SlideShare a Scribd company logo
1 of 13
Have Content, Will Travel: Securely Sharing
Mobile Content in the Cloud Part II
TechForum‟s Security Forum: Emerging Trends in
Enterprise Security
Security Considerations for Mobile
        Content Access & Sharing

     User                  Encryption
      Policies, Profiles       (cloud, device, tr
     MDM, Apple               ansit)
      Security Policies       Authentication
     Authorized              SSO
      Access                  Auto Credentials
     Passcode                 (LDAP, AD)
      Policies for local      Compliance
      device



                                                    2
EMM = MDM + MAM + MCM


                  Mobile
                Application
                Managemen
                     t


                               Mobile Content
                              Delivery, Control &
Mobile Device
                                 Management
Management

                                                3
Accellion Secure Mobile File
      Sharing Solution

   Provide enterprise-class solution that
enables secure anytime, anywhere access to
 enterprise content while ensuring security
              and compliance.
Who is Accellion?
• Founded 1999
• HQ in Palo Alto, CA
                          Top 100 Companies that Matter.

• 1,400+ Enterprise
  Customers, 9+ Million
  Enterprise Users
• 96% Loyalty Rate
Who Are Our Customers?
Government   Healthcare   Pharma   Financial   Consumer   Advertising   Energy
                                   Services    Products
Accellion Mobile Content Secure Container
Secure Anytime, Anywhere Access to
             Enterprise Content




8   = Accellion Deployment in the Cloud
1. Mobile Content Enabler
2. Mobile File Security

                 • File Encryption in transit and at-rest
                 • User Level Authentication
                 • FIPS 140-2 Level Certification
                 • SAS-70
                 • HIPAA, SOX, GLBA compliance




                                                      10
3. Cross-Platform




                    11
4. Enterprise-Class




                      12
5. Hybrid Cloud Deployment




                  “For most enterprises, a
                  virtualized, automated on-premises
                  infrastructure with a hosted, elastic
                  option will be the best approach – the
                  „hybrid‟ model.”
                                                      13
                  -- William Fellows, Agatha Poon –

More Related Content

What's hot

Hot Cloud Companies: Tap in Systems
Hot Cloud Companies: Tap in SystemsHot Cloud Companies: Tap in Systems
Hot Cloud Companies: Tap in Systems
OpSource
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
OpenSourceCamp
 

What's hot (10)

Hot Cloud Companies: Tap in Systems
Hot Cloud Companies: Tap in SystemsHot Cloud Companies: Tap in Systems
Hot Cloud Companies: Tap in Systems
 
La era de los smart devices mexico
La era de los smart devices mexicoLa era de los smart devices mexico
La era de los smart devices mexico
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of Things
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
 
Cloud ID
Cloud IDCloud ID
Cloud ID
 
The KNOX Story
The KNOX StoryThe KNOX Story
The KNOX Story
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
Ping Identity
Ping IdentityPing Identity
Ping Identity
 

Viewers also liked

Viewers also liked (6)

LinkedIn The "Knowledge" platform
LinkedIn The "Knowledge" platform LinkedIn The "Knowledge" platform
LinkedIn The "Knowledge" platform
 
[Enterprise Social Platform] Socialware 'Tigris' introduction_EN
[Enterprise Social Platform] Socialware 'Tigris' introduction_EN[Enterprise Social Platform] Socialware 'Tigris' introduction_EN
[Enterprise Social Platform] Socialware 'Tigris' introduction_EN
 
Knowledge Plaza - Unified Knowledge Sharing (EN)
Knowledge Plaza - Unified Knowledge Sharing (EN)Knowledge Plaza - Unified Knowledge Sharing (EN)
Knowledge Plaza - Unified Knowledge Sharing (EN)
 
Simplifying Enterprise Mobility Terms - DronaHQ
Simplifying Enterprise Mobility Terms - DronaHQ Simplifying Enterprise Mobility Terms - DronaHQ
Simplifying Enterprise Mobility Terms - DronaHQ
 
Mentor Circles
Mentor CirclesMentor Circles
Mentor Circles
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentation
 

Similar to Have content, will travel securely sharing mobile content in the cloud part II

AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
Lenin Aboagye
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Amazon Web Services
 
Tempo - Mobile access with Governance
Tempo - Mobile access with GovernanceTempo - Mobile access with Governance
Tempo - Mobile access with Governance
Gabe Faraone
 

Similar to Have content, will travel securely sharing mobile content in the cloud part II (20)

Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scripted
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Mobilemonday b2b mobco
Mobilemonday b2b   mobcoMobilemonday b2b   mobco
Mobilemonday b2b mobco
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part I
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 
Tempo - Mobile access with Governance
Tempo - Mobile access with GovernanceTempo - Mobile access with Governance
Tempo - Mobile access with Governance
 

More from Proofpoint

The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
Proofpoint
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
Proofpoint
 

More from Proofpoint (18)

You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud.
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

Have content, will travel securely sharing mobile content in the cloud part II

  • 1. Have Content, Will Travel: Securely Sharing Mobile Content in the Cloud Part II TechForum‟s Security Forum: Emerging Trends in Enterprise Security
  • 2. Security Considerations for Mobile Content Access & Sharing  User  Encryption Policies, Profiles (cloud, device, tr  MDM, Apple ansit) Security Policies  Authentication  Authorized  SSO Access  Auto Credentials  Passcode (LDAP, AD) Policies for local  Compliance device 2
  • 3. EMM = MDM + MAM + MCM Mobile Application Managemen t Mobile Content Delivery, Control & Mobile Device Management Management 3
  • 4. Accellion Secure Mobile File Sharing Solution Provide enterprise-class solution that enables secure anytime, anywhere access to enterprise content while ensuring security and compliance.
  • 5. Who is Accellion? • Founded 1999 • HQ in Palo Alto, CA Top 100 Companies that Matter. • 1,400+ Enterprise Customers, 9+ Million Enterprise Users • 96% Loyalty Rate
  • 6. Who Are Our Customers? Government Healthcare Pharma Financial Consumer Advertising Energy Services Products
  • 7. Accellion Mobile Content Secure Container
  • 8. Secure Anytime, Anywhere Access to Enterprise Content 8 = Accellion Deployment in the Cloud
  • 10. 2. Mobile File Security • File Encryption in transit and at-rest • User Level Authentication • FIPS 140-2 Level Certification • SAS-70 • HIPAA, SOX, GLBA compliance 10
  • 13. 5. Hybrid Cloud Deployment “For most enterprises, a virtualized, automated on-premises infrastructure with a hosted, elastic option will be the best approach – the „hybrid‟ model.” 13 -- William Fellows, Agatha Poon –

Editor's Notes

  1. The Challenge also extends to implementing all of the various Security Consideration for Content Sharing and Access.These Include:However, the most important consideration Is the understanding that:
  2. …. An enterprise mobility solutions that addresses the Risks and Challenges of CoITConsumer Clouds is not about restricting device functionality and its access.Most IT departments adopt an MDM solution, restrict devices and force everybody to play in a sandbox. I have sat in many meeting with our financial services customers and prospects where they have begun with an MDM solution only to find out out that it is not sufficient. And it’s funny that they usually begin by saying if we partner with their MDM solution vendor.Embracing the new model is not sufficient through managing and restricting mobile applications either. Many of the MDM vendors today offer some level of app management as well. It is either through a walled Garden or white listed approach, or an Enterprise App Store model. These MAM solution may provide monitoring and securing app and app data (and quarantining apps if they act suspicious), but what about the content they access?A comprehensive EMM solution that addressesBYOD, Consumer Cloud challenges and mitigates their Risks has to have three components:Mobile Device Management, Mobile Application Management and Mobile Content Delivery and control. The good news is that most enterprises are beginning to catch on this important distinction that mobility of content has to be a solution as solution of its own. Cause that is exactly what Accellion offers, which MDM and MAM players do not offer. The bad news is that as not many Enterprises know who Accellion is. We are a best kept secret.
  3. What we provide to our financial services customers is, simply said:an enterprise-class mobile file sharing solution that enables secure anytime, anywhere access to informationwhile ensuring enterprise security and compliance.
  4. We are a private company with HQ in Palo Alto. We were founded in 1999 and today have over 1400 Enterprise Customers and 9M Enterprise users.Our solution is a robust enterprise offering and has gone through many years of innovation and maturity.Our solution has received several Excellence Awards by Tech-Ed, Network Computing and three times by Info Security, most recent of which was in 2011, for its Customer Trust.That is why we currently enjoy a 96% loyalty rate by our customers. That is to say, 96% of our customers renew their licenses with us.
  5. We focus on secure delivery and control of content that is used by mobile users. Almost none of the players in the MDM or MAM market segments offer the content mobility aspect of the total EMM.What I’d like to talk about next is the criteria and the value propositions that you should look for in a content mobility solution.My emphasis here is to identify for you what mobile file sharing solutions should bring to the table, to enableyou to harness the benefits of Cloud and mobility of content, securely.How we implement this is simply by providing a container within which mobile users can access content, with their popular mobile devices. It is transparent to the mobile user, but offers a secure environment.All content accessed by Accellion mobile apps--whether the app is running on an iPhone, iPad, Android or BlackBerry device; and all content accessed from an Accellion Cloud--whether it is a private, public or hybrid Cloudis kept in a container that is encrypted and can only be accessed by that authenticated user. It can not leak out, as long as it is in that container.
  6. This is what we mean by secure, anytime, anywhere access to your files and your corporate content that sits in other content management systems with Accellion.
  7. It has to act as an enabler. It has to remove impediments for IT to allow employees to access, collaborate, share content securely while mobile. In other words, it has to have a mobile app that lets biz users do what they want, and have the management and control capabilities to stop things if they go wrong.Only 20% of large enterprises have a remote mobile workforce. What accounts for such low %age areis because most solutions do not offer this very basic aspect.
  8. It must offer Secure Mobility. Business users have to take comfort in knowing that the enterprise content they work with is always secure.Everything that a mobile user does with a file, (download, upload, save, edit, send, or just keep locally) should be allowed to happen in a secure environment transparently and w/oburdening the mobile user. And behind the scenes, it should offer the best encryption technology, and support logging and tracking of content required to comply with regularity requirements. Even files that are just at rest in on a device are placed in a container.This is vital, particularly for enterprises in regulated industries.
  9. Cross PlatformToday’s road warriors are not limited to sales people who have been given provisioned BlackBerry devices. They include everyone, with a variety of smartphones and tablets across multiple mobile platforms. The mobile file sharing app must run on all popular platforms, including Apple, Android and BlackBerry OS, which basically cover 95% of mobile devices in use today by business users.
  10. To an average mobile biz user, it must look like it is just a simple Mobile app that one downloads from the App Store. But it talks to a back-end.That back-end has to be Enterprise ClassIt must be scalable, offer availability and redundancy, but speed of delivery of content to a large number of mobile business users out-of-the-box, and still provide room for growth.Most solutions today begin to degrade beyond a couple of thousands of subscribers. Accellion’s offering maintains the same delivery performance for organizations of 100,000+ mobile users.Further, the solution should integrate with existing corporate directory implementations such as LDAP and AD.
  11. The solution has to addresses both categories of CIO objectives: those who want to deploy a highly secure Cloud solution that meets key regulatory standards, and those who’s need is to simply deploy Cloud-based mobile file sharing solution that is robust and just works.It should be able to be deployed as a private Cloud (i.e., on-premise), public Cloud, or as hybrid of both. Not all companies would like to put their sensitive corporate content on a public cloud. Incidentally, This deployment option capability is not just a value proposition of Accellion Solution, it is also an important differentiator for Accellion; William Fellow of 451 Research Group totally supports this.