Enable Secure Mobile & Cloud Collaboration
-
Upload
accellion -
Category
Technology
-
view
341 -
download
0
description
Transcript of Enable Secure Mobile & Cloud Collaboration
![Page 1: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/1.jpg)
Enable Secure Mobile & Cloud Collaboration(ISC)2 Secure Seattle 2013, Security Transcends TechnologyRama Kolappan, Mobile Director, Accellion.
![Page 2: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/2.jpg)
Confidential
Accellion - Snapshot
• Founded 1999
• Headquartered in Palo Alto, CA
• 1,700+ Enterprise Customers
• 11+ Million Enterprise Users
• Secure Mobile File Sharing Solutions
2
![Page 3: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/3.jpg)
3Confidential
Accellion Customers
![Page 4: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/4.jpg)
Confidential 4
The Problem: Sharing Enterprise Content Securely in the New iPad Era
The New Reality
• Proliferation of mobile devices and tablets, led by the iPad.
• Difficulties accessing enterprise content on mobile devices.
• Easy access to free cloud-based apps.
• Consumerization of IT creating security challenges.
![Page 5: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/5.jpg)
5Confidential
Terms of Service: Google Drivehttp://www.google.com/intl/en/policies/terms/
"When you upload or otherwise submit content to our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content. The rights you grant in this license are for the limited purpose of operating, promoting, and improving our Services, and to develop new ones. This license continues even if you stop using our Services…”
![Page 6: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/6.jpg)
6Confidential
A New Population of Mobile Workers
![Page 7: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/7.jpg)
7Confidential
Productivity Gains from Mobility
![Page 8: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/8.jpg)
Confidential 8
Mobile Productivity Challenges
Security and Data Leaks
Enterprise data leaks while moving data
across 3rd party apps using open-in and
save back
Integrated Productivity SolutionOnly access and view
content. Not able to create and edit content
securely as an integrated solution
Collaboration and Sharing
Collaborate and share newly created and edited documents
securely
![Page 9: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/9.jpg)
9Confidential
What Does BYOD Look Like?
![Page 10: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/10.jpg)
10Confidential
What Does BYOD Feel Like?
![Page 11: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/11.jpg)
11Confidential
The BYOD Challenge
How to make enterprise content accessible on mobile devices while maintaining control and security?
![Page 12: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/12.jpg)
12Confidential
Enterprise Mobility Management
Mobile Device Management
Mobile Application Management
Mobile Content Management
![Page 13: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/13.jpg)
13Confidential
Choosing MDM/MAM PartnerWrapped vs SDK based solutions
• Wrapped applications enforce following user polices:• Cut, Copy, and Paste• Printing• Screen Shot Snapshots• Open-In
• SDK based MDM/MAM APIs • Authorization and SSO• Encrypting Data at rest and In-Transit• Interoperability communication between applications• Open-In (Whitelisting and Blacklisting)
![Page 14: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/14.jpg)
14Confidential
Avoiding BYOD Disaster• Support iOS, Android, and Blackberry devices.• Support user self-provisioning.• Provide access to enterprise content stores.• Provide approved apps.
Enable
• Implement encryption of data at rest and in transit.• Support remote wipe.• Integrate user authentication, SSO, Auto credentials
(LDAP, AD).• Deploy secure cloud data storage.
Secure
• Provide configurable user permissions.• Ensure comprehensive file tracking and reporting.• Ensure auditable reports for demonstrating
compliance.• Manage user policies and profiles.
Manage
![Page 15: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/15.jpg)
15
Cloud Deployment Options
Private On-Premise
Private Hosted
Public Multi-Tenant
•Virtual appliance•Full control•Full security, compliance
•Single-tenant •Secure•Cloud agility
•Multi-tenant •Cloud agility
![Page 16: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/16.jpg)
Confidential 16
Security ControlsEnterprise Security•Anti-Virus•Data Loss Prevention•Restricted Admin Access to Content
Authentication / Authorization•SSO with SAML / OAuth / Kerberos•Multi-LDAP and AD integration•Two-Factor Authentication•Password Policies•RBAC
Encryption•Encryption – Data at Rest and in Motion•Encryption Strength•Ownership of Encryption Keys•FIPS 140-2 Certification
Mobile Security•Secure Mobile Container•Whitelisted Helper Applications•Server Side Viewing•Remote Wipe•Offline PIN
![Page 17: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/17.jpg)
Confidential 17
Integrating Enterprise Infrastructure
Mobile Device Management, Mobile Application Management
Enterprise multi-LDAP, Active Directory and AD Groups
Single Sign-On (SAML, OAuth, Kerberos)
Strong Authentication
Mobile Productivity
FTP and SMTP
APIs and Customizations
![Page 18: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/18.jpg)
Confidential 18
Secure Mobile Productivity• Create and edit content
securely, without the risk of data leaks during transit across 3rd party apps
• Private cloud – Create, edit and access content from private cloud with Accellion Mobile Productivity Suite
• Content encrypted in transit and at rest; content expiration supported
![Page 19: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/19.jpg)
19Confidential
Secure Mobile Workflow
• Mobilize existing content
• Internal/external sharing
• Unified access to all content
• No duplication of content
• Centralized control
![Page 20: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/20.jpg)
20Confidential
Tips for Avoiding BYOD Disaster• Support multiple mobile platforms• Extend security to every file and device• Integrate secure productivity capabilities• Select private cloud for maximum data security• Connect to enterprise content management systems• Deploy anti-virus to keep the malware out• Integrate DLP to keep the data in• Block consumer-class services
![Page 21: Enable Secure Mobile & Cloud Collaboration](https://reader036.fdocuments.in/reader036/viewer/2022070304/54b931384a7959005f8b4583/html5/thumbnails/21.jpg)
Accellion provides enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to information while ensuring enterprise security and compliance.
The world’s leading corporations and government agencies select Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT cost.
Learn more about Accellion here: www.accellion.com
Connect with Accellion here:
About Accellion