SlideShare une entreprise Scribd logo
1  sur  12
Lock Down Mobile and Cloud Data Leaks Part II
An Accellion Mobile Presentation
1. Lock Down Content




                       2
Data Encryption
                            DATA      AT      REST
                      +
                  FIPS Encryption   AES 128   Encrypted   Encrypted
 SSL




                                                              3
Hybrid Cloud




               “For most enterprises, a
               virtualized, automated on-premises
               infrastructure with a hosted, elastic
               option will be the best approach – the
               „hybrid‟ model.”
                                                   4
               -- William Fellows, Agatha Poon –
Roles and Rights


       o User policies, profiles
       o MDM integration
       o Authorized access
       o Authentication




                                   5
2. Give IT What They Need



              • Admin console
              • SAML/SSO
              • File tracking & reporting
                – audit trail
              • DLP integration
              • LDAP/AD integration



                                            6
Scalable and Redundant


         Scalable




                         7
3. Give Users What They Want
                                       Enterprise
                                       Content



        •   Collaborative workspaces                SharePoint
        •   File sharing
        •   Notification
        •   File commenting
        •   File synchronization
        •   Access to existing ECM

                                                    iManage

                                                                 8
Cross Platform Support and Ease of Use
Accellion Mobile File Sharing

 Enterprise-class solution that enables
    secure anytime, anywhere, with
 anyone, sharing of enterprise content
      while ensuring security and
              compliance.
Accellion Locks Down Mobile and Cloud
Accellion Hybrid Deployment Architecture



                    Accellion Secure
                     Public Cloud




                    Accellion Secure
                     Private Cloud
                                              Wireless
                                              Network

                                       = Mocana Wrapped Accellion Mobile App

Accellion Secure Sync                  = Accellion Mobile App for Good

Contenu connexe

Tendances

Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Ashnikbiz
 
A reality check on cloud content management
A reality check on cloud content managementA reality check on cloud content management
A reality check on cloud content managementAlfresco Software
 
Virtualized Data Centers: Beyond the Virtual Sum of Virtual Parts
Virtualized Data Centers: Beyond the Virtual Sum of Virtual PartsVirtualized Data Centers: Beyond the Virtual Sum of Virtual Parts
Virtualized Data Centers: Beyond the Virtual Sum of Virtual Partsdigitallibrary
 
A Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudA Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudGovCloud Network
 
Virtualized Data Centers
Virtualized Data CentersVirtualized Data Centers
Virtualized Data Centersdigitallibrary
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfMassimo Bertaccini
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Samrat Das
 
J75912 nec cloud brochure storage
J75912 nec cloud brochure storageJ75912 nec cloud brochure storage
J75912 nec cloud brochure storageNECIndia
 
Managed Iot services in pune
Managed Iot services in puneManaged Iot services in pune
Managed Iot services in puneAnshita Dixit
 
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareThe Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareHybrid Cloud
 
The Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIOThe Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIOHybrid Cloud
 
The Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXThe Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXHybrid Cloud
 
Confidence & The Cloud
Confidence & The CloudConfidence & The Cloud
Confidence & The CloudAlex Todd
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeHimani Singh
 
4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + Security4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + SecurityChris Roche
 

Tendances (20)

Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2
 
A reality check on cloud content management
A reality check on cloud content managementA reality check on cloud content management
A reality check on cloud content management
 
Virtualized Data Centers: Beyond the Virtual Sum of Virtual Parts
Virtualized Data Centers: Beyond the Virtual Sum of Virtual PartsVirtualized Data Centers: Beyond the Virtual Sum of Virtual Parts
Virtualized Data Centers: Beyond the Virtual Sum of Virtual Parts
 
A Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudA Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-Cloud
 
Virtualized Data Centers
Virtualized Data CentersVirtualized Data Centers
Virtualized Data Centers
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
J75912 nec cloud brochure storage
J75912 nec cloud brochure storageJ75912 nec cloud brochure storage
J75912 nec cloud brochure storage
 
Managed Iot services in pune
Managed Iot services in puneManaged Iot services in pune
Managed Iot services in pune
 
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareThe Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Azure IoT Hub
Azure IoT HubAzure IoT Hub
Azure IoT Hub
 
The Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIOThe Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIO
 
The Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXThe Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleX
 
Confidence & The Cloud
Confidence & The CloudConfidence & The Cloud
Confidence & The Cloud
 
PROOM
PROOMPROOM
PROOM
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + Security4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + Security
 

En vedette

DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
You can wear it!
You can wear it!You can wear it!
You can wear it!Proofpoint
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
 
TL Contact Care Pages
TL Contact Care PagesTL Contact Care Pages
TL Contact Care PagesKrupesh Shah
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePointProofpoint
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Proofpoint
 

En vedette (6)

DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
TL Contact Care Pages
TL Contact Care PagesTL Contact Care Pages
TL Contact Care Pages
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 

Similaire à Lock Down Mobile and Cloud Data Leaks Part II

Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Proofpoint
 
Gartner Catalyst Savvis Cloud API Case Study
Gartner Catalyst   Savvis Cloud API Case StudyGartner Catalyst   Savvis Cloud API Case Study
Gartner Catalyst Savvis Cloud API Case StudyCA API Management
 
Becloud hybrid cloud
Becloud hybrid cloudBecloud hybrid cloud
Becloud hybrid cloudBecloud
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy ArchitectureBob Rhubart
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...IndicThreads
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReaderDirectReader
 
Cloud File System and Cloud Data Management Interface (CDMI)
Cloud File System and Cloud Data Management Interface (CDMI)Cloud File System and Cloud Data Management Interface (CDMI)
Cloud File System and Cloud Data Management Interface (CDMI)Calsoft Inc.
 
Software Developer Conference 2012 - Paper Presentation - Cloud File Systems
Software Developer Conference 2012 - Paper Presentation - Cloud File SystemsSoftware Developer Conference 2012 - Paper Presentation - Cloud File Systems
Software Developer Conference 2012 - Paper Presentation - Cloud File SystemsAbhijeet Kulkarni
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedNuno Alves
 
Infrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationInfrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationBob Rhubart
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementNishant Kaushik
 
Introducing FileLocker, Secure Enterprise File Sharing, Syncing and Collabora...
Introducing FileLocker, Secure Enterprise File Sharing, Syncing and Collabora...Introducing FileLocker, Secure Enterprise File Sharing, Syncing and Collabora...
Introducing FileLocker, Secure Enterprise File Sharing, Syncing and Collabora...brianberlin
 
Improve OpenStack Hybrid Cloud Security With Intel, Mirantis and SoftLayer
Improve OpenStack Hybrid Cloud Security With Intel, Mirantis and SoftLayerImprove OpenStack Hybrid Cloud Security With Intel, Mirantis and SoftLayer
Improve OpenStack Hybrid Cloud Security With Intel, Mirantis and SoftLayerDavid Slovensky
 
Box Security Whitepaper
Box Security WhitepaperBox Security Whitepaper
Box Security WhitepaperBoxHQ
 

Similaire à Lock Down Mobile and Cloud Data Leaks Part II (20)

Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
 
Enterprise product catalog 2012
Enterprise product catalog 2012Enterprise product catalog 2012
Enterprise product catalog 2012
 
Gartner Catalyst Savvis Cloud API Case Study
Gartner Catalyst   Savvis Cloud API Case StudyGartner Catalyst   Savvis Cloud API Case Study
Gartner Catalyst Savvis Cloud API Case Study
 
Becloud hybrid cloud
Becloud hybrid cloudBecloud hybrid cloud
Becloud hybrid cloud
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy Architecture
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReader
 
Cloud File System and Cloud Data Management Interface (CDMI)
Cloud File System and Cloud Data Management Interface (CDMI)Cloud File System and Cloud Data Management Interface (CDMI)
Cloud File System and Cloud Data Management Interface (CDMI)
 
Software Developer Conference 2012 - Paper Presentation - Cloud File Systems
Software Developer Conference 2012 - Paper Presentation - Cloud File SystemsSoftware Developer Conference 2012 - Paper Presentation - Cloud File Systems
Software Developer Conference 2012 - Paper Presentation - Cloud File Systems
 
Monetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless Networks
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scripted
 
Infrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationInfrastructure Consolidation and Virtualization
Infrastructure Consolidation and Virtualization
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
Introducing FileLocker, Secure Enterprise File Sharing, Syncing and Collabora...
Introducing FileLocker, Secure Enterprise File Sharing, Syncing and Collabora...Introducing FileLocker, Secure Enterprise File Sharing, Syncing and Collabora...
Introducing FileLocker, Secure Enterprise File Sharing, Syncing and Collabora...
 
Improve OpenStack Hybrid Cloud Security With Intel, Mirantis and SoftLayer
Improve OpenStack Hybrid Cloud Security With Intel, Mirantis and SoftLayerImprove OpenStack Hybrid Cloud Security With Intel, Mirantis and SoftLayer
Improve OpenStack Hybrid Cloud Security With Intel, Mirantis and SoftLayer
 
Box Security Whitepaper
Box Security WhitepaperBox Security Whitepaper
Box Security Whitepaper
 

Plus de Proofpoint

Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File SharingProofpoint
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsProofpoint
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsProofpoint
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Proofpoint
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityProofpoint
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Proofpoint
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Proofpoint
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityProofpoint
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile PrintingProofpoint
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepointProofpoint
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part IProofpoint
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud. Proofpoint
 

Plus de Proofpoint (15)

Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part I
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud.
 

Dernier

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Dernier (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Lock Down Mobile and Cloud Data Leaks Part II

  • 1. Lock Down Mobile and Cloud Data Leaks Part II An Accellion Mobile Presentation
  • 2. 1. Lock Down Content 2
  • 3. Data Encryption DATA AT REST + FIPS Encryption AES 128 Encrypted Encrypted SSL 3
  • 4. Hybrid Cloud “For most enterprises, a virtualized, automated on-premises infrastructure with a hosted, elastic option will be the best approach – the „hybrid‟ model.” 4 -- William Fellows, Agatha Poon –
  • 5. Roles and Rights o User policies, profiles o MDM integration o Authorized access o Authentication 5
  • 6. 2. Give IT What They Need • Admin console • SAML/SSO • File tracking & reporting – audit trail • DLP integration • LDAP/AD integration 6
  • 8. 3. Give Users What They Want Enterprise Content • Collaborative workspaces SharePoint • File sharing • Notification • File commenting • File synchronization • Access to existing ECM iManage 8
  • 9. Cross Platform Support and Ease of Use
  • 10. Accellion Mobile File Sharing Enterprise-class solution that enables secure anytime, anywhere, with anyone, sharing of enterprise content while ensuring security and compliance.
  • 11. Accellion Locks Down Mobile and Cloud
  • 12. Accellion Hybrid Deployment Architecture Accellion Secure Public Cloud Accellion Secure Private Cloud Wireless Network = Mocana Wrapped Accellion Mobile App Accellion Secure Sync = Accellion Mobile App for Good

Notes de l'éditeur

  1. There is an old quote (or article) from Bill Gates that said Content is King (which back in late 90’s he really meant that Content is where the real money will be made on the Internet), which still holds true today. With only difference that today, it’s the Secure Content that is Kind.Everything that a mobile user does with a file, (download, upload, save, edit, send, or just keep locally) should be allowed to happen in a secure environment transparently and w/o putting add’l burden on the mobile user. In other words, a content delivery solution has to lockdown the content. Let’s look further into what I mean by this lock down of the content.
  2. What is meant is making the data unreadable at all times except when ready to view or edit the content. That means offer industry-grade encryption for data in all of its states, while in Transit, Data while in the Cloud and even just at rest on the device.Data in Transit should be using SSL, or integrate with VPN, should encrypt content that sits in the cloud using either FIPS or AES128, and provide encryption FIPS or AES256 on data residing on the device.If the solution has satellite controllers, it should also encrypt the communication between servers and the Satellite units.This is vital, particularly for enterprises in regulated industries.
  3. There are two types of content in an enterprise: Confidential and not so Confidential. The confidential content needs to be placed in a Cloud infrastructure that is controlled by IT, either behind the firewall or in DMZ. The not so confidential content, however, does not have to be. It can be in a public or private cloud, with the ability to interoperate with cloud behind the firewall or the DMZ.In other words, the Confidential content in the Cloud has to be locked down, where as the non confidential content doesn’t have to be. To enable this, a content delivery solution has to offer to a hybrid deployment option of on-premise, off-premise and a combination of both.This not only allows locking down cloud content leaks, it also satisfies the objectives of both categories of CIOs.Incidentally, This deployment option capability is not just a value proposition of Accellion Solution, it is also an important differentiator for Accellion; William Fellow of 451 Research Group totally supports this.
  4. Additional security considerations that should exist in the solution include ability to:Instituting user group segmentation and access policiesBe able to integrate into Good, or Mobile Iron or BoxTone MDM environments.Authenticate Users for cloud and device access
  5. And equally important, give IT what they need:SAML/SSOFile tracking & reporting – audit trailDLP integrationArchival integrationEnterprise content plug-insAdmin consoleFurther, the solution should integrate with existing corporate directory implementations such as LDAP and AD.
  6. To an average mobile biz user, it must look like it is just a simple Mobile app that one downloads from the App Store. But it talks to a back-end.That back-end has to be Enterprise ClassIt must be scalable, offer availability and redundancy, but speed of delivery of content to a large number of mobile business users out-of-the-box, and still provide room for growth.Most solutions today begin to degrade beyond a couple of thousands of subscribers. Accellion’s offering maintains the same delivery performance for organizations of 100,000+ mobile users.
  7. Solution Capabilities:Secure Mobile File Access & SharingSecure file access, viewing and sharing of Enterprise Content on smart phones and tablets. Secure CollaborationFlexible secure file sharing capabilities for project teams, virtual data rooms and deal rooms. Secure File TransferSecure delivery of files/folders up to 100GB to internal and external recipientsTransparent access to content that resides in existing ECM repositoriesFile Sync *New Accellion Feature*File syncing via the cloud on your entire file system, or a portion of it, or even On-demand..
  8. Cross PlatformToday’s BYOD users have the broadest range of devices. They include everyone, with a variety of smartphones and tablets across multiple mobile platforms. The mobile app must run on all popular platforms, including Apple, Android and BlackBerry OS, which basically covers 95% of mobile devices in use today by business users.And obviously be an enabler, intuitive to use, in terms of mobile user experience and human interface with the mobile apps and the Web interface.
  9. I am now going to spend a couple of slides on who Accellion is:What we provide isan enterprise-class mobile file sharing solution that enables secure anytime, anywhere with anyone access to informationwhile ensuring enterprise security and compliance.
  10. We focus on secure delivery and control of content that is used by mobile users. How we implement this is simply by providing a container within which mobile users can access content, with their popular mobile devices. It is transparent to the mobile user, but offers a secure environment.All content accessed by Accellion mobile apps--whether the app is running on an iPhone, iPad, Android or BlackBerry device; and all content accessed from an Accellion Cloud--whether it is a private, public or hybrid Cloudis kept in a container that is encrypted and can only be accessed by that authenticated user. It can not leak out, as long as it is in that container.
  11. We are a private company with HQ in Palo Alto. We were founded in 1999 and today have over 1400 Enterprise Customers and 9M Enterprise users.Our solution is a robust enterprise offering and has gone through many years of innovation and maturity, and has received several Excellence Awards by Tech-Ed, Network Computing and three times by Info Security, most recent of which was a Trend Setter award by Info Tech in June 2012, where we beat Dropbox, YouSendIt, and Box who did not pass the screening test. That is why we currently enjoy a 96% loyalty rate by our customers. That is to say, 96% of our customers renew their licenses with us.http://www.sfgate.com/business/prweb/article/Info-Tech-Research-Group-Urges-Businesses-to-3678851.php