptxcloud-20deployments-20model-131226165813-phpapp01.pptx
cloud-20deployments-20model-131226165813-phpapp01.pptx
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile Apps
 
GDPR v pojetí F5
GDPR v pojetí F5GDPR v pojetí F5
GDPR v pojetí F5
 
Modernize Your Network Shares
Modernize Your Network SharesModernize Your Network Shares
Modernize Your Network Shares
 
Concept of Cloud Computing
Concept of Cloud ComputingConcept of Cloud Computing
Concept of Cloud Computing
 
Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?
 

Más de Proofpoint

You can wear it!
You can wear it!You can wear it!
You can wear it!Proofpoint
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Proofpoint
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePointProofpoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File SharingProofpoint
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsProofpoint
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsProofpoint
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Proofpoint
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityProofpoint
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Proofpoint
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Proofpoint
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Proofpoint
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityProofpoint
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile PrintingProofpoint
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepointProofpoint
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationProofpoint
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IIProofpoint
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part IProofpoint
 

Más de Proofpoint (20)

You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part II
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part I
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference presentation

  • 1. MIS Training Institute Session # - Slide 1 © COMPANY NAME Do You Know Where Your Data Is? InfoSec World 2013 Conference & Expo John Pincus, Senior VP Products.
  • 2. 2 Key points • Public cloud file sharing has risks as well as advantages • Private cloud and hybrid solutions can be good alternatives • Whether public or private, some key considerations for evaluation
  • 3. 3 The Problem: Sharing Enterprise Content Securely in the iPad Era
  • 4. 4 What Does BYOD Look Like?
  • 5. 5 What Does BYOD Feel Like?
  • 6. 6 The BYOD Challenge How to make enterprise content accessible on mobile devices while maintaining control and security?
  • 7. 7 Definitions • Cloud computing • Public cloud • Private cloud • Hybrid
  • 8. 8 What IT needs … LDAP/AD Integration SSO (SAML, Kerberos, …) Access control Encryption in transit, at rest Logging & Reporting AV and DLP Integration Access to Enterprise Content Archival Integration
  • 9. 9 File sharing in context Enterprise Content DLP Anti-virus Archiving MDM File Sharing
  • 10. 10 … and what users want Mobile Access Collaboration File Commenting File Version Tracking Synced Files/Folders File Transfer Notification
  • 11. 11 Why users love the public cloud “It just works” “Can get at it from anywhere” “Can use whatever device I want” “Can share with anybody” “Don’t have to work with IT!”
  • 12. 12 Dropbox has become “problem child” of cloud security iCloud Hacking Could Tarnish Apple’s Image Patriot Act can “obtain” data in Europe, Researchers Say Gmail, Google Drive, Chrome experience outages Feds Tell Megaupload Users to Forget About Their Data Safe Harbor not Safe Enough for EU Cloud Data
  • 13. 13 Why do you believe that public cloud computing services will have little or no impact on your organization’s IT strategy over the next five years? Souce: Evaluating Cloud File Sharing and Collaboration Solutions, ESG, 2012
  • 14. 14 Security concerns • Public cloud sites are big targets • You’re at the mercy of their operation security • Who has access to the data? • Some sites don’t encrypt data or restrict additional sharing • But … • Public cloud security is generally improving • Some sites do pay a lot of attention to security • Have to weigh risks …
  • 15. 15 Legal and privacy concerns • Third-party doctrine • Data location – Country-of-origin rules – Article 29 Working Party – PATRIOT Act concerns • Will you get notified (and have a chance to fight) about any court orders? • What rights does the service provider claim with respect to your data?
  • 16. 16 Terms of Service: Google Drive http://www.google.com/intl/en/policies/terms/ "When you upload or otherwise submit content to our Services, you give Google Drive (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content. The rights you grant in this license are for the limited purpose of operating, promoting, and improving our Services, and to develop new ones. This license continues even if you stop using our Services…”
  • 17. 17 Terms of Service: Google Drive http://www.google.com/intl/en/policies/terms/ "When you upload or otherwise submit content to our Services, you give Google Drive (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content. The rights you grant in this license are for the limited purpose of operating, promoting, and improving our Services, and to develop new ones. This license continues even if you stop using our Services…”
  • 18. 18 All about control • Our must-have feature checklist: • Proven functionality that “works” • Tight security controls: • File tracking and reporting • Access permissions • Encryption at rest and transit • LDAP/Active Directory integration • Around-the-clock reliability • BYOD support • Multiple OSs and devices • File synchronization • Remote wiping • Support for all file sizes and formats • We wanted control within our own datacenter
  • 19. 19 Private cloud as an alternative • Hosted in your own data center • Under your control
  • 20. 20 Why users love the private cloud “It just works” “Can get at it from anywhere” (subject to corporate policies) “Can use whatever device I want” (subject to corporate policies) “Can share with anybody” (subject to corporate policies) “Don’t have to work with IT!” (once the system’s up and running)
  • 21. 21 Private Cloud or Public Cloud? • Mininimize investment? Achieve excellence? Investment in IT and operational security? • CFO preference?CapEx vs OpEx? • Patriot Act, Safe Harbor Privacy Data Physical Location? • No solution is 100% secureCorporate DNA and tolerance for risk?
  • 22. Enterprise Considerations for File Sharing and Collaboration • Security controls • Compliance and reporting • Scalability and availability • Leverage existing content stores • Enterprise integrations 22 Whether public or private cloud …
  • 23. Accellion Confidential 23 Compliance and Reporting Reporting Granularity of auditing and reporting Export to 3rd party reporting Log formatting for export SNMP (Monitoring) Compliance PCI /SOX / HIPAA FIPS Compliance Archiving and E-Discovery Integration with SIEM, IT GRC
  • 24. Accellion Confidential 24 Security Controls Enterprise Security •Anti-Virus •Data Loss Prevention •Restricted Admin Access to Content •Hardened Server Appliance •Data Residency Authentication / Authorization •SSO with SAML / OAuth / Kerberos •Multi-LDAP and AD integration •Two-Factor Authentication •Password Policies •RBAC •Granular Authorization Encryption •Encryption – Data at Rest and in Motion •Encryption Strength •Ownership of Encryption Keys •FIPS 140-2 Certification Mobile Security •Secure Mobile Container •Whitelisted Helper Applications •Server Side Viewing •Remote Wipe •Offline PIN
  • 25. Accellion Confidential 25 And don’t forget about the users! “It just works” “Can get at it from anywhere” (subject to corporate policies) “Can use whatever device I want” (subject to corporate policies) “Can share with anybody” (subject to corporate policies)
  • 26. 26 Conclusion • No one right answer • Public cloud has risks along with benefits • Private cloud is a viable alternative • Hybrid approaches (mix of public and private cloud) may be the best answer • Security evaluation criteria apply no matter whether it’s public or private
  • 27. Accellion provides enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to information while ensuring enterprise security and compliance. The world’s leading corporations and government agencies select Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT cost. Learn more about Accellion here: www.accellion.com Connect with Accellion here: About Accellion

Notas del editor

  1. It must offer Secure Mobility. Business users have to take comfort in knowing that the enterprise content they work with is always secure.Everything that a mobile user does with a file, (download, upload, save, edit, send, or just keep locally) should be allowed to happen in a secure environment transparently and w/oburdening the mobile user. And behind the scenes, it should offer the best encryption technology, and support logging and tracking of content required to comply with regularity requirements. Even files that are just at rest in on a device are placed in a container.This is vital, particularly for enterprises in regulated industries.