• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Mind the gap: Navigating the Security Challenges of BYOD
 

Mind the gap: Navigating the Security Challenges of BYOD

on

  • 873 views

The big question is how to give users what they want – user-friendly, around-the-clock data availability – while maintaining strong IT security and control. It can be a big undertaking if you ...

The big question is how to give users what they want – user-friendly, around-the-clock data availability – while maintaining strong IT security and control. It can be a big undertaking if you don’t know what to look for from an enterprise file sharing solution. Here are 10 must-haves to help meet both users’ and IT’s needs...

Statistics

Views

Total Views
873
Views on SlideShare
872
Embed Views
1

Actions

Likes
0
Downloads
29
Comments
0

1 Embed 1

http://www.accellion.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Mind the gap: Navigating the Security Challenges of BYOD Mind the gap: Navigating the Security Challenges of BYOD Presentation Transcript

    • Mind the GapNavigating the Security Challenges of BYODPaula Skokowski, Chief Marketing OfficerAccellionOctober 2012
    • Agenda• Enabling Remote/Mobile Workforce• Navigating BYOD Challenges• Ensuring Data Security & Control• Recommendations 2
    • Accellion - Snapshot• Headquartered in Palo Alto, CA• 1,600+ Enterprise Customers• 10+ Million Enterprise UsersProvide enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to enterprise content while ensuring security and compliance. 3
    • The BYOD PhenomenonDevice Q212 Worldwide PurchasesSmartphones 108MTablets 25M 4 Source: IDC, 2012
    • The BYOD Challenge How to make enterprise content accessible on mobile devices while maintaining control and security? 5
    • The Dual Persona Mobile User I’m a I’m a ConsumerBusiness User 6
    • Dual Persona – Which App to Use? 7
    • Navigating the BYOD Challenge• How to enable employees to access, receive, share and store confidential information on personal devices.• How to control employee use of cloud file storage and collaboration solutions. How to Enable, Secure & Manage access to enterprise content. 8
    • Navigating the BYOD Challenge • Support iOS, Android, and Blackberry devices. Enable • Support user self-provisioning. • Provide access to enterprise content stores. • Provide Approved Apps. • Encryption of data at rest and in transit. Secure • Remote Wipe. • User authentication, SSO, Auto Credentials (LDAP, AD). • Secure cloud data storage. • Configurable User Permissions. Manage • Comprehensive File Tracking and Reporting. • Auditable reports for demonstrating compliance. • Manage user policies and profiles. 9
    • Enterprise Mobility ManagementMobile Mobile MobileDevice Application ContentManagement Management Management 10
    • Private Cloud File SharingPrivate Cloud Public Cloud File Sharing File Sharing 11
    • Private Cloud vs Public Cloud What is your corporate DNA and tolerance for risk? • No solution is 100% secure … … yet Public Clouds inherently introduce more risk CapEx vs OpEx? • CFO preference? Hybrid Cloud a viable option? • Mix and match for scale, geographical distribution, satellite offices? Hosted vs On Premise? • Hosted Private Cloud? 12
    • Security Encryption – Data at Rest and in Motion – Across all devices Blacklisting/Whitelisting of Helper Mobile Apps Anti-Virus Data Loss Prevention Server Side Viewing Role Based Access Control Secure Mobile Container – Remote Wipe 13
    • Enterprise Integrations Enterprise multi-LDAP, Active Directory and AD Groups Single Sign-On (SAML, OAuth, Kerberos) Strong Authentication Mobile Device Management, Mobile App Management Office Productivity FTP and SMTP APIs 14
    • Compliance and Reporting Reporting Compliance Granularity of Reporting FIPS Compliance Export to 3rd Party Reporting PCI Compliance Log formatting for export SOX Compliance SNMP (Monitoring) HIPAA Compliance Integration with GRC 15
    • Mobilizing Enterprise Content File Shares Mobile App Web Access 16
    • Leverage Existing ECM StoresMobilize existing content • SharePoint, other ECM systems • Windows File Shares, NFS, and other file serversShare ExternallyShare Transparently, without duplicating filesCentralize access to disparate content silosCentralize auditing and reporting across disparate content stores 17
    • Give Users What They Want Enterprise Content • Mobile Access SharePoint • Synced Files/Folders • Collaborative Workspaces • File Sharing • Notification • File Commenting • File Version Tracking 18
    • Give IT What It Needs Enterprise Content • SSL, Encryption • User Authentication SharePoint • LDAP/AD Integration • SAML/SSO • File Tracking & Reporting – Audit Trail • DLP Integration • Archival Integration • Enterprise Content Plug-ins 19
    • Tips for Navigating BYOD Challenges • Support multiple mobile platforms • Give IT central control • Extend Security to every file and device • Select Private Cloud for maximum data security • Connect to enterprise content management systems • Deploy anti-virus to keep the bad stuff out • Integrate DLP to keep the good stuff in • Block consumer-class services 20
    • Thanks!For more information:Visit www.accellion.comor call 1 650 485 4300 21