Your SlideShare is downloading. ×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Accellion SC Congress Chicago Presentation 2014


Published on

In his presentation "Securing Content in the Changing Landscape of the Mobile Enterprise", Rama Kolappan Director of Product Marketing at Accellion, provided insight into some of the more important …

In his presentation "Securing Content in the Changing Landscape of the Mobile Enterprise", Rama Kolappan Director of Product Marketing at Accellion, provided insight into some of the more important trends and issues related to supporting and securing mobile access to confidential information in the BYOD post-PC era.

SC Congress Chicago is a unique conference and expo experience for private and public sector information security professionals. It offers practical solutions, expert guidance and timely information.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Securing Content in the Changing Landscape of the Mobile Enterprise SC Congress Chicago, November 20, 2013 Rama Kolappan Director, Product Marketing Accellion, Inc.
  • 2. The Problem: Sharing Enterprise Content Securely in the New iPad Era The New Reality • Proliferation of mobile devices and tablets, led by the iPad. • Difficulties accessing enterprise content on mobile devices. • Easy access to free cloud-based apps. • Consumerization of IT creating security challenges. Confidential 2
  • 3. The BYOD Challenge How to make enterprise content accessible on mobile devices while maintaining control and security? Confidential
  • 4. Enterprise Mobile Productivity Evolution Email, Contacts, Calendar Content, Backup, Store, Sync Collaboration & Sharing Productivity Trend Confidential Content Creation, Editing, Printing ECM & Content Access
  • 5. Mobility and BYOD Trends Confidential State of Mobility Survey (6275 Organizations surveyed) Symantec 5
  • 6. Enterprise Mobility Management Mobile Device Management Confidential Mobile Application Management Mobile Content Management 6
  • 7. Mobile Security – iSMG Survey What are your biggest mobile security / privacy concerns? Which new security controls will you invest in during 2013? 74% Data security 48% Application security 31% 30% Continuous monitoring 24% Auditing and logging 28% Device configuration 31% Identity and access management 31% Authentication 33% Mobile device management solution 39% Malware 34% E-mail encryption 43% Unsecured wireless networks 34% Anti-malware protection 54% User behavior Authentication Data encryption 66% Device security 48% Awareness and training 24% 19% Mobile application management… 26% Managing multiple platforms 22% Managing mobile device inventory Varying privacy regulations across geographical regions Confidential 20% 13% VPN 8% 0% 15% Physical access controls 7% Internal application development 40% 60% Spring 2013. iSMG Survey: 200+ respondents (CIOs, CISOs, IT Directors, other senior leaders) 80% 0% 20% 40% 60%
  • 8. Mobile Content Management Requirements Key Considerations Mobile Productivity Mobilize Existing Content Confidential Cloud Deployment Options Security Controls
  • 9. Cloud Deployment Options Private On-Premise Private Hosted No data co-mingling Virtual appliance Full control Full security, compliance • Data Sovereignty • No data co-mingling • Security and control • Low CapEx • • • • Public Multi-Tenant • Multi-tenant • Low CapEx
  • 10. Security Controls Authentication / Authorization Enterprise Security • Anti-Virus • Data Loss Prevention • Restricted Admin Access to Content • • • • • Encryption • Encryption – Data at Rest and in Motion • Encryption Strength • FIPS 140-2 Certification Confidential SSO with SAML/OAuth/Kerberos Multi-LDAP and AD integration Two-Factor Authentication Password Policies RBAC Mobile Security • • • • • Secure Mobile Container Whitelisted Helper Applications Server Side Viewing Selective Remote Wipe Offline PIN
  • 11. Finding the Right Balance Good Usability Confidential Too Many Controls?
  • 12. Mobilize Enterprise Content • Mobilize existing content • SharePoint, Windows File Shares • Internal/external sharing • Unified access to all content • No duplication of content • Centralized control Confidential
  • 13. Secure Mobile Productivity • Create and edit content securely, without the risk of data leaks during transit across 3rd party apps • Private cloud – Create, edit and access content from private cloud with Accellion Mobile Productivity capabilities Confidential • Data encrypted in transit and at rest; content expiration supported
  • 14. Mobile Content Management Requirements Key Considerations Mobile Productivity Mobilize Existing Content Confidential Cloud Deployment Options Security Controls
  • 15. Accellion - Snapshot • Founded 1999 • Headquartered in Palo Alto, CA • 2,000+ Enterprise Customers • 12+ Million Enterprise Users • Secure Mobile File Sharing Solutions Confidential
  • 16. Accellion Customers Confidential 16
  • 17. Gartner MarketScope Accellion Rated “Strong Positive” Highest Possible Rating Confidential
  • 18. Accellion Solution Overview Anytime, Anywhere Access to Enterprise Content Secure File Transfer • Send files as secure links • Very large file support (1 TB+) • Rich security options Secure Collaboration & Sharing • • • • Secure team workspaces Desktop-workspace file sync Versioning, Commenting Highly flexible access control Secure Content Access • Access content stored behind the firewall • Secure, anytime access to “Document of Record” • No VPN required • Respects permissions of source Confidential Mobile Productivity • Create, edit and share MS Office compatible files • Fully containerized for end-to-end document security • Works with ECM, Collaboration and Secure Send
  • 19. MANAGE SECURE ENGAGE Avoiding BYOD Disaster Confidential Enabl e Secur e Mana ge • Support iOS, Android, and Windows devices. • Support user self-provisioning. • Provide access to enterprise content stores. • Provide approved apps. • Provide secure mobile printing. • Implement encryption of data at rest and in transit. • Support remote wipe. • Integrate user authentication, SSO, Auto credentials (LDAP, AD). • Integrate DLP to keep data in. • Provide configurable user permissions. • Ensure comprehensive file tracking and reporting. • Ensure auditable reports for demonstrating compliance. • Manage user policies and profiles. 19
  • 20. Learn More Web Whitepapers, Datasheets, Videos, Analyst Reports, Blogs Call 1-855-485-4300 Social Media Confidential Twitter @Accellion LinkedIn Facebook
  • 21. About Accellion Accellion provides enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to information while ensuring enterprise security and compliance. The world’s leading corporations and government agencies select Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT cost. Learn more about Accellion here: Connect with Accellion here:
  • 22. Thank You! For more information visit Confidential 22