SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
6/5/2013
1
Copyright © Intralinks 2013 all rights reserved
Industrialization or
Consumerization?
What We Can Learn from Each for
Effective, Enterprise Collaboration
John Landy
CTO, Intralinks Inc.
1
#IntralinksVIA
Copyright © Intralinks 2013 all rights reserved
SPEED
2
PRECISIONSIMPLE
They want to keep getting
work done with familiar, easy
to use tools
Consumerization of the workforce
6/5/2013
2
Copyright © Intralinks 2013 all rights reserved
“I don’t care how you do it, just get their
feedback on the file—fast”
“I’ll send those product design files to you
real quick on WannaShare®”
“Wait! That file wasn’t meant to go out!”
3
Consumerization of the workforce
Copyright © Intralinks 2013 all rights reserved *http://www.wired.com/threatlevel/2011/05/dropbox-ftc/
Hard facts about data loss
Options: 200+ vendors in FSS market
Security: Consumer grade FSS & freeware
don’t necessarily encrypt your files*
File sharing user base: 40m daily active users in US alone
Forecast: 1 in 5 companies will experience
data leakage from consumer apps by 2018
Overwhelming
Questionable
Threatening
Enormous
Content: Data in motion vs data at restRippling
6/5/2013
3
Copyright © Intralinks 2013 all rights reserved 5
The “Unshare” real-life oops moments
Incidents involving inadvertent data disclosure or a data governance/process/policy failure
Jan Feb March April May June July Aug Sept Oct Nov Dec
Source: CyberFactors, LLC, a wholly owned subsidiary of CyberRisk Partners, LLC and sister company of CloudInsure.com, LLC
Wells Fargo: 130
records (SSNs, PII)
Valencia College:
9,000 records (PII)
Certified General
Accountants (CGA)
Association of
British Columbia:
4,600 records (PII)
Texas A&M: 4,000
records (SSNs, PII)
Elections New
Brunswick:
553,000 records
(PII)
Cunard Cruise Line:
1,225 records (PII)
Wisconsin Dept.
of Revenue:
110,795 records
(PII)
Essex County
Council: 400 records
(PII, Financial data)
Aegon: 35
records (PII)
Groene Hart
Ziekenhuis (Green
Heart Hospital):
493,000 records (PHI)
Plymouth City
Council: 1
record (PII)
Jackson North
medical Center:
566 records (PHI)
Copyright © Intralinks 2013 all rights reserved 6
Data loss risks:
Healthcare oops moments
6/5/2013
4
Copyright © Intralinks 2013 all rights reserved 7
Productivity vs. Security
Security
& Control
Freedom & Productivity
Share
UNshare
Lifetime content control
Productivity beyond boundaries
You’re
Here
Business Communities
Copyright © Intralinks 2013 all rights reserved 8
Intralinks security approach
UNshare
Granular Controls
Folder-level Permissions
Role-Based
Access Control
Virus
Scanning
MOU27
Slide 8
MOU27 We will have different names for the stacks, coming soon.
Microsoft Office User, 5/28/2013
6/5/2013
5
Copyright © Intralinks 2013 all rights reserved 9Source: Gartner ‘Market Share All Software Markets, Worldwide, 2012,’ March 2013, G00250533
Intralinks Use Cases
Used by over 800 of the Fortune 1000
MOU22
Copyright © Intralinks 2013 all rights reserved 10
Midland Metals case study
Slide 9
MOU22 Make the midland metal the biggest one to expand at the end
Microsoft Office User, 5/28/2013
6/5/2013
6
Copyright © Intralinks 2013 all rights reserved
“Work today involves teams of people from
both inside and outside the company that
come together for a specific project, work
very tightly for a time, but then break apart
and re-form with other people on the next
project. The business problem’s always
there, but it’s a different group of people
each and every time.”
— Marc McDonald, Owner
Midland Metal Products
11
Copyright © Intralinks 2013 all rights reserved 12
Intralinks VIA ™ Demo
John Doe
********
6/5/2013
7
Copyright © Intralinks 2013 all rights reserved 13
Intralinks VIA
TM
30 Day Trial
www.intralinks.com/try
Copyright © Intralinks 2013 all rights reserved 14
• Data loss prevention
• Business productivity
• User workflows
File sharing and
collaboration –the next
generation of user
capabilities
MOU24
Slide 14
MOU24 can we find a way to tie this branding into the way the other slides feel like slide 5 and slide 9?
Microsoft Office User, 5/28/2013
6/5/2013
8
Copyright © Intralinks 2013 all rights reserved
Thank you
15
Stop by our booth #201

Más contenido relacionado

La actualidad más candente

7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]Citrix
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threatmilliemill
 
My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD ExpressMy article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD ExpressVera Trubacheva
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignoredrichard_turner
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iotramesh209
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoPeter Bihr
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedElastica Inc.
 
Are Your IT Systems Secure?
Are Your IT Systems Secure?Are Your IT Systems Secure?
Are Your IT Systems Secure?Nex-Tech
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google AppsElastica Inc.
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldElastica Inc.
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber AttacksTurning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks- Mark - Fullbright
 
Secure Remote Browser
Secure Remote BrowserSecure Remote Browser
Secure Remote BrowserCitrix
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013Mike Brannon
 
Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016Yann Lecourt
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018tcelik
 

La actualidad más candente (19)

7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threat
 
My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD ExpressMy article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD Express
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignored
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
 
Are Your IT Systems Secure?
Are Your IT Systems Secure?Are Your IT Systems Secure?
Are Your IT Systems Secure?
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber AttacksTurning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
 
Secure Remote Browser
Secure Remote BrowserSecure Remote Browser
Secure Remote Browser
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 
Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016
 
Analytics Cybersecurity Predictions 2016
Analytics Cybersecurity Predictions 2016Analytics Cybersecurity Predictions 2016
Analytics Cybersecurity Predictions 2016
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018
 

Similar a Cite conference intralinks_industrialization_or_consumerization_final

Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsessCite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsessIntralinks
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingIntralinks
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?Ashish Patel
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization surveyAndrew Wong
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Relayware
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceThe Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceImperva
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security TrendsCisco Russia
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataHybrid Cloud
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloudNicholas Chia
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2016
 
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Amanda Morris
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessisitnewsafrica
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profilepatelhiranya
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Jeremy Siewert
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015Marcel Hoffmann
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Pronq by HP
 

Similar a Cite conference intralinks_industrialization_or_consumerization_final (20)

Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsessCite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceThe Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat Intelligence
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security Trends
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented data
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessis
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profile
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 

Último

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Último (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Cite conference intralinks_industrialization_or_consumerization_final

  • 1. 6/5/2013 1 Copyright © Intralinks 2013 all rights reserved Industrialization or Consumerization? What We Can Learn from Each for Effective, Enterprise Collaboration John Landy CTO, Intralinks Inc. 1 #IntralinksVIA Copyright © Intralinks 2013 all rights reserved SPEED 2 PRECISIONSIMPLE They want to keep getting work done with familiar, easy to use tools Consumerization of the workforce
  • 2. 6/5/2013 2 Copyright © Intralinks 2013 all rights reserved “I don’t care how you do it, just get their feedback on the file—fast” “I’ll send those product design files to you real quick on WannaShare®” “Wait! That file wasn’t meant to go out!” 3 Consumerization of the workforce Copyright © Intralinks 2013 all rights reserved *http://www.wired.com/threatlevel/2011/05/dropbox-ftc/ Hard facts about data loss Options: 200+ vendors in FSS market Security: Consumer grade FSS & freeware don’t necessarily encrypt your files* File sharing user base: 40m daily active users in US alone Forecast: 1 in 5 companies will experience data leakage from consumer apps by 2018 Overwhelming Questionable Threatening Enormous Content: Data in motion vs data at restRippling
  • 3. 6/5/2013 3 Copyright © Intralinks 2013 all rights reserved 5 The “Unshare” real-life oops moments Incidents involving inadvertent data disclosure or a data governance/process/policy failure Jan Feb March April May June July Aug Sept Oct Nov Dec Source: CyberFactors, LLC, a wholly owned subsidiary of CyberRisk Partners, LLC and sister company of CloudInsure.com, LLC Wells Fargo: 130 records (SSNs, PII) Valencia College: 9,000 records (PII) Certified General Accountants (CGA) Association of British Columbia: 4,600 records (PII) Texas A&M: 4,000 records (SSNs, PII) Elections New Brunswick: 553,000 records (PII) Cunard Cruise Line: 1,225 records (PII) Wisconsin Dept. of Revenue: 110,795 records (PII) Essex County Council: 400 records (PII, Financial data) Aegon: 35 records (PII) Groene Hart Ziekenhuis (Green Heart Hospital): 493,000 records (PHI) Plymouth City Council: 1 record (PII) Jackson North medical Center: 566 records (PHI) Copyright © Intralinks 2013 all rights reserved 6 Data loss risks: Healthcare oops moments
  • 4. 6/5/2013 4 Copyright © Intralinks 2013 all rights reserved 7 Productivity vs. Security Security & Control Freedom & Productivity Share UNshare Lifetime content control Productivity beyond boundaries You’re Here Business Communities Copyright © Intralinks 2013 all rights reserved 8 Intralinks security approach UNshare Granular Controls Folder-level Permissions Role-Based Access Control Virus Scanning MOU27
  • 5. Slide 8 MOU27 We will have different names for the stacks, coming soon. Microsoft Office User, 5/28/2013
  • 6. 6/5/2013 5 Copyright © Intralinks 2013 all rights reserved 9Source: Gartner ‘Market Share All Software Markets, Worldwide, 2012,’ March 2013, G00250533 Intralinks Use Cases Used by over 800 of the Fortune 1000 MOU22 Copyright © Intralinks 2013 all rights reserved 10 Midland Metals case study
  • 7. Slide 9 MOU22 Make the midland metal the biggest one to expand at the end Microsoft Office User, 5/28/2013
  • 8. 6/5/2013 6 Copyright © Intralinks 2013 all rights reserved “Work today involves teams of people from both inside and outside the company that come together for a specific project, work very tightly for a time, but then break apart and re-form with other people on the next project. The business problem’s always there, but it’s a different group of people each and every time.” — Marc McDonald, Owner Midland Metal Products 11 Copyright © Intralinks 2013 all rights reserved 12 Intralinks VIA ™ Demo John Doe ********
  • 9. 6/5/2013 7 Copyright © Intralinks 2013 all rights reserved 13 Intralinks VIA TM 30 Day Trial www.intralinks.com/try Copyright © Intralinks 2013 all rights reserved 14 • Data loss prevention • Business productivity • User workflows File sharing and collaboration –the next generation of user capabilities MOU24
  • 10. Slide 14 MOU24 can we find a way to tie this branding into the way the other slides feel like slide 5 and slide 9? Microsoft Office User, 5/28/2013
  • 11. 6/5/2013 8 Copyright © Intralinks 2013 all rights reserved Thank you 15 Stop by our booth #201