Enviar búsqueda
Cargar
Cite conference intralinks_industrialization_or_consumerization_final
•
1 recomendación
•
674 vistas
Intralinks
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 11
Descargar ahora
Descargar para leer sin conexión
Recomendados
Safe code CSA cloud final1213
Safe code CSA cloud final1213
Giuliano Tavaroli
Eliminating Security Uncertainty
Eliminating Security Uncertainty
Dell World
Dwyer ISSA Presentation
Dwyer ISSA Presentation
Cathy Dwyer
Backup
Backup
Badr MSDK
Philippines ‘lagging behind’ on cloud adoption
Philippines ‘lagging behind’ on cloud adoption
John Davis
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
Elastica Inc.
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Black Duck by Synopsys
Enabling Dropbox for Business
Enabling Dropbox for Business
Elastica Inc.
Recomendados
Safe code CSA cloud final1213
Safe code CSA cloud final1213
Giuliano Tavaroli
Eliminating Security Uncertainty
Eliminating Security Uncertainty
Dell World
Dwyer ISSA Presentation
Dwyer ISSA Presentation
Cathy Dwyer
Backup
Backup
Badr MSDK
Philippines ‘lagging behind’ on cloud adoption
Philippines ‘lagging behind’ on cloud adoption
John Davis
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
Elastica Inc.
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Black Duck by Synopsys
Enabling Dropbox for Business
Enabling Dropbox for Business
Elastica Inc.
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
Citrix
Managing insider threat
Managing insider threat
milliemill
My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD Express
Vera Trubacheva
Social Media Can Not Be Ignored
Social Media Can Not Be Ignored
richard_turner
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
ramesh209
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Peter Bihr
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
Elastica Inc.
Are Your IT Systems Secure?
Are Your IT Systems Secure?
Nex-Tech
Protecting your Data in Google Apps
Protecting your Data in Google Apps
Elastica Inc.
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
Elastica Inc.
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
CableLabs
Shadow Data Exposed
Shadow Data Exposed
Elastica Inc.
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
- Mark - Fullbright
Secure Remote Browser
Secure Remote Browser
Citrix
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
Mike Brannon
Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016
Yann Lecourt
Analytics Cybersecurity Predictions 2016
Analytics Cybersecurity Predictions 2016
Christine Astovasadourian
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
Omar Khawaja
Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018
tcelik
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Intralinks
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
Intralinks
Where in the world is your Corporate data?
Where in the world is your Corporate data?
Ashish Patel
Más contenido relacionado
La actualidad más candente
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
Citrix
Managing insider threat
Managing insider threat
milliemill
My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD Express
Vera Trubacheva
Social Media Can Not Be Ignored
Social Media Can Not Be Ignored
richard_turner
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
ramesh209
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Peter Bihr
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
Elastica Inc.
Are Your IT Systems Secure?
Are Your IT Systems Secure?
Nex-Tech
Protecting your Data in Google Apps
Protecting your Data in Google Apps
Elastica Inc.
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
Elastica Inc.
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
CableLabs
Shadow Data Exposed
Shadow Data Exposed
Elastica Inc.
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
- Mark - Fullbright
Secure Remote Browser
Secure Remote Browser
Citrix
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
Mike Brannon
Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016
Yann Lecourt
Analytics Cybersecurity Predictions 2016
Analytics Cybersecurity Predictions 2016
Christine Astovasadourian
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
Omar Khawaja
Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018
tcelik
La actualidad más candente
(19)
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
Managing insider threat
Managing insider threat
My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD Express
Social Media Can Not Be Ignored
Social Media Can Not Be Ignored
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
Are Your IT Systems Secure?
Are Your IT Systems Secure?
Protecting your Data in Google Apps
Protecting your Data in Google Apps
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
Shadow Data Exposed
Shadow Data Exposed
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
Secure Remote Browser
Secure Remote Browser
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016
Analytics Cybersecurity Predictions 2016
Analytics Cybersecurity Predictions 2016
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018
Similar a Cite conference intralinks_industrialization_or_consumerization_final
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Intralinks
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
Intralinks
Where in the world is your Corporate data?
Where in the world is your Corporate data?
Ashish Patel
Enterprise it consumerization survey
Enterprise it consumerization survey
Andrew Wong
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
Relayware
Advanced threat protection and big data
Advanced threat protection and big data
Peter Wood
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat Intelligence
Imperva
BYOD and Security Trends
BYOD and Security Trends
Cisco Russia
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented data
Hybrid Cloud
vip_day_2._1130_cloud
vip_day_2._1130_cloud
Nicholas Chia
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Minh Le
Rochester Security Event
Rochester Security Event
calebbarlow
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2016
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Amanda Morris
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessis
itnewsafrica
Seclore Corporate Profile
Seclore Corporate Profile
patelhiranya
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Jeremy Siewert
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
Marcel Hoffmann
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
Pronq by HP
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Murray Security Services
Similar a Cite conference intralinks_industrialization_or_consumerization_final
(20)
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
Where in the world is your Corporate data?
Where in the world is your Corporate data?
Enterprise it consumerization survey
Enterprise it consumerization survey
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
Advanced threat protection and big data
Advanced threat protection and big data
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat Intelligence
BYOD and Security Trends
BYOD and Security Trends
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented data
vip_day_2._1130_cloud
vip_day_2._1130_cloud
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Rochester Security Event
Rochester Security Event
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessis
Seclore Corporate Profile
Seclore Corporate Profile
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Último
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
Wes McKinney
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Inflectra
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
Ravi Sanghani
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
AliaaTarek5
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Farhan Tariq
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
panagenda
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Nicole Novielli
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Ingrid Airi González
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
IES VE
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
UiPathCommunity
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
Skynet Technologies
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Nathaniel Shimoni
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
Neo4j
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Hiroshi SHIBATA
Último
(20)
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
How to write a Business Continuity Plan
How to write a Business Continuity Plan
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Cite conference intralinks_industrialization_or_consumerization_final
1.
6/5/2013 1 Copyright © Intralinks
2013 all rights reserved Industrialization or Consumerization? What We Can Learn from Each for Effective, Enterprise Collaboration John Landy CTO, Intralinks Inc. 1 #IntralinksVIA Copyright © Intralinks 2013 all rights reserved SPEED 2 PRECISIONSIMPLE They want to keep getting work done with familiar, easy to use tools Consumerization of the workforce
2.
6/5/2013 2 Copyright © Intralinks
2013 all rights reserved “I don’t care how you do it, just get their feedback on the file—fast” “I’ll send those product design files to you real quick on WannaShare®” “Wait! That file wasn’t meant to go out!” 3 Consumerization of the workforce Copyright © Intralinks 2013 all rights reserved *http://www.wired.com/threatlevel/2011/05/dropbox-ftc/ Hard facts about data loss Options: 200+ vendors in FSS market Security: Consumer grade FSS & freeware don’t necessarily encrypt your files* File sharing user base: 40m daily active users in US alone Forecast: 1 in 5 companies will experience data leakage from consumer apps by 2018 Overwhelming Questionable Threatening Enormous Content: Data in motion vs data at restRippling
3.
6/5/2013 3 Copyright © Intralinks
2013 all rights reserved 5 The “Unshare” real-life oops moments Incidents involving inadvertent data disclosure or a data governance/process/policy failure Jan Feb March April May June July Aug Sept Oct Nov Dec Source: CyberFactors, LLC, a wholly owned subsidiary of CyberRisk Partners, LLC and sister company of CloudInsure.com, LLC Wells Fargo: 130 records (SSNs, PII) Valencia College: 9,000 records (PII) Certified General Accountants (CGA) Association of British Columbia: 4,600 records (PII) Texas A&M: 4,000 records (SSNs, PII) Elections New Brunswick: 553,000 records (PII) Cunard Cruise Line: 1,225 records (PII) Wisconsin Dept. of Revenue: 110,795 records (PII) Essex County Council: 400 records (PII, Financial data) Aegon: 35 records (PII) Groene Hart Ziekenhuis (Green Heart Hospital): 493,000 records (PHI) Plymouth City Council: 1 record (PII) Jackson North medical Center: 566 records (PHI) Copyright © Intralinks 2013 all rights reserved 6 Data loss risks: Healthcare oops moments
4.
6/5/2013 4 Copyright © Intralinks
2013 all rights reserved 7 Productivity vs. Security Security & Control Freedom & Productivity Share UNshare Lifetime content control Productivity beyond boundaries You’re Here Business Communities Copyright © Intralinks 2013 all rights reserved 8 Intralinks security approach UNshare Granular Controls Folder-level Permissions Role-Based Access Control Virus Scanning MOU27
5.
Slide 8 MOU27 We
will have different names for the stacks, coming soon. Microsoft Office User, 5/28/2013
6.
6/5/2013 5 Copyright © Intralinks
2013 all rights reserved 9Source: Gartner ‘Market Share All Software Markets, Worldwide, 2012,’ March 2013, G00250533 Intralinks Use Cases Used by over 800 of the Fortune 1000 MOU22 Copyright © Intralinks 2013 all rights reserved 10 Midland Metals case study
7.
Slide 9 MOU22 Make
the midland metal the biggest one to expand at the end Microsoft Office User, 5/28/2013
8.
6/5/2013 6 Copyright © Intralinks
2013 all rights reserved “Work today involves teams of people from both inside and outside the company that come together for a specific project, work very tightly for a time, but then break apart and re-form with other people on the next project. The business problem’s always there, but it’s a different group of people each and every time.” — Marc McDonald, Owner Midland Metal Products 11 Copyright © Intralinks 2013 all rights reserved 12 Intralinks VIA ™ Demo John Doe ********
9.
6/5/2013 7 Copyright © Intralinks
2013 all rights reserved 13 Intralinks VIA TM 30 Day Trial www.intralinks.com/try Copyright © Intralinks 2013 all rights reserved 14 • Data loss prevention • Business productivity • User workflows File sharing and collaboration –the next generation of user capabilities MOU24
10.
Slide 14 MOU24 can
we find a way to tie this branding into the way the other slides feel like slide 5 and slide 9? Microsoft Office User, 5/28/2013
11.
6/5/2013 8 Copyright © Intralinks
2013 all rights reserved Thank you 15 Stop by our booth #201
Descargar ahora