SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
6/5/2013
1
Copyright © Intralinks 2013 all rights reserved
Industrialization or
Consumerization?
What We Can Learn from Each for
Effective, Enterprise Collaboration
John Landy
CTO, Intralinks Inc.
1
#IntralinksVIA
Copyright © Intralinks 2013 all rights reserved
SPEED
2
PRECISIONSIMPLE
They want to keep getting
work done with familiar, easy
to use tools
Consumerization of the workforce
6/5/2013
2
Copyright © Intralinks 2013 all rights reserved
“I don’t care how you do it, just get their
feedback on the file—fast”
“I’ll send those product design files to you
real quick on WannaShare®”
“Wait! That file wasn’t meant to go out!”
3
Consumerization of the workforce
Copyright © Intralinks 2013 all rights reserved *http://www.wired.com/threatlevel/2011/05/dropbox-ftc/
Hard facts about data loss
Options: 200+ vendors in FSS market
Security: Consumer grade FSS & freeware
don’t necessarily encrypt your files*
File sharing user base: 40m daily active users in US alone
Forecast: 1 in 5 companies will experience
data leakage from consumer apps by 2018
Overwhelming
Questionable
Threatening
Enormous
Content: Data in motion vs data at restRippling
6/5/2013
3
Copyright © Intralinks 2013 all rights reserved 5
The “Unshare” real-life oops moments
Incidents involving inadvertent data disclosure or a data governance/process/policy failure
Jan Feb March April May June July Aug Sept Oct Nov Dec
Source: CyberFactors, LLC, a wholly owned subsidiary of CyberRisk Partners, LLC and sister company of CloudInsure.com, LLC
Wells Fargo: 130
records (SSNs, PII)
Valencia College:
9,000 records (PII)
Certified General
Accountants (CGA)
Association of
British Columbia:
4,600 records (PII)
Texas A&M: 4,000
records (SSNs, PII)
Elections New
Brunswick:
553,000 records
(PII)
Cunard Cruise Line:
1,225 records (PII)
Wisconsin Dept.
of Revenue:
110,795 records
(PII)
Essex County
Council: 400 records
(PII, Financial data)
Aegon: 35
records (PII)
Groene Hart
Ziekenhuis (Green
Heart Hospital):
493,000 records (PHI)
Plymouth City
Council: 1
record (PII)
Jackson North
medical Center:
566 records (PHI)
Copyright © Intralinks 2013 all rights reserved 6
Data loss risks:
Healthcare oops moments
6/5/2013
4
Copyright © Intralinks 2013 all rights reserved 7
Productivity vs. Security
Security
& Control
Freedom & Productivity
Share
UNshare
Lifetime content control
Productivity beyond boundaries
You’re
Here
Business Communities
Copyright © Intralinks 2013 all rights reserved 8
Intralinks security approach
UNshare
Granular Controls
Folder-level Permissions
Role-Based
Access Control
Virus
Scanning
MOU27
Slide 8
MOU27 We will have different names for the stacks, coming soon.
Microsoft Office User, 5/28/2013
6/5/2013
5
Copyright © Intralinks 2013 all rights reserved 9Source: Gartner ‘Market Share All Software Markets, Worldwide, 2012,’ March 2013, G00250533
Intralinks Use Cases
Used by over 800 of the Fortune 1000
MOU22
Copyright © Intralinks 2013 all rights reserved 10
Midland Metals case study
Slide 9
MOU22 Make the midland metal the biggest one to expand at the end
Microsoft Office User, 5/28/2013
6/5/2013
6
Copyright © Intralinks 2013 all rights reserved
“Work today involves teams of people from
both inside and outside the company that
come together for a specific project, work
very tightly for a time, but then break apart
and re-form with other people on the next
project. The business problem’s always
there, but it’s a different group of people
each and every time.”
— Marc McDonald, Owner
Midland Metal Products
11
Copyright © Intralinks 2013 all rights reserved 12
Intralinks VIA ™ Demo
John Doe
********
6/5/2013
7
Copyright © Intralinks 2013 all rights reserved 13
Intralinks VIA
TM
30 Day Trial
www.intralinks.com/try
Copyright © Intralinks 2013 all rights reserved 14
• Data loss prevention
• Business productivity
• User workflows
File sharing and
collaboration –the next
generation of user
capabilities
MOU24
Slide 14
MOU24 can we find a way to tie this branding into the way the other slides feel like slide 5 and slide 9?
Microsoft Office User, 5/28/2013
6/5/2013
8
Copyright © Intralinks 2013 all rights reserved
Thank you
15
Stop by our booth #201

Más contenido relacionado

La actualidad más candente

7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]Citrix
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threatmilliemill
 
My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD ExpressMy article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD ExpressVera Trubacheva
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignoredrichard_turner
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iotramesh209
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoPeter Bihr
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedElastica Inc.
 
Are Your IT Systems Secure?
Are Your IT Systems Secure?Are Your IT Systems Secure?
Are Your IT Systems Secure?Nex-Tech
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google AppsElastica Inc.
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldElastica Inc.
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber AttacksTurning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks- Mark - Fullbright
 
Secure Remote Browser
Secure Remote BrowserSecure Remote Browser
Secure Remote BrowserCitrix
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013Mike Brannon
 
Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016Yann Lecourt
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018tcelik
 

La actualidad más candente (19)

7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threat
 
My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD ExpressMy article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD Express
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignored
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
 
Are Your IT Systems Secure?
Are Your IT Systems Secure?Are Your IT Systems Secure?
Are Your IT Systems Secure?
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber AttacksTurning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
 
Secure Remote Browser
Secure Remote BrowserSecure Remote Browser
Secure Remote Browser
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 
Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016
 
Analytics Cybersecurity Predictions 2016
Analytics Cybersecurity Predictions 2016Analytics Cybersecurity Predictions 2016
Analytics Cybersecurity Predictions 2016
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018
 

Similar a Cite conference intralinks_industrialization_or_consumerization_final

Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsessCite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsessIntralinks
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingIntralinks
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?Ashish Patel
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization surveyAndrew Wong
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Relayware
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceThe Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceImperva
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security TrendsCisco Russia
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataHybrid Cloud
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloudNicholas Chia
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2016
 
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Amanda Morris
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessisitnewsafrica
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profilepatelhiranya
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Jeremy Siewert
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015Marcel Hoffmann
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Pronq by HP
 

Similar a Cite conference intralinks_industrialization_or_consumerization_final (20)

Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsessCite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceThe Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat Intelligence
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security Trends
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented data
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessis
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profile
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 

Último

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Último (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Cite conference intralinks_industrialization_or_consumerization_final

  • 1. 6/5/2013 1 Copyright © Intralinks 2013 all rights reserved Industrialization or Consumerization? What We Can Learn from Each for Effective, Enterprise Collaboration John Landy CTO, Intralinks Inc. 1 #IntralinksVIA Copyright © Intralinks 2013 all rights reserved SPEED 2 PRECISIONSIMPLE They want to keep getting work done with familiar, easy to use tools Consumerization of the workforce
  • 2. 6/5/2013 2 Copyright © Intralinks 2013 all rights reserved “I don’t care how you do it, just get their feedback on the file—fast” “I’ll send those product design files to you real quick on WannaShare®” “Wait! That file wasn’t meant to go out!” 3 Consumerization of the workforce Copyright © Intralinks 2013 all rights reserved *http://www.wired.com/threatlevel/2011/05/dropbox-ftc/ Hard facts about data loss Options: 200+ vendors in FSS market Security: Consumer grade FSS & freeware don’t necessarily encrypt your files* File sharing user base: 40m daily active users in US alone Forecast: 1 in 5 companies will experience data leakage from consumer apps by 2018 Overwhelming Questionable Threatening Enormous Content: Data in motion vs data at restRippling
  • 3. 6/5/2013 3 Copyright © Intralinks 2013 all rights reserved 5 The “Unshare” real-life oops moments Incidents involving inadvertent data disclosure or a data governance/process/policy failure Jan Feb March April May June July Aug Sept Oct Nov Dec Source: CyberFactors, LLC, a wholly owned subsidiary of CyberRisk Partners, LLC and sister company of CloudInsure.com, LLC Wells Fargo: 130 records (SSNs, PII) Valencia College: 9,000 records (PII) Certified General Accountants (CGA) Association of British Columbia: 4,600 records (PII) Texas A&M: 4,000 records (SSNs, PII) Elections New Brunswick: 553,000 records (PII) Cunard Cruise Line: 1,225 records (PII) Wisconsin Dept. of Revenue: 110,795 records (PII) Essex County Council: 400 records (PII, Financial data) Aegon: 35 records (PII) Groene Hart Ziekenhuis (Green Heart Hospital): 493,000 records (PHI) Plymouth City Council: 1 record (PII) Jackson North medical Center: 566 records (PHI) Copyright © Intralinks 2013 all rights reserved 6 Data loss risks: Healthcare oops moments
  • 4. 6/5/2013 4 Copyright © Intralinks 2013 all rights reserved 7 Productivity vs. Security Security & Control Freedom & Productivity Share UNshare Lifetime content control Productivity beyond boundaries You’re Here Business Communities Copyright © Intralinks 2013 all rights reserved 8 Intralinks security approach UNshare Granular Controls Folder-level Permissions Role-Based Access Control Virus Scanning MOU27
  • 5. Slide 8 MOU27 We will have different names for the stacks, coming soon. Microsoft Office User, 5/28/2013
  • 6. 6/5/2013 5 Copyright © Intralinks 2013 all rights reserved 9Source: Gartner ‘Market Share All Software Markets, Worldwide, 2012,’ March 2013, G00250533 Intralinks Use Cases Used by over 800 of the Fortune 1000 MOU22 Copyright © Intralinks 2013 all rights reserved 10 Midland Metals case study
  • 7. Slide 9 MOU22 Make the midland metal the biggest one to expand at the end Microsoft Office User, 5/28/2013
  • 8. 6/5/2013 6 Copyright © Intralinks 2013 all rights reserved “Work today involves teams of people from both inside and outside the company that come together for a specific project, work very tightly for a time, but then break apart and re-form with other people on the next project. The business problem’s always there, but it’s a different group of people each and every time.” — Marc McDonald, Owner Midland Metal Products 11 Copyright © Intralinks 2013 all rights reserved 12 Intralinks VIA ™ Demo John Doe ********
  • 9. 6/5/2013 7 Copyright © Intralinks 2013 all rights reserved 13 Intralinks VIA TM 30 Day Trial www.intralinks.com/try Copyright © Intralinks 2013 all rights reserved 14 • Data loss prevention • Business productivity • User workflows File sharing and collaboration –the next generation of user capabilities MOU24
  • 10. Slide 14 MOU24 can we find a way to tie this branding into the way the other slides feel like slide 5 and slide 9? Microsoft Office User, 5/28/2013
  • 11. 6/5/2013 8 Copyright © Intralinks 2013 all rights reserved Thank you 15 Stop by our booth #201