SlideShare una empresa de Scribd logo
1 de 21
The Secure File-Sharing Paradox
Presenter:
Date:

Jes Breslaw
Director of Cloud Solutions, EMEA
November 7th, 2013

1
“….those who learned to collaborate and improvise
most effectively have prevailed.”
Charles Darwin

“Nothing is yours. It is to use. It is to share. If you will
not share it, you cannot use it.”
Ursula K. Le Guin

“Security is the chief enemy of mortals.”
William Shakespeare
Accellion Snapshot
• Founded 1999
• Headquartered in Palo Alto, CA
• 1,900+ Enterprise Customers
• 12+ Million Enterprise Users
• Secure Mobile File Sharing Solutions

3
The Secure-Sharing Paradox
Secure
certain to remain safe
and unthreatened

Share
post or repost
(something)

Collaborate
work jointly on an
activity or project
1st Dimension - email

Email

•
•
•
•
•
•

VPN

Collaboration over email
All data resides behind the firewall
Remote users on laptops using VPN
Most work done on-site using PC’s
Simple model
Insecure & inefficient
2nd Dimension - Portals
SSL

SSL

Extranets & portals
Email/IM

•
•
•
•
•
•

VPN

New ‘go-to’ locations on the web
IM but still collaboration over email
Remote users on laptops using VPN
Content still behind the firewall
Sharing improves
Collaboration still insecure & inefficient
3rd Dimension - Cloud
3rd Dimension - Cloud

•
•
•
•
•
•

Where does the content reside?
Where/how do you secure the content?
Who has access to what?
How do you prevent content chaos?
What’s the architecture?
How do the systems integrate?
1st & 2nd dimensions = ad hoc
Law Firm

Designs

US HQ

Agency

Contracts

Manufacturer

Proposals

European HQ

Distributor

Projects

Remote offices

Customer

Prospect

M&A

Meetings

Home
workers

Consultant

Board
3rd dimension = platform
Law Firm

US HQ

Agency

Manufacturer

European HQ

Distributor

Remote offices

Customer

Prospect

Home
workers

Consultant
Anytime, Anywhere Access to Enterprise Content
Wessex Water
Key Requirements:
• Secure internal/external communications.

Utilities
2000 employees

• Access documents on mobile devices and tablets
• Integrate into existing line-of-business SharePoint workflows
• Centralized control and management

“Accellion has many of the benefits of a cloud service while
allowing us to retain our data on-premise to meet our own
security policies and wider compliance requirements.”

12
London Borough of Camden
Key Requirements:

Local gov
8,500 employees

• Improve productivity by allowing staff to work from
anywhere
• Reduce IT equipment costs by shifting from a PC-centric environment
to mobile computing
• Fostered happier employees by giving them the freedom to use
devices of their own choosing for business-related activities
• Data security, compliance and privacy controls

“Now we have a solution that’s integrated with our MDM
solution and SharePoint, allowing us to securely mobilize
our most important content and make BYOD a reality.”
13
Verizon Wireless
Key Requirements:
• Access/edit docs from Android, BlackBerry, iOS) with
corporate vs. personal device distinction and access
controls.

Telecoms
HQ: New York
60k users

• Collaborate on presentations, sales dos and proposals internally &
externally with partners.
• Secure end-to-end environment with controls, oversight and
auditing capabilities.
• Integration into existing enterprise systems; SharePoint, LDAP/AD,
SSO, Email and DLP.

14
Verizon – Road Warrior Solution
Private Cloud
File Sharing

Enterprise
Content

DLP

MDM

Archiving
15
User experience
Administration
Enterprise-Grade Administration Tools
• ECM and File Share access controls - fully integrated into
Accellion Admin Console
• Users, IT or SharePoint Admins can control site access

17
Cloud Deployment Options

Private
On-Premise

Private
Hosted

Public
Multi-Tenant

• Virtual appliance
• Full control
• Full security, compliance

• Single-tenant
• Secure
• Cloud agility

• Multi-tenant
• Cloud agility

18
Summary
Secure
Make the architecture
fit your needs

Share
Enable secure
mobile alternatives

Collaborate
Connect to your
enterprise content
Resources Available
• Gartner Marketscope on Enterprise File Sync and Sharing
• ISMG 2013 Mobile Security Survey Results

Visit www.accellion.com for more information

20
Thank You!
For more information visit
www.accellion.com

21

Más contenido relacionado

La actualidad más candente

False Cloud Debate Panel Interop 2011
False Cloud Debate Panel Interop 2011False Cloud Debate Panel Interop 2011
False Cloud Debate Panel Interop 2011
David Linthicum
 
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for itAndy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Nordic Infrastructure Conference
 
Washdc cto-0905-2003
Washdc cto-0905-2003Washdc cto-0905-2003
Washdc cto-0905-2003
eaiti
 
11 Gids10 Press Release 11 Mar10 1
11 Gids10 Press Release 11 Mar10 111 Gids10 Press Release 11 Mar10 1
11 Gids10 Press Release 11 Mar10 1
Roop Sharma
 
Citrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackneyCitrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackney
GreythornAU
 
Internal Investigations and the Cloud
Internal Investigations and the CloudInternal Investigations and the Cloud
Internal Investigations and the Cloud
Dan Michaluk
 

La actualidad más candente (20)

False Cloud Debate Panel Interop 2011
False Cloud Debate Panel Interop 2011False Cloud Debate Panel Interop 2011
False Cloud Debate Panel Interop 2011
 
Capitalising on the cloud- why law firms should embrace hosted IT
Capitalising on the cloud- why law firms should embrace hosted ITCapitalising on the cloud- why law firms should embrace hosted IT
Capitalising on the cloud- why law firms should embrace hosted IT
 
Design Considerations When Building Cross Platform Mobile Applications
 Design Considerations When Building Cross Platform Mobile Applications Design Considerations When Building Cross Platform Mobile Applications
Design Considerations When Building Cross Platform Mobile Applications
 
Look Up
Look UpLook Up
Look Up
 
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for itAndy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
 
Washdc cto-0905-2003
Washdc cto-0905-2003Washdc cto-0905-2003
Washdc cto-0905-2003
 
11 Gids10 Press Release 11 Mar10 1
11 Gids10 Press Release 11 Mar10 111 Gids10 Press Release 11 Mar10 1
11 Gids10 Press Release 11 Mar10 1
 
Virtual & Remote Practice: Reach from the Beach & Manage from the Mountains
Virtual & Remote Practice: Reach from the Beach & Manage from the MountainsVirtual & Remote Practice: Reach from the Beach & Manage from the Mountains
Virtual & Remote Practice: Reach from the Beach & Manage from the Mountains
 
Mobile government presentation - Bull and Citrix - March 6th 2014
Mobile government presentation - Bull and Citrix - March 6th 2014Mobile government presentation - Bull and Citrix - March 6th 2014
Mobile government presentation - Bull and Citrix - March 6th 2014
 
Seminar
SeminarSeminar
Seminar
 
CloudCamp Boston Keynote - Cloud Computing - John Treadway, Judith Hurwitz
CloudCamp Boston Keynote - Cloud Computing - John Treadway, Judith HurwitzCloudCamp Boston Keynote - Cloud Computing - John Treadway, Judith Hurwitz
CloudCamp Boston Keynote - Cloud Computing - John Treadway, Judith Hurwitz
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Next Generation Collaboration - Presentation at ICT Spring 2013
Next Generation Collaboration - Presentation at ICT Spring 2013Next Generation Collaboration - Presentation at ICT Spring 2013
Next Generation Collaboration - Presentation at ICT Spring 2013
 
IBM RTP Dojo Launch
IBM RTP Dojo LaunchIBM RTP Dojo Launch
IBM RTP Dojo Launch
 
Next Generation Collaboration - ICT Spring 2013 Luxembourg
Next Generation Collaboration - ICT Spring 2013 LuxembourgNext Generation Collaboration - ICT Spring 2013 Luxembourg
Next Generation Collaboration - ICT Spring 2013 Luxembourg
 
IAITAM ACE 2016, New Orleans - Presentation
IAITAM ACE 2016, New Orleans - PresentationIAITAM ACE 2016, New Orleans - Presentation
IAITAM ACE 2016, New Orleans - Presentation
 
Citrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackneyCitrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackney
 
Enterprise 2.0 using sharepoint and yammer
Enterprise 2.0 using sharepoint and yammerEnterprise 2.0 using sharepoint and yammer
Enterprise 2.0 using sharepoint and yammer
 
Internal Investigations and the Cloud
Internal Investigations and the CloudInternal Investigations and the Cloud
Internal Investigations and the Cloud
 

Destacado

PhD thesis presentation 2012
PhD thesis presentation 2012PhD thesis presentation 2012
PhD thesis presentation 2012
vsharma78
 
Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...
Mikhail Kurnosov
 
An Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentAn Introduction To Linux Development Environment
An Introduction To Linux Development Environment
S. M. Hossein Hamidi
 
Introducción a la administración f08
Introducción a la administración f08Introducción a la administración f08
Introducción a la administración f08
Skepper63
 

Destacado (20)

PhD thesis presentation 2012
PhD thesis presentation 2012PhD thesis presentation 2012
PhD thesis presentation 2012
 
Mac os installation and Hardware Report
Mac os installation and Hardware ReportMac os installation and Hardware Report
Mac os installation and Hardware Report
 
Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...
 
Linux Installation And Shamba Server
Linux Installation And Shamba ServerLinux Installation And Shamba Server
Linux Installation And Shamba Server
 
Finding Time to Study for the CIH Exam
Finding Time to Study for the CIH ExamFinding Time to Study for the CIH Exam
Finding Time to Study for the CIH Exam
 
Sp ws1 ulrich teichler
Sp ws1 ulrich teichlerSp ws1 ulrich teichler
Sp ws1 ulrich teichler
 
Lee Clark 7th June 2010
Lee Clark 7th June 2010Lee Clark 7th June 2010
Lee Clark 7th June 2010
 
아름다운+이별 김건모
아름다운+이별 김건모아름다운+이별 김건모
아름다운+이별 김건모
 
cIHMS
cIHMScIHMS
cIHMS
 
Almoços Convívio Cerberus
Almoços Convívio CerberusAlmoços Convívio Cerberus
Almoços Convívio Cerberus
 
Jaba sat explorer-710
Jaba sat explorer-710Jaba sat explorer-710
Jaba sat explorer-710
 
An Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentAn Introduction To Linux Development Environment
An Introduction To Linux Development Environment
 
Introducción a la administración f08
Introducción a la administración f08Introducción a la administración f08
Introducción a la administración f08
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
QIP 2012
QIP 2012QIP 2012
QIP 2012
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Desktop environment
Desktop environmentDesktop environment
Desktop environment
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
презентация земноводные и пресмыкающиеся
презентация земноводные и пресмыкающиесяпрезентация земноводные и пресмыкающиеся
презентация земноводные и пресмыкающиеся
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 

Similar a DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox

Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
andrewbourget
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloud
eophiladelphia
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
CipherCloud
 

Similar a DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox (20)

Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
Cloud Storage
Cloud StorageCloud Storage
Cloud Storage
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud Collaboration
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
 
Up in the clouds sdd 2012
Up in the clouds sdd 2012Up in the clouds sdd 2012
Up in the clouds sdd 2012
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
Cloud Computing Project
Cloud Computing Project Cloud Computing Project
Cloud Computing Project
 
CLOUD COMPUTING EASY SLIDES WITH ADV N DIS ADV
CLOUD COMPUTING EASY SLIDES WITH ADV N DIS ADVCLOUD COMPUTING EASY SLIDES WITH ADV N DIS ADV
CLOUD COMPUTING EASY SLIDES WITH ADV N DIS ADV
 
3 Types of Cloud Computing
3 Types of Cloud Computing3 Types of Cloud Computing
3 Types of Cloud Computing
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloud
 
Eo navigating the cloud v8
Eo navigating the cloud v8Eo navigating the cloud v8
Eo navigating the cloud v8
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
 
cloud computing
cloud computingcloud computing
cloud computing
 
Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite Poster
 
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 

Más de Andris Soroka

Más de Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox

  • 1. The Secure File-Sharing Paradox Presenter: Date: Jes Breslaw Director of Cloud Solutions, EMEA November 7th, 2013 1
  • 2. “….those who learned to collaborate and improvise most effectively have prevailed.” Charles Darwin “Nothing is yours. It is to use. It is to share. If you will not share it, you cannot use it.” Ursula K. Le Guin “Security is the chief enemy of mortals.” William Shakespeare
  • 3. Accellion Snapshot • Founded 1999 • Headquartered in Palo Alto, CA • 1,900+ Enterprise Customers • 12+ Million Enterprise Users • Secure Mobile File Sharing Solutions 3
  • 4. The Secure-Sharing Paradox Secure certain to remain safe and unthreatened Share post or repost (something) Collaborate work jointly on an activity or project
  • 5. 1st Dimension - email Email • • • • • • VPN Collaboration over email All data resides behind the firewall Remote users on laptops using VPN Most work done on-site using PC’s Simple model Insecure & inefficient
  • 6. 2nd Dimension - Portals SSL SSL Extranets & portals Email/IM • • • • • • VPN New ‘go-to’ locations on the web IM but still collaboration over email Remote users on laptops using VPN Content still behind the firewall Sharing improves Collaboration still insecure & inefficient
  • 8. 3rd Dimension - Cloud • • • • • • Where does the content reside? Where/how do you secure the content? Who has access to what? How do you prevent content chaos? What’s the architecture? How do the systems integrate?
  • 9. 1st & 2nd dimensions = ad hoc Law Firm Designs US HQ Agency Contracts Manufacturer Proposals European HQ Distributor Projects Remote offices Customer Prospect M&A Meetings Home workers Consultant Board
  • 10. 3rd dimension = platform Law Firm US HQ Agency Manufacturer European HQ Distributor Remote offices Customer Prospect Home workers Consultant
  • 11. Anytime, Anywhere Access to Enterprise Content
  • 12. Wessex Water Key Requirements: • Secure internal/external communications. Utilities 2000 employees • Access documents on mobile devices and tablets • Integrate into existing line-of-business SharePoint workflows • Centralized control and management “Accellion has many of the benefits of a cloud service while allowing us to retain our data on-premise to meet our own security policies and wider compliance requirements.” 12
  • 13. London Borough of Camden Key Requirements: Local gov 8,500 employees • Improve productivity by allowing staff to work from anywhere • Reduce IT equipment costs by shifting from a PC-centric environment to mobile computing • Fostered happier employees by giving them the freedom to use devices of their own choosing for business-related activities • Data security, compliance and privacy controls “Now we have a solution that’s integrated with our MDM solution and SharePoint, allowing us to securely mobilize our most important content and make BYOD a reality.” 13
  • 14. Verizon Wireless Key Requirements: • Access/edit docs from Android, BlackBerry, iOS) with corporate vs. personal device distinction and access controls. Telecoms HQ: New York 60k users • Collaborate on presentations, sales dos and proposals internally & externally with partners. • Secure end-to-end environment with controls, oversight and auditing capabilities. • Integration into existing enterprise systems; SharePoint, LDAP/AD, SSO, Email and DLP. 14
  • 15. Verizon – Road Warrior Solution Private Cloud File Sharing Enterprise Content DLP MDM Archiving 15
  • 17. Administration Enterprise-Grade Administration Tools • ECM and File Share access controls - fully integrated into Accellion Admin Console • Users, IT or SharePoint Admins can control site access 17
  • 18. Cloud Deployment Options Private On-Premise Private Hosted Public Multi-Tenant • Virtual appliance • Full control • Full security, compliance • Single-tenant • Secure • Cloud agility • Multi-tenant • Cloud agility 18
  • 19. Summary Secure Make the architecture fit your needs Share Enable secure mobile alternatives Collaborate Connect to your enterprise content
  • 20. Resources Available • Gartner Marketscope on Enterprise File Sync and Sharing • ISMG 2013 Mobile Security Survey Results Visit www.accellion.com for more information 20
  • 21. Thank You! For more information visit www.accellion.com 21

Notas del editor

  1. INTEL - 23,500 BYOD, employees saving on average 57 mins (5 million hours in 2012)Federal agencies - 76% believe mobile devices increased productivity = 1 h 48 min per day (2013 Digital Dilemma, Telework Exchange)Mobile data access can help police officers save 30 minutes every day. (Deloitte: Gov. on the Go: Boosting Public-Sector Productivity by Going Mobile)Tablet users gain 66mins extra productivity CDW Tablet Poll Dec 2012
  2. First a short intro to Accellion – based in Palo Alto with 2000+ enterprise customers representing 12 million + enterprise users and we focus on providing secure mobile file sharing solutions
  3. At any one time in an enterprise company there are multiple office, suppliers, partners and customers. Typical projects highlighted in orange have many contributors involved from a variety of locations. If we were to highlight a couple of these projects we can clearly see the contributors and see the need for a central area or workspace to manage the workflow and content. The problem is that in the 1st and 2nd dimensions, these workspaces were behind a corporate firewall making it very difficult for 3rd parties to access them.
  4. The cloud offers us a much simpler way for physically separated locations to collaborate together. Instead of worry about multiple connection types, you can focus on some key ones that are repeated e.g. SharePoint, File Shares, iPad, browser. Create a new access type? Integrate it once into the cloud! BUT what if you don’t want your content in the cloud?
  5. Organization-wide support for mobile file sharing and collaboration via a wide-range of mobile devices, operating systems and platforms Extend existing IT investments by enabling secure mobile access to any documents within SharePoint and integration with MobileIron’s MDM solutionMaintain visibility into, track and report on all mobile file sharing activities to meet regulatory requirements
  6. Started two years ago. They wanted to mobilize their wokforce and were a bit ahead of their time.They didn’t want to copy their SharePoint content to all devices.These requirements are very typical for most enterprise organisations, most of you want the same
  7. This is the solution we developed for Verizon…At the core is the Accellion private cloud file sharing solution
  8. Choose an architecture for your needs. Private cloud, public cloud or a hybrid. Build a policy that ensures the right people have access to the right data.Enable mobile for multiple platforms, BYOD is only going to grow, but don’t forget the PCCreate a culture of collaboration internally and externally. Be open - you don’t yet know all the ways this platform will be used.It’s ok to share, sensibly.