Enviar búsqueda
Cargar
Cite conference intralinks_industrialization_or_consumerization_final
•
1 recomendación
•
674 vistas
Intralinks
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 11
Descargar ahora
Descargar para leer sin conexión
Recomendados
Safe code CSA cloud final1213
Safe code CSA cloud final1213
Giuliano Tavaroli
Eliminating Security Uncertainty
Eliminating Security Uncertainty
Dell World
Dwyer ISSA Presentation
Dwyer ISSA Presentation
Cathy Dwyer
Backup
Backup
Badr MSDK
Philippines ‘lagging behind’ on cloud adoption
Philippines ‘lagging behind’ on cloud adoption
John Davis
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
Elastica Inc.
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Black Duck by Synopsys
Enabling Dropbox for Business
Enabling Dropbox for Business
Elastica Inc.
Recomendados
Safe code CSA cloud final1213
Safe code CSA cloud final1213
Giuliano Tavaroli
Eliminating Security Uncertainty
Eliminating Security Uncertainty
Dell World
Dwyer ISSA Presentation
Dwyer ISSA Presentation
Cathy Dwyer
Backup
Backup
Badr MSDK
Philippines ‘lagging behind’ on cloud adoption
Philippines ‘lagging behind’ on cloud adoption
John Davis
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
Elastica Inc.
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Black Duck by Synopsys
Enabling Dropbox for Business
Enabling Dropbox for Business
Elastica Inc.
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
Citrix
Managing insider threat
Managing insider threat
milliemill
My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD Express
Vera Trubacheva
Social Media Can Not Be Ignored
Social Media Can Not Be Ignored
richard_turner
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
ramesh209
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Peter Bihr
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
Elastica Inc.
Are Your IT Systems Secure?
Are Your IT Systems Secure?
Nex-Tech
Protecting your Data in Google Apps
Protecting your Data in Google Apps
Elastica Inc.
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
Elastica Inc.
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
CableLabs
Shadow Data Exposed
Shadow Data Exposed
Elastica Inc.
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
- Mark - Fullbright
Secure Remote Browser
Secure Remote Browser
Citrix
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
Mike Brannon
Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016
Yann Lecourt
Analytics Cybersecurity Predictions 2016
Analytics Cybersecurity Predictions 2016
Christine Astovasadourian
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
Omar Khawaja
Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018
tcelik
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Intralinks
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
Intralinks
Where in the world is your Corporate data?
Where in the world is your Corporate data?
Ashish Patel
Más contenido relacionado
La actualidad más candente
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
Citrix
Managing insider threat
Managing insider threat
milliemill
My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD Express
Vera Trubacheva
Social Media Can Not Be Ignored
Social Media Can Not Be Ignored
richard_turner
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
ramesh209
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Peter Bihr
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
Elastica Inc.
Are Your IT Systems Secure?
Are Your IT Systems Secure?
Nex-Tech
Protecting your Data in Google Apps
Protecting your Data in Google Apps
Elastica Inc.
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
Elastica Inc.
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
CableLabs
Shadow Data Exposed
Shadow Data Exposed
Elastica Inc.
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
- Mark - Fullbright
Secure Remote Browser
Secure Remote Browser
Citrix
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
Mike Brannon
Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016
Yann Lecourt
Analytics Cybersecurity Predictions 2016
Analytics Cybersecurity Predictions 2016
Christine Astovasadourian
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
Omar Khawaja
Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018
tcelik
La actualidad más candente
(19)
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
Managing insider threat
Managing insider threat
My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD Express
Social Media Can Not Be Ignored
Social Media Can Not Be Ignored
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
Are Your IT Systems Secure?
Are Your IT Systems Secure?
Protecting your Data in Google Apps
Protecting your Data in Google Apps
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
Shadow Data Exposed
Shadow Data Exposed
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
Secure Remote Browser
Secure Remote Browser
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
Analytics cybersecurity-predictions-2016
Analytics cybersecurity-predictions-2016
Analytics Cybersecurity Predictions 2016
Analytics Cybersecurity Predictions 2016
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
Software Architecture - The Untold Story - 2018
Software Architecture - The Untold Story - 2018
Similar a Cite conference intralinks_industrialization_or_consumerization_final
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Intralinks
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
Intralinks
Where in the world is your Corporate data?
Where in the world is your Corporate data?
Ashish Patel
Enterprise it consumerization survey
Enterprise it consumerization survey
Andrew Wong
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
Relayware
Advanced threat protection and big data
Advanced threat protection and big data
Peter Wood
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat Intelligence
Imperva
BYOD and Security Trends
BYOD and Security Trends
Cisco Russia
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented data
Hybrid Cloud
vip_day_2._1130_cloud
vip_day_2._1130_cloud
Nicholas Chia
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Minh Le
Rochester Security Event
Rochester Security Event
calebbarlow
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2016
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Amanda Morris
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessis
itnewsafrica
Seclore Corporate Profile
Seclore Corporate Profile
patelhiranya
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Jeremy Siewert
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
Marcel Hoffmann
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
Pronq by HP
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Murray Security Services
Similar a Cite conference intralinks_industrialization_or_consumerization_final
(20)
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
Where in the world is your Corporate data?
Where in the world is your Corporate data?
Enterprise it consumerization survey
Enterprise it consumerization survey
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
Advanced threat protection and big data
Advanced threat protection and big data
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat Intelligence
BYOD and Security Trends
BYOD and Security Trends
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented data
vip_day_2._1130_cloud
vip_day_2._1130_cloud
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Rochester Security Event
Rochester Security Event
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessis
Seclore Corporate Profile
Seclore Corporate Profile
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Último
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
null - The Open Security Community
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Competition Advisory Services (India) LLP
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Enjoy Anytime
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
AndikSusilo4
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Hyundai Motor Group
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Último
(20)
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Cite conference intralinks_industrialization_or_consumerization_final
1.
6/5/2013 1 Copyright © Intralinks
2013 all rights reserved Industrialization or Consumerization? What We Can Learn from Each for Effective, Enterprise Collaboration John Landy CTO, Intralinks Inc. 1 #IntralinksVIA Copyright © Intralinks 2013 all rights reserved SPEED 2 PRECISIONSIMPLE They want to keep getting work done with familiar, easy to use tools Consumerization of the workforce
2.
6/5/2013 2 Copyright © Intralinks
2013 all rights reserved “I don’t care how you do it, just get their feedback on the file—fast” “I’ll send those product design files to you real quick on WannaShare®” “Wait! That file wasn’t meant to go out!” 3 Consumerization of the workforce Copyright © Intralinks 2013 all rights reserved *http://www.wired.com/threatlevel/2011/05/dropbox-ftc/ Hard facts about data loss Options: 200+ vendors in FSS market Security: Consumer grade FSS & freeware don’t necessarily encrypt your files* File sharing user base: 40m daily active users in US alone Forecast: 1 in 5 companies will experience data leakage from consumer apps by 2018 Overwhelming Questionable Threatening Enormous Content: Data in motion vs data at restRippling
3.
6/5/2013 3 Copyright © Intralinks
2013 all rights reserved 5 The “Unshare” real-life oops moments Incidents involving inadvertent data disclosure or a data governance/process/policy failure Jan Feb March April May June July Aug Sept Oct Nov Dec Source: CyberFactors, LLC, a wholly owned subsidiary of CyberRisk Partners, LLC and sister company of CloudInsure.com, LLC Wells Fargo: 130 records (SSNs, PII) Valencia College: 9,000 records (PII) Certified General Accountants (CGA) Association of British Columbia: 4,600 records (PII) Texas A&M: 4,000 records (SSNs, PII) Elections New Brunswick: 553,000 records (PII) Cunard Cruise Line: 1,225 records (PII) Wisconsin Dept. of Revenue: 110,795 records (PII) Essex County Council: 400 records (PII, Financial data) Aegon: 35 records (PII) Groene Hart Ziekenhuis (Green Heart Hospital): 493,000 records (PHI) Plymouth City Council: 1 record (PII) Jackson North medical Center: 566 records (PHI) Copyright © Intralinks 2013 all rights reserved 6 Data loss risks: Healthcare oops moments
4.
6/5/2013 4 Copyright © Intralinks
2013 all rights reserved 7 Productivity vs. Security Security & Control Freedom & Productivity Share UNshare Lifetime content control Productivity beyond boundaries You’re Here Business Communities Copyright © Intralinks 2013 all rights reserved 8 Intralinks security approach UNshare Granular Controls Folder-level Permissions Role-Based Access Control Virus Scanning MOU27
5.
Slide 8 MOU27 We
will have different names for the stacks, coming soon. Microsoft Office User, 5/28/2013
6.
6/5/2013 5 Copyright © Intralinks
2013 all rights reserved 9Source: Gartner ‘Market Share All Software Markets, Worldwide, 2012,’ March 2013, G00250533 Intralinks Use Cases Used by over 800 of the Fortune 1000 MOU22 Copyright © Intralinks 2013 all rights reserved 10 Midland Metals case study
7.
Slide 9 MOU22 Make
the midland metal the biggest one to expand at the end Microsoft Office User, 5/28/2013
8.
6/5/2013 6 Copyright © Intralinks
2013 all rights reserved “Work today involves teams of people from both inside and outside the company that come together for a specific project, work very tightly for a time, but then break apart and re-form with other people on the next project. The business problem’s always there, but it’s a different group of people each and every time.” — Marc McDonald, Owner Midland Metal Products 11 Copyright © Intralinks 2013 all rights reserved 12 Intralinks VIA ™ Demo John Doe ********
9.
6/5/2013 7 Copyright © Intralinks
2013 all rights reserved 13 Intralinks VIA TM 30 Day Trial www.intralinks.com/try Copyright © Intralinks 2013 all rights reserved 14 • Data loss prevention • Business productivity • User workflows File sharing and collaboration –the next generation of user capabilities MOU24
10.
Slide 14 MOU24 can
we find a way to tie this branding into the way the other slides feel like slide 5 and slide 9? Microsoft Office User, 5/28/2013
11.
6/5/2013 8 Copyright © Intralinks
2013 all rights reserved Thank you 15 Stop by our booth #201
Descargar ahora