Enable Secure Mobile & Cloud Collaboration
Upcoming SlideShare
Loading in...5
×
 

Enable Secure Mobile & Cloud Collaboration

on

  • 279 views

(ISC)2 Secure Seattle 2013 Presentation: Security Transcends Technology

(ISC)2 Secure Seattle 2013 Presentation: Security Transcends Technology
Rama Kolappan, Mobile Director, Accellion.

Statistics

Views

Total Views
279
Views on SlideShare
279
Embed Views
0

Actions

Likes
0
Downloads
6
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Enable Secure Mobile & Cloud Collaboration Enable Secure Mobile & Cloud Collaboration Presentation Transcript

  • Enable Secure Mobile & Cloud Collaboration(ISC)2 Secure Seattle 2013, Security Transcends TechnologyRama Kolappan, Mobile Director, Accellion.
  • ConfidentialAccellion - Snapshot• Founded 1999• Headquartered in Palo Alto, CA• 1,700+ Enterprise Customers• 11+ Million Enterprise Users• Secure Mobile File Sharing Solutions2
  • Confidential 3Accellion Customers
  • Confidential 4The Problem:Sharing Enterprise Content Securely in the New iPad EraThe New Reality• Proliferation of mobile devices andtablets, led by the iPad.• Difficulties accessing enterprisecontent on mobile devices.• Easy access to free cloud-based apps.• Consumerization of IT creating securitychallenges.
  • Confidential 5Terms of Service: Google Drivehttp://www.google.com/intl/en/policies/terms/"When you upload or otherwise submit content to ourServices, you give Google (and those we work with) a worldwidelicense to use, host, store, reproduce, modify, create derivativeworks (such as those resulting from translations, adaptations orother changes we make so that your content works better withour Services), communicate, publish, publicly perform, publiclydisplay and distribute such content. The rights you grant in thislicense are for the limited purpose of operating, promoting, andimproving our Services, and to develop new ones. This licensecontinues even if you stop using our Services…”
  • Confidential 6A New Population of Mobile Workers
  • Confidential 7Productivity Gains from Mobility
  • Confidential 8Mobile Productivity ChallengesSecurity and DataLeaksEnterprise data leakswhile moving dataacross 3rd party appsusing open-in andsave backIntegratedProductivity SolutionOnly access and viewcontent. Not able tocreate and edit contentsecurely as anintegrated solutionCollaboration andSharingCollaborate and sharenewly created andedited documentssecurely
  • Confidential 9What Does BYOD Look Like?
  • Confidential 10What Does BYOD Feel Like?
  • Confidential 11The BYOD ChallengeHow to makeenterprise contentaccessible onmobile devices whilemaintaining controland security?
  • Confidential 12Enterprise Mobility ManagementMobileDeviceManagementMobileApplicationManagementMobileContentManagement
  • Confidential 13Choosing MDM/MAM PartnerWrapped vs SDK based solutions• Wrapped applications enforce following userpolices:• Cut, Copy, and Paste• Printing• Screen Shot Snapshots• Open-In• SDK based MDM/MAM APIs• Authorization and SSO• Encrypting Data at rest and In-Transit• Interoperability communication between applications• Open-In (Whitelisting and Blacklisting)
  • Confidential 14Avoiding BYOD Disaster• Support iOS, Android, and Blackberry devices.• Support user self-provisioning.• Provide access to enterprise content stores.• Provide approved apps.Enable• Implement encryption of data at rest and in transit.• Support remote wipe.• Integrate user authentication, SSO, Auto credentials(LDAP, AD).• Deploy secure cloud data storage.Secure• Provide configurable user permissions.• Ensure comprehensive file tracking and reporting.• Ensure auditable reports for demonstratingcompliance.• Manage user policies and profiles.Manage
  • 15Cloud Deployment OptionsPrivateOn-PremisePrivateHostedPublicMulti-Tenant• Virtual appliance• Full control• Full security, compliance• Single-tenant• Secure• Cloud agility• Multi-tenant• Cloud agility
  • Confidential 16Security ControlsEnterprise Security• Anti-Virus• Data Loss Prevention• Restricted Admin Access to ContentAuthentication / Authorization• SSO with SAML / OAuth / Kerberos• Multi-LDAP and AD integration• Two-Factor Authentication• Password Policies• RBACEncryption• Encryption – Data at Rest andin Motion• Encryption Strength• Ownership of Encryption Keys• FIPS 140-2 CertificationMobile Security• Secure Mobile Container• Whitelisted Helper Applications• Server Side Viewing• Remote Wipe• Offline PIN
  • Confidential 17Integrating Enterprise InfrastructureMobile Device Management, Mobile Application ManagementEnterprise multi-LDAP, Active Directory and AD GroupsSingle Sign-On (SAML, OAuth, Kerberos)Strong AuthenticationMobile ProductivityFTP and SMTPAPIs and Customizations
  • Confidential 18Secure Mobile Productivity• Create and edit contentsecurely, without the riskof data leaks duringtransit across 3rd partyapps• Private cloud – Create,edit and access contentfrom private cloud withAccellion MobileProductivity Suite• Content encrypted intransit and at rest;content expirationsupported
  • Confidential 19Secure Mobile Workflow• Mobilize existing content• Internal/external sharing• Unified access to all content• No duplication of content• Centralized control
  • Confidential 20Tips for Avoiding BYOD Disaster• Support multiple mobile platforms• Extend security to every file and device• Integrate secure productivity capabilities• Select private cloud for maximum data security• Connect to enterprise content management systems• Deploy anti-virus to keep the malware out• Integrate DLP to keep the data in• Block consumer-class services
  • Accellion provides enterprise-class mobile file sharingsolutions that enable secure anytime, anywhere access toinformation while ensuring enterprise security andcompliance.The world’s leading corporations and government agenciesselect Accellion to protect intellectual property, ensurecompliance, improve business productivity and reduce ITcost.Learn more about Accellion here: www.accellion.comConnect with Accellion here:About Accellion