SlideShare une entreprise Scribd logo
1  sur  22
Achieving Secure BYOD in GovernmentAgencies
Nina Seth: Sr. Product Marketing Manager
Confidential
Agenda
• Market Overview – Government Industry
• Government Technology Trends
• Government Challenges
• Solutions
• Case Studies
Confidential
Market Size
US Government
IT Spending
$80 billion
Worldwide Government
IT Spending
$449.5 billion
Cloud Computing
IT Spending
$20 billion
Confidential
Top Governments Technology Trends
Cloud
US Gov has a
Cloud First Policy
Mobile
Of all GOV workers:
64% use Smartphones
19% use tablets
55% bring their own devices
Security
Top 3 security
requirements:
FIPS 140-2, SSO,
Authentication
Confidential
Mobility and BYOD Trends
The Digital Gov Strategy calls for cross-agency collaboration and
adoption of mobile workforce solutions.
Mobile Work Exchange: 2013
Digital Dilemma Report
• Federal workers gain 9 hours of
productivity per week with mobile devices,
$28B annual productivity gains
• Just 11% of Fed workers and 13% of
state/local works who use personal
devices say their agency has a BYOD
policy.
• Lack of security on personal devices is a
recipe for disaster
• 58% of Fed workers say their agency can
take advantage of mobile devices
Confidential
Raising Productivity
Real-time access to date = Productivity
Mobile Work Exchange: 2013
Digital Dilemma Report
61% 62%
47%
76%
0%
10%
20%
30%
40%
50%
60%
70%
80%
Improved
communication
Better customer service Increased collaboration Increase productivity
Confidential
Government Tech Challenges
Intra/Inter Agency
Collaboration
Share sensitive content
with only authorized
personnel using secure
online workspaces
BYOD
Leverage mobile
devices to better serve
constituents and ensure
continuity of government
Implement BYOD
programs
Data Security
Protect and control of
government data
Achieve regulatory
compliance
Access to Data
across Sources
Access government
content across data
sources and across
devices (mobile and
laptop)
Confidential 8
Accellion - Snapshot
• Founded 1999
• Headquartered in Palo Alto, CA
• 1,900+ Enterprise Customers
• 11+ Million Enterprise Users
• Secure Mobile File Sharing Solutions
Confidential
Government Agencies Select Accellion
Confidential
Accellion for Government
Accellion is the leading provider of private
cloud secure file sharing solutions for
government agencies that enable intra and
inter agency collaboration across
mobile, desktop and laptop devices.
Confidential
Confidential
Solution #1
Intra and Inter Agencies
Collaboration
Supports the US Digital
Government Strategy to promote
cross-agency collaboration
Accellion Mobile File Sharing
provides:
• Secure online workspaces
• Commenting
• Version control
• Lock/Unlock
Confidential
Solution #2
Secure Mobile Productivity for
Government Agencies
Accellion Mobile Apps supports the
Digital Government Strategy to
accelerate the adoption of mobile
solutions to enable continuity of
government.
• View, create, edit, annotate, send and
print documents
• Secure mobile container to segregate
data
• Remote wipe data stored in the
Accellion secure container
• Integrate with MDM and MAM partners
for managing BYOD programs
Confidential 14
Secure Mobile Productivity
Confidential
Solution #3
Secure mobile access to distributed content
Accellion enterprise
connectors allow easy
access to ECM systems
without duplicating files
• Access to files stored in
SharePoint and Windows
File Shares
• No VPN
Confidential
Solution #4
Cloud Based Solutions
Accellion supports the US Government’s Cloud First policy that
mandates agencies take full advantage of cloud computing
benefits to maximize capacity utilization, improve IT flexibility and
responsiveness, and minimize cost.
• Private cloud (on-premise and hosted)
• Public cloud
• Hybrid cloud
Confidential 17
Cloud Deployment Options
Private
On-Premise
Private
Hosted
Public
Multi-Tenant
• Virtual appliance
• No data co-mingling
• Full control
• Full security, compliance
• No data co-mingling
• Security and control
• Low CapEx
• Multi-tenant
• Low CapEx
Confidential 18
Government-Class Security
Enterprise Security
• Anti-Virus
• Data Loss Prevention
• Restricted Admin Access to
Content
• FedRAMP hosted cloud solutions
Authentication/Authorization
• SSO with SAML/OAuth/Kerberos
• Multi-LDAP and AD integration
• Two-Factor Authentication
• Password Policies
• RBAC
Encryption
• Encryption – Data at Rest and
in Motion
• Encryption Strength
• Ownership of Encryption Keys
• FIPS 140-2 Certification
Mobile Security
• Secure Mobile Container
• Whitelisted Helper Applications
• Server Side Viewing
• Selective Remote Wipe
• Offline PIN
Confidential
Case Study #1
Problem: Case workers, medical
services teams and legal counsel
needed to securely share
confidential youth services data with
outside parties.
“95 percent of our data must be kept confidential, driving us to find a
secure mode to exchange information with parents, between staff members, and
with the community at large. Accellion was the only solution that met our strict
security guidelines, yet made it easy for non – technical individuals to use.”
Texas Juvenile
Justice Department
Solution: Enterprise file transfer
solution with LDAP/AD integration
available in virtual and physical
appliance
“
“
Confidential
Case Study #2
Problem: The council needed to
implement a BYOD policy to help improve
worker productivity, reduce IT equipment
costs, and give employees the freedom to
use the device of their choice.
“Accellion acts as the single platform for users to access, review and
collaborate on content from mobile devices of their choosing,” said
Lawrence. “Now we have a solution that’s integrated with our MDM solution
and SharePoint, allowing us to securely mobilize our most important content
and make BYOD a reality..”
London Borough
of Camden
Solution: Accellion Mobile File
Sharing solution that provided robust IT
controls, multiple deployment
options, SharePoint
integration, collaboration with online
workspaces, mobile access to files in
Accellion and SharePoint, and multi-
layered authentication via LDAP.
“
“
Confidential
Achieving Secure BYOD in Government
Agencies
Download Webinar
Replay
• BYOD is creating challenges for government
agencies globally.
• Providing a robust mobile file sharing solution is
necessary for government agencies implementing
BYOD programs and taking advantage of cloud
computing technologies.
Accellion provides enterprise-class mobile file sharing
solutions that enable secure anytime, anywhere access to
information while ensuring enterprise security and
compliance.
The world’s leading corporations and government agencies
select Accellion to protect intellectual property, ensure
compliance, improve business productivity and reduce IT
cost.
Learn more about Accellion here: www.accellion.com
Connect with Accellion here:
About Accellion

Contenu connexe

Tendances

WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Dr. Michael Agbaje
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesDenim Group
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
CYBERSECURITY.pdf
CYBERSECURITY.pdfCYBERSECURITY.pdf
CYBERSECURITY.pdfSprintzeal
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsVandana Verma
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMBitglass
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115Devaraj Sl
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 

Tendances (20)

WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
CYBERSECURITY.pdf
CYBERSECURITY.pdfCYBERSECURITY.pdf
CYBERSECURITY.pdf
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115
 
Isaca tech session 19 feb 2013 securing mobile devices rev
Isaca tech session 19 feb 2013   securing mobile devices revIsaca tech session 19 feb 2013   securing mobile devices rev
Isaca tech session 19 feb 2013 securing mobile devices rev
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 

Similaire à Achieving Secure BYOD in Government Agencies

Discover - Emerging Cloud Technologies
Discover - Emerging Cloud TechnologiesDiscover - Emerging Cloud Technologies
Discover - Emerging Cloud TechnologiesLaurenWendler
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Tim Harvey
 
BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?VMware
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationKirk Donnan
 
Mobile Growing Pains in the Public Sector
Mobile Growing Pains in the Public SectorMobile Growing Pains in the Public Sector
Mobile Growing Pains in the Public SectorVMware
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Proofpoint
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChaptemariuse18nolet
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxvrickens
 
Cathal McGloin (Red Hat)
Cathal McGloin (Red Hat)Cathal McGloin (Red Hat)
Cathal McGloin (Red Hat)scoopnewsgroup
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Bernard Kufluk
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
Tecnologias Estratégicas
Tecnologias Estratégicas Tecnologias Estratégicas
Tecnologias Estratégicas sucesu68
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobilitykhanrock247
 

Similaire à Achieving Secure BYOD in Government Agencies (20)

Discover - Emerging Cloud Technologies
Discover - Emerging Cloud TechnologiesDiscover - Emerging Cloud Technologies
Discover - Emerging Cloud Technologies
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
 
BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content Collaboration
 
Mobile Growing Pains in the Public Sector
Mobile Growing Pains in the Public SectorMobile Growing Pains in the Public Sector
Mobile Growing Pains in the Public Sector
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Cathal McGloin (Red Hat)
Cathal McGloin (Red Hat)Cathal McGloin (Red Hat)
Cathal McGloin (Red Hat)
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
Tecnologias Estratégicas
Tecnologias Estratégicas Tecnologias Estratégicas
Tecnologias Estratégicas
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 

Plus de Proofpoint

You can wear it!
You can wear it!You can wear it!
You can wear it!Proofpoint
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Proofpoint
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePointProofpoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File SharingProofpoint
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsProofpoint
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsProofpoint
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Proofpoint
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityProofpoint
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Proofpoint
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Proofpoint
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityProofpoint
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile PrintingProofpoint
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud CollaborationProofpoint
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationProofpoint
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepointProofpoint
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationProofpoint
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODProofpoint
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IIProofpoint
 

Plus de Proofpoint (20)

You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud Collaboration
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYOD
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part II
 

Dernier

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Dernier (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Achieving Secure BYOD in Government Agencies

  • 1. Achieving Secure BYOD in GovernmentAgencies Nina Seth: Sr. Product Marketing Manager
  • 2. Confidential Agenda • Market Overview – Government Industry • Government Technology Trends • Government Challenges • Solutions • Case Studies
  • 3. Confidential Market Size US Government IT Spending $80 billion Worldwide Government IT Spending $449.5 billion Cloud Computing IT Spending $20 billion
  • 4. Confidential Top Governments Technology Trends Cloud US Gov has a Cloud First Policy Mobile Of all GOV workers: 64% use Smartphones 19% use tablets 55% bring their own devices Security Top 3 security requirements: FIPS 140-2, SSO, Authentication
  • 5. Confidential Mobility and BYOD Trends The Digital Gov Strategy calls for cross-agency collaboration and adoption of mobile workforce solutions. Mobile Work Exchange: 2013 Digital Dilemma Report • Federal workers gain 9 hours of productivity per week with mobile devices, $28B annual productivity gains • Just 11% of Fed workers and 13% of state/local works who use personal devices say their agency has a BYOD policy. • Lack of security on personal devices is a recipe for disaster • 58% of Fed workers say their agency can take advantage of mobile devices
  • 6. Confidential Raising Productivity Real-time access to date = Productivity Mobile Work Exchange: 2013 Digital Dilemma Report 61% 62% 47% 76% 0% 10% 20% 30% 40% 50% 60% 70% 80% Improved communication Better customer service Increased collaboration Increase productivity
  • 7. Confidential Government Tech Challenges Intra/Inter Agency Collaboration Share sensitive content with only authorized personnel using secure online workspaces BYOD Leverage mobile devices to better serve constituents and ensure continuity of government Implement BYOD programs Data Security Protect and control of government data Achieve regulatory compliance Access to Data across Sources Access government content across data sources and across devices (mobile and laptop)
  • 8. Confidential 8 Accellion - Snapshot • Founded 1999 • Headquartered in Palo Alto, CA • 1,900+ Enterprise Customers • 11+ Million Enterprise Users • Secure Mobile File Sharing Solutions
  • 10. Confidential Accellion for Government Accellion is the leading provider of private cloud secure file sharing solutions for government agencies that enable intra and inter agency collaboration across mobile, desktop and laptop devices.
  • 12. Confidential Solution #1 Intra and Inter Agencies Collaboration Supports the US Digital Government Strategy to promote cross-agency collaboration Accellion Mobile File Sharing provides: • Secure online workspaces • Commenting • Version control • Lock/Unlock
  • 13. Confidential Solution #2 Secure Mobile Productivity for Government Agencies Accellion Mobile Apps supports the Digital Government Strategy to accelerate the adoption of mobile solutions to enable continuity of government. • View, create, edit, annotate, send and print documents • Secure mobile container to segregate data • Remote wipe data stored in the Accellion secure container • Integrate with MDM and MAM partners for managing BYOD programs
  • 15. Confidential Solution #3 Secure mobile access to distributed content Accellion enterprise connectors allow easy access to ECM systems without duplicating files • Access to files stored in SharePoint and Windows File Shares • No VPN
  • 16. Confidential Solution #4 Cloud Based Solutions Accellion supports the US Government’s Cloud First policy that mandates agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. • Private cloud (on-premise and hosted) • Public cloud • Hybrid cloud
  • 17. Confidential 17 Cloud Deployment Options Private On-Premise Private Hosted Public Multi-Tenant • Virtual appliance • No data co-mingling • Full control • Full security, compliance • No data co-mingling • Security and control • Low CapEx • Multi-tenant • Low CapEx
  • 18. Confidential 18 Government-Class Security Enterprise Security • Anti-Virus • Data Loss Prevention • Restricted Admin Access to Content • FedRAMP hosted cloud solutions Authentication/Authorization • SSO with SAML/OAuth/Kerberos • Multi-LDAP and AD integration • Two-Factor Authentication • Password Policies • RBAC Encryption • Encryption – Data at Rest and in Motion • Encryption Strength • Ownership of Encryption Keys • FIPS 140-2 Certification Mobile Security • Secure Mobile Container • Whitelisted Helper Applications • Server Side Viewing • Selective Remote Wipe • Offline PIN
  • 19. Confidential Case Study #1 Problem: Case workers, medical services teams and legal counsel needed to securely share confidential youth services data with outside parties. “95 percent of our data must be kept confidential, driving us to find a secure mode to exchange information with parents, between staff members, and with the community at large. Accellion was the only solution that met our strict security guidelines, yet made it easy for non – technical individuals to use.” Texas Juvenile Justice Department Solution: Enterprise file transfer solution with LDAP/AD integration available in virtual and physical appliance “ “
  • 20. Confidential Case Study #2 Problem: The council needed to implement a BYOD policy to help improve worker productivity, reduce IT equipment costs, and give employees the freedom to use the device of their choice. “Accellion acts as the single platform for users to access, review and collaborate on content from mobile devices of their choosing,” said Lawrence. “Now we have a solution that’s integrated with our MDM solution and SharePoint, allowing us to securely mobilize our most important content and make BYOD a reality..” London Borough of Camden Solution: Accellion Mobile File Sharing solution that provided robust IT controls, multiple deployment options, SharePoint integration, collaboration with online workspaces, mobile access to files in Accellion and SharePoint, and multi- layered authentication via LDAP. “ “
  • 21. Confidential Achieving Secure BYOD in Government Agencies Download Webinar Replay • BYOD is creating challenges for government agencies globally. • Providing a robust mobile file sharing solution is necessary for government agencies implementing BYOD programs and taking advantage of cloud computing technologies.
  • 22. Accellion provides enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to information while ensuring enterprise security and compliance. The world’s leading corporations and government agencies select Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT cost. Learn more about Accellion here: www.accellion.com Connect with Accellion here: About Accellion