SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
Mind the Gap
Navigating the Security Challenges of BYOD


Paula Skokowski, Chief Marketing Officer
Accellion


October 2012
Agenda

•   Enabling Remote/Mobile Workforce
•   Navigating BYOD Challenges
•   Ensuring Data Security & Control
•   Recommendations




                                       2
Accellion - Snapshot
• Headquartered in Palo Alto, CA
• 1,600+ Enterprise Customers
• 10+ Million Enterprise Users

Provide enterprise-class mobile file sharing solutions that
 enable secure anytime, anywhere access to enterprise
    content while ensuring security and compliance.




                                                              3
The BYOD Phenomenon
Device        Q212 Worldwide
                Purchases
Smartphones       108M
Tablets            25M




                                                   4
                               Source: IDC, 2012
The BYOD Challenge

                 How to make enterprise
                 content accessible on
                 mobile devices while
                 maintaining control and
                 security?




                                           5
The Dual Persona Mobile User
                        I’m a
    I’m a
                      Consumer
Business User




                                 6
Dual Persona – Which App to Use?




                                   7
Navigating the BYOD Challenge
• How to enable employees to
  access, receive, share and store confidential
  information on personal devices.
• How to control employee use of cloud file storage
  and collaboration solutions.

    How to Enable, Secure & Manage
      access to enterprise content.

                                                 8
Navigating the BYOD Challenge
           • Support iOS, Android, and Blackberry devices.

  Enable   • Support user self-provisioning.
           • Provide access to enterprise content stores.
           • Provide Approved Apps.



           • Encryption of data at rest and in transit.

  Secure   • Remote Wipe.
           • User authentication, SSO, Auto Credentials (LDAP, AD).
           • Secure cloud data storage.



           • Configurable User Permissions.

 Manage    • Comprehensive File Tracking and Reporting.
           • Auditable reports for demonstrating compliance.
           • Manage user policies and profiles.

                                                                      9
Enterprise Mobility Management




Mobile       Mobile        Mobile
Device       Application   Content
Management   Management    Management

                                        10
Private Cloud File Sharing

Private Cloud     Public Cloud
 File Sharing     File Sharing




                                 11
Private Cloud vs Public Cloud
  What is your corporate DNA and tolerance for risk?
  • No solution is 100% secure …
    … yet Public Clouds inherently introduce more risk

  CapEx vs OpEx?
  • CFO preference?

  Hybrid Cloud a viable option?
  • Mix and match for scale, geographical distribution, satellite offices?

  Hosted vs On Premise?
  • Hosted Private Cloud?
                                                                         12
Security
  Encryption – Data at Rest and in Motion – Across all devices

     Blacklisting/Whitelisting of Helper Mobile Apps

       Anti-Virus

       Data Loss Prevention

       Server Side Viewing

     Role Based Access Control

  Secure Mobile Container – Remote Wipe
                                                          13
Enterprise Integrations
  Enterprise multi-LDAP, Active Directory and AD Groups

     Single Sign-On (SAML, OAuth, Kerberos)

         Strong Authentication

         Mobile Device Management, Mobile App Management

         Office Productivity

     FTP and SMTP

  APIs
                                                          14
Compliance and Reporting

 Reporting                       Compliance
 Granularity of Reporting        FIPS Compliance

 Export to 3rd Party Reporting   PCI Compliance

 Log formatting for export       SOX Compliance
 SNMP (Monitoring)               HIPAA Compliance
                                 Integration with GRC

                                                  15
Mobilizing Enterprise Content


                            File Shares




  Mobile App




  Web Access

                                          16
Leverage Existing ECM Stores
Mobilize existing content
 • SharePoint, other ECM systems
 • Windows File Shares, NFS, and other file servers
Share Externally

Share Transparently, without duplicating files

Centralize access to disparate content silos

Centralize auditing and reporting across disparate content stores


                                                         17
Give Users What They Want
                                       Enterprise
                                       Content


          • Mobile Access                           SharePoint
          • Synced Files/Folders
          • Collaborative Workspaces
          • File Sharing
          • Notification
          • File Commenting
          • File Version Tracking




                                                             18
Give IT What It Needs
                                            Enterprise
                                            Content


          • SSL, Encryption
          • User Authentication
                                                         SharePoint
          • LDAP/AD Integration
          • SAML/SSO
          • File Tracking & Reporting – Audit Trail
          • DLP Integration
          • Archival Integration
          • Enterprise Content Plug-ins




                                                                 19
Tips for Navigating BYOD Challenges
 •   Support multiple mobile platforms
 •   Give IT central control
 •   Extend Security to every file and device
 •   Select Private Cloud for maximum data security
 •   Connect to enterprise content management systems
 •   Deploy anti-virus to keep the bad stuff out
 •   Integrate DLP to keep the good stuff in
 •   Block consumer-class services



                                                 20
Thanks!

For more information:

Visit www.accellion.com
or call 1 650 485 4300


                          21

Contenu connexe

Tendances

Welcome to Asset Bank
Welcome to Asset BankWelcome to Asset Bank
Welcome to Asset BankAsset Bank
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IIProofpoint
 
J75912 nec cloud brochure storage
J75912 nec cloud brochure storageJ75912 nec cloud brochure storage
J75912 nec cloud brochure storageNECIndia
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareThe Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareHybrid Cloud
 
Is Silverlight Ready to Replace Flash in the Enterprise?
Is Silverlight Ready to Replace Flash in the Enterprise?Is Silverlight Ready to Replace Flash in the Enterprise?
Is Silverlight Ready to Replace Flash in the Enterprise?WinWire Technologies Inc
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry
 
The Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIOThe Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIOHybrid Cloud
 
The Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXThe Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXHybrid Cloud
 
IDC-IL Webcast on Enterprise Content Collaboration
IDC-IL Webcast on Enterprise Content Collaboration IDC-IL Webcast on Enterprise Content Collaboration
IDC-IL Webcast on Enterprise Content Collaboration Sri Chilukuri
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution DatasheetMicrosoft Private Cloud
 
Creating Successful Extranets on SharePoint
Creating Successful Extranets on SharePointCreating Successful Extranets on SharePoint
Creating Successful Extranets on SharePointedynamic
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...BlackBerry
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Gartner Catalyst Savvis Cloud API Case Study
Gartner Catalyst   Savvis Cloud API Case StudyGartner Catalyst   Savvis Cloud API Case Study
Gartner Catalyst Savvis Cloud API Case StudyCA API Management
 
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefThe Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefHybrid Cloud
 
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Kenny Buntinx
 

Tendances (20)

Welcome to Asset Bank
Welcome to Asset BankWelcome to Asset Bank
Welcome to Asset Bank
 
Cisco quad
Cisco quadCisco quad
Cisco quad
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part II
 
J75912 nec cloud brochure storage
J75912 nec cloud brochure storageJ75912 nec cloud brochure storage
J75912 nec cloud brochure storage
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareThe Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
 
Is Silverlight Ready to Replace Flash in the Enterprise?
Is Silverlight Ready to Replace Flash in the Enterprise?Is Silverlight Ready to Replace Flash in the Enterprise?
Is Silverlight Ready to Replace Flash in the Enterprise?
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile Applications
 
The Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIOThe Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIO
 
The Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXThe Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleX
 
IDC-IL Webcast on Enterprise Content Collaboration
IDC-IL Webcast on Enterprise Content Collaboration IDC-IL Webcast on Enterprise Content Collaboration
IDC-IL Webcast on Enterprise Content Collaboration
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
 
Creating Successful Extranets on SharePoint
Creating Successful Extranets on SharePointCreating Successful Extranets on SharePoint
Creating Successful Extranets on SharePoint
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
 
Citrix Day 2012: ShareFile
Citrix Day 2012: ShareFileCitrix Day 2012: ShareFile
Citrix Day 2012: ShareFile
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Gartner Catalyst Savvis Cloud API Case Study
Gartner Catalyst   Savvis Cloud API Case StudyGartner Catalyst   Savvis Cloud API Case Study
Gartner Catalyst Savvis Cloud API Case Study
 
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefThe Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
 
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
 
Cloud desktop for byod
Cloud desktop for byodCloud desktop for byod
Cloud desktop for byod
 

Similaire à Mind the gap: Navigating the Security Challenges of BYOD

Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedNuno Alves
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Proofpoint
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)PT Datacomm Diangraha
 
Modernize Your Network Shares
Modernize Your Network SharesModernize Your Network Shares
Modernize Your Network SharesAxway
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReaderDirectReader
 
Translating Open Source Value to the Cloud
Translating Open Source Value to the CloudTranslating Open Source Value to the Cloud
Translating Open Source Value to the CloudGordon Haff
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Global Business Events
 
Alfresco - Floating on the cloud
Alfresco - Floating on the cloudAlfresco - Floating on the cloud
Alfresco - Floating on the cloudPaul Hampton
 
Floating on the Alfresco Cloud
Floating on the Alfresco CloudFloating on the Alfresco Cloud
Floating on the Alfresco CloudAlfresco Software
 
Enterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataEnterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataSoftControl.net Ltd.
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...ILYA ROITMAN
 
Mobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMike Brannon
 
Infrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationInfrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationBob Rhubart
 
Turning Open Stack Swift Into A Rich Business Ready Cloud Service
Turning Open Stack Swift Into A Rich Business Ready Cloud ServiceTurning Open Stack Swift Into A Rich Business Ready Cloud Service
Turning Open Stack Swift Into A Rich Business Ready Cloud Servicejimliddle
 
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure Sentri
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
Introduction To Google Apps
Introduction To Google AppsIntroduction To Google Apps
Introduction To Google AppsJamie Barmach
 
Introduction to GoogleApps
Introduction to GoogleAppsIntroduction to GoogleApps
Introduction to GoogleAppsVasanth Karthick
 
Cloud Computing: What it Means for Libraries, Library Staff, Training and Skills
Cloud Computing: What it Means for Libraries, Library Staff, Training and SkillsCloud Computing: What it Means for Libraries, Library Staff, Training and Skills
Cloud Computing: What it Means for Libraries, Library Staff, Training and Skillssherif user group
 

Similaire à Mind the gap: Navigating the Security Challenges of BYOD (20)

Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scripted
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)
 
Modernize Your Network Shares
Modernize Your Network SharesModernize Your Network Shares
Modernize Your Network Shares
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReader
 
Translating Open Source Value to the Cloud
Translating Open Source Value to the CloudTranslating Open Source Value to the Cloud
Translating Open Source Value to the Cloud
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
 
Alfresco - Floating on the cloud
Alfresco - Floating on the cloudAlfresco - Floating on the cloud
Alfresco - Floating on the cloud
 
Floating on the Alfresco Cloud
Floating on the Alfresco CloudFloating on the Alfresco Cloud
Floating on the Alfresco Cloud
 
Enterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataEnterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing data
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
 
Mobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not Repressive
 
Infrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationInfrastructure Consolidation and Virtualization
Infrastructure Consolidation and Virtualization
 
Turning Open Stack Swift Into A Rich Business Ready Cloud Service
Turning Open Stack Swift Into A Rich Business Ready Cloud ServiceTurning Open Stack Swift Into A Rich Business Ready Cloud Service
Turning Open Stack Swift Into A Rich Business Ready Cloud Service
 
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Introduction To Google Apps
Introduction To Google AppsIntroduction To Google Apps
Introduction To Google Apps
 
Introduction to GoogleApps
Introduction to GoogleAppsIntroduction to GoogleApps
Introduction to GoogleApps
 
Cloud Computing: What it Means for Libraries, Library Staff, Training and Skills
Cloud Computing: What it Means for Libraries, Library Staff, Training and SkillsCloud Computing: What it Means for Libraries, Library Staff, Training and Skills
Cloud Computing: What it Means for Libraries, Library Staff, Training and Skills
 

Plus de Proofpoint

You can wear it!
You can wear it!You can wear it!
You can wear it!Proofpoint
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Proofpoint
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePointProofpoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File SharingProofpoint
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsProofpoint
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsProofpoint
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Proofpoint
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityProofpoint
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Proofpoint
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Proofpoint
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityProofpoint
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile PrintingProofpoint
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepointProofpoint
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part IProofpoint
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud. Proofpoint
 

Plus de Proofpoint (18)

You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part I
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud.
 

Mind the gap: Navigating the Security Challenges of BYOD

  • 1. Mind the Gap Navigating the Security Challenges of BYOD Paula Skokowski, Chief Marketing Officer Accellion October 2012
  • 2. Agenda • Enabling Remote/Mobile Workforce • Navigating BYOD Challenges • Ensuring Data Security & Control • Recommendations 2
  • 3. Accellion - Snapshot • Headquartered in Palo Alto, CA • 1,600+ Enterprise Customers • 10+ Million Enterprise Users Provide enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to enterprise content while ensuring security and compliance. 3
  • 4. The BYOD Phenomenon Device Q212 Worldwide Purchases Smartphones 108M Tablets 25M 4 Source: IDC, 2012
  • 5. The BYOD Challenge How to make enterprise content accessible on mobile devices while maintaining control and security? 5
  • 6. The Dual Persona Mobile User I’m a I’m a Consumer Business User 6
  • 7. Dual Persona – Which App to Use? 7
  • 8. Navigating the BYOD Challenge • How to enable employees to access, receive, share and store confidential information on personal devices. • How to control employee use of cloud file storage and collaboration solutions. How to Enable, Secure & Manage access to enterprise content. 8
  • 9. Navigating the BYOD Challenge • Support iOS, Android, and Blackberry devices. Enable • Support user self-provisioning. • Provide access to enterprise content stores. • Provide Approved Apps. • Encryption of data at rest and in transit. Secure • Remote Wipe. • User authentication, SSO, Auto Credentials (LDAP, AD). • Secure cloud data storage. • Configurable User Permissions. Manage • Comprehensive File Tracking and Reporting. • Auditable reports for demonstrating compliance. • Manage user policies and profiles. 9
  • 10. Enterprise Mobility Management Mobile Mobile Mobile Device Application Content Management Management Management 10
  • 11. Private Cloud File Sharing Private Cloud Public Cloud File Sharing File Sharing 11
  • 12. Private Cloud vs Public Cloud What is your corporate DNA and tolerance for risk? • No solution is 100% secure … … yet Public Clouds inherently introduce more risk CapEx vs OpEx? • CFO preference? Hybrid Cloud a viable option? • Mix and match for scale, geographical distribution, satellite offices? Hosted vs On Premise? • Hosted Private Cloud? 12
  • 13. Security Encryption – Data at Rest and in Motion – Across all devices Blacklisting/Whitelisting of Helper Mobile Apps Anti-Virus Data Loss Prevention Server Side Viewing Role Based Access Control Secure Mobile Container – Remote Wipe 13
  • 14. Enterprise Integrations Enterprise multi-LDAP, Active Directory and AD Groups Single Sign-On (SAML, OAuth, Kerberos) Strong Authentication Mobile Device Management, Mobile App Management Office Productivity FTP and SMTP APIs 14
  • 15. Compliance and Reporting Reporting Compliance Granularity of Reporting FIPS Compliance Export to 3rd Party Reporting PCI Compliance Log formatting for export SOX Compliance SNMP (Monitoring) HIPAA Compliance Integration with GRC 15
  • 16. Mobilizing Enterprise Content File Shares Mobile App Web Access 16
  • 17. Leverage Existing ECM Stores Mobilize existing content • SharePoint, other ECM systems • Windows File Shares, NFS, and other file servers Share Externally Share Transparently, without duplicating files Centralize access to disparate content silos Centralize auditing and reporting across disparate content stores 17
  • 18. Give Users What They Want Enterprise Content • Mobile Access SharePoint • Synced Files/Folders • Collaborative Workspaces • File Sharing • Notification • File Commenting • File Version Tracking 18
  • 19. Give IT What It Needs Enterprise Content • SSL, Encryption • User Authentication SharePoint • LDAP/AD Integration • SAML/SSO • File Tracking & Reporting – Audit Trail • DLP Integration • Archival Integration • Enterprise Content Plug-ins 19
  • 20. Tips for Navigating BYOD Challenges • Support multiple mobile platforms • Give IT central control • Extend Security to every file and device • Select Private Cloud for maximum data security • Connect to enterprise content management systems • Deploy anti-virus to keep the bad stuff out • Integrate DLP to keep the good stuff in • Block consumer-class services 20
  • 21. Thanks! For more information: Visit www.accellion.com or call 1 650 485 4300 21