Enable Secure Mobile & Cloud Collaboration(ISC)2 Secure Seattle 2013, Security Transcends TechnologyRama Kolappan, Mobile ...
ConfidentialAccellion - Snapshot• Founded 1999• Headquartered in Palo Alto, CA• 1,700+ Enterprise Customers• 11+ Million E...
Confidential 3Accellion Customers
Confidential 4The Problem:Sharing Enterprise Content Securely in the New iPad EraThe New Reality• Proliferation of mobile ...
Confidential 5Terms of Service: Google Drivehttp://www.google.com/intl/en/policies/terms/"When you upload or otherwise sub...
Confidential 6A New Population of Mobile Workers
Confidential 7Productivity Gains from Mobility
Confidential 8Mobile Productivity ChallengesSecurity and DataLeaksEnterprise data leakswhile moving dataacross 3rd party a...
Confidential 9What Does BYOD Look Like?
Confidential 10What Does BYOD Feel Like?
Confidential 11The BYOD ChallengeHow to makeenterprise contentaccessible onmobile devices whilemaintaining controland secu...
Confidential 12Enterprise Mobility ManagementMobileDeviceManagementMobileApplicationManagementMobileContentManagement
Confidential 13Choosing MDM/MAM PartnerWrapped vs SDK based solutions• Wrapped applications enforce following userpolices:...
Confidential 14Avoiding BYOD Disaster• Support iOS, Android, and Blackberry devices.• Support user self-provisioning.• Pro...
15Cloud Deployment OptionsPrivateOn-PremisePrivateHostedPublicMulti-Tenant• Virtual appliance• Full control• Full security...
Confidential 16Security ControlsEnterprise Security• Anti-Virus• Data Loss Prevention• Restricted Admin Access to ContentA...
Confidential 17Integrating Enterprise InfrastructureMobile Device Management, Mobile Application ManagementEnterprise mult...
Confidential 18Secure Mobile Productivity• Create and edit contentsecurely, without the riskof data leaks duringtransit ac...
Confidential 19Secure Mobile Workflow• Mobilize existing content• Internal/external sharing• Unified access to all content...
Confidential 20Tips for Avoiding BYOD Disaster• Support multiple mobile platforms• Extend security to every file and devic...
Accellion provides enterprise-class mobile file sharingsolutions that enable secure anytime, anywhere access toinformation...
Upcoming SlideShare
Loading in …5
×

(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration

509 views
444 views

Published on

Rama Kolappan, Mobile Director with Accellion, recently addressed the topic of Enabling Secure and Mobile Cloud Collaboration at Secure Seattle 2013 . The 3 key messages to enterprises:
1) You are not alone; mobile productivity challenges face all types of organizations.
2) The BYOD trend can do more good than harm.
3) Sharing enterprise content securely in this era of the iPad is realistic and easier than you think.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
509
On SlideShare
0
From Embeds
0
Number of Embeds
31
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration

  1. 1. Enable Secure Mobile & Cloud Collaboration(ISC)2 Secure Seattle 2013, Security Transcends TechnologyRama Kolappan, Mobile Director, Accellion.
  2. 2. ConfidentialAccellion - Snapshot• Founded 1999• Headquartered in Palo Alto, CA• 1,700+ Enterprise Customers• 11+ Million Enterprise Users• Secure Mobile File Sharing Solutions2
  3. 3. Confidential 3Accellion Customers
  4. 4. Confidential 4The Problem:Sharing Enterprise Content Securely in the New iPad EraThe New Reality• Proliferation of mobile devices andtablets, led by the iPad.• Difficulties accessing enterprisecontent on mobile devices.• Easy access to free cloud-based apps.• Consumerization of IT creating securitychallenges.
  5. 5. Confidential 5Terms of Service: Google Drivehttp://www.google.com/intl/en/policies/terms/"When you upload or otherwise submit content to our Services,you give Google (and those we work with) a worldwide license touse, host, store, reproduce, modify, create derivative works (suchas those resulting from translations, adaptations or otherchanges we make so that your content works better with ourServices), communicate, publish, publicly perform, publiclydisplay and distribute such content. The rights you grant in thislicense are for the limited purpose of operating, promoting, andimproving our Services, and to develop new ones. This licensecontinues even if you stop using our Services…”
  6. 6. Confidential 6A New Population of Mobile Workers
  7. 7. Confidential 7Productivity Gains from Mobility
  8. 8. Confidential 8Mobile Productivity ChallengesSecurity and DataLeaksEnterprise data leakswhile moving dataacross 3rd party appsusing open-in andsave backIntegratedProductivity SolutionOnly access and viewcontent. Not able tocreate and edit contentsecurely as anintegrated solutionCollaboration andSharingCollaborate and sharenewly created andedited documentssecurely
  9. 9. Confidential 9What Does BYOD Look Like?
  10. 10. Confidential 10What Does BYOD Feel Like?
  11. 11. Confidential 11The BYOD ChallengeHow to makeenterprise contentaccessible onmobile devices whilemaintaining controland security?
  12. 12. Confidential 12Enterprise Mobility ManagementMobileDeviceManagementMobileApplicationManagementMobileContentManagement
  13. 13. Confidential 13Choosing MDM/MAM PartnerWrapped vs SDK based solutions• Wrapped applications enforce following userpolices:• Cut, Copy, and Paste• Printing• Screen Shot Snapshots• Open-In• SDK based MDM/MAM APIs• Authorization and SSO• Encrypting Data at rest and In-Transit• Interoperability communication between applications• Open-In (Whitelisting and Blacklisting)
  14. 14. Confidential 14Avoiding BYOD Disaster• Support iOS, Android, and Blackberry devices.• Support user self-provisioning.• Provide access to enterprise content stores.• Provide approved apps.Enable• Implement encryption of data at rest and in transit.• Support remote wipe.• Integrate user authentication, SSO, Auto credentials(LDAP, AD).• Deploy secure cloud data storage.Secure• Provide configurable user permissions.• Ensure comprehensive file tracking and reporting.• Ensure auditable reports for demonstratingcompliance.• Manage user policies and profiles.Manage
  15. 15. 15Cloud Deployment OptionsPrivateOn-PremisePrivateHostedPublicMulti-Tenant• Virtual appliance• Full control• Full security, compliance• Single-tenant• Secure• Cloud agility• Multi-tenant• Cloud agility
  16. 16. Confidential 16Security ControlsEnterprise Security• Anti-Virus• Data Loss Prevention• Restricted Admin Access to ContentAuthentication / Authorization• SSO with SAML / OAuth / Kerberos• Multi-LDAP and AD integration• Two-Factor Authentication• Password Policies• RBACEncryption• Encryption – Data at Rest andin Motion• Encryption Strength• Ownership of Encryption Keys• FIPS 140-2 CertificationMobile Security• Secure Mobile Container• Whitelisted Helper Applications• Server Side Viewing• Remote Wipe• Offline PIN
  17. 17. Confidential 17Integrating Enterprise InfrastructureMobile Device Management, Mobile Application ManagementEnterprise multi-LDAP, Active Directory and AD GroupsSingle Sign-On (SAML, OAuth, Kerberos)Strong AuthenticationMobile ProductivityFTP and SMTPAPIs and Customizations
  18. 18. Confidential 18Secure Mobile Productivity• Create and edit contentsecurely, without the riskof data leaks duringtransit across 3rd partyapps• Private cloud – Create,edit and access contentfrom private cloud withAccellion MobileProductivity Suite• Content encrypted intransit and at rest;content expirationsupported
  19. 19. Confidential 19Secure Mobile Workflow• Mobilize existing content• Internal/external sharing• Unified access to all content• No duplication of content• Centralized control
  20. 20. Confidential 20Tips for Avoiding BYOD Disaster• Support multiple mobile platforms• Extend security to every file and device• Integrate secure productivity capabilities• Select private cloud for maximum data security• Connect to enterprise content management systems• Deploy anti-virus to keep the malware out• Integrate DLP to keep the data in• Block consumer-class services
  21. 21. Accellion provides enterprise-class mobile file sharingsolutions that enable secure anytime, anywhere access toinformation while ensuring enterprise security andcompliance.The world’s leading corporations and government agenciesselect Accellion to protect intellectual property, ensurecompliance, improve business productivity and reduce ITcost.Learn more about Accellion here: www.accellion.comConnect with Accellion here:About Accellion

×