Mind the GapNavigating the Security Challenges of BYODPaula Skokowski, Chief Marketing OfficerAccellionOctober 2012
Agenda•   Enabling Remote/Mobile Workforce•   Navigating BYOD Challenges•   Ensuring Data Security & Control•   Recommenda...
Accellion - Snapshot• Headquartered in Palo Alto, CA• 1,600+ Enterprise Customers• 10+ Million Enterprise UsersProvide ent...
The BYOD PhenomenonDevice        Q212 Worldwide                PurchasesSmartphones       108MTablets            25M      ...
The BYOD Challenge                 How to make enterprise                 content accessible on                 mobile dev...
The Dual Persona Mobile User                        I’m a    I’m a                      ConsumerBusiness User             ...
Dual Persona – Which App to Use?                                   7
Navigating the BYOD Challenge• How to enable employees to  access, receive, share and store confidential  information on p...
Navigating the BYOD Challenge           • Support iOS, Android, and Blackberry devices.  Enable   • Support user self-prov...
Enterprise Mobility ManagementMobile       Mobile        MobileDevice       Application   ContentManagement   Management  ...
Private Cloud File SharingPrivate Cloud     Public Cloud File Sharing     File Sharing                                 11
Private Cloud vs Public Cloud  What is your corporate DNA and tolerance for risk?  • No solution is 100% secure …    … yet...
Security  Encryption – Data at Rest and in Motion – Across all devices     Blacklisting/Whitelisting of Helper Mobile Apps...
Enterprise Integrations  Enterprise multi-LDAP, Active Directory and AD Groups     Single Sign-On (SAML, OAuth, Kerberos) ...
Compliance and Reporting Reporting                       Compliance Granularity of Reporting        FIPS Compliance Export...
Mobilizing Enterprise Content                            File Shares  Mobile App  Web Access                              ...
Leverage Existing ECM StoresMobilize existing content • SharePoint, other ECM systems • Windows File Shares, NFS, and othe...
Give Users What They Want                                       Enterprise                                       Content  ...
Give IT What It Needs                                            Enterprise                                            Con...
Tips for Navigating BYOD Challenges •   Support multiple mobile platforms •   Give IT central control •   Extend Security ...
Thanks!For more information:Visit www.accellion.comor call 1 650 485 4300                          21
Upcoming SlideShare
Loading in...5
×

Mind the gap: Navigating the Security Challenges of BYOD

628

Published on

The big question is how to give users what they want – user-friendly, around-the-clock data availability – while maintaining strong IT security and control. It can be a big undertaking if you don’t know what to look for from an enterprise file sharing solution. Here are 10 must-haves to help meet both users’ and IT’s needs...

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
628
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
30
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Mind the gap: Navigating the Security Challenges of BYOD

  1. 1. Mind the GapNavigating the Security Challenges of BYODPaula Skokowski, Chief Marketing OfficerAccellionOctober 2012
  2. 2. Agenda• Enabling Remote/Mobile Workforce• Navigating BYOD Challenges• Ensuring Data Security & Control• Recommendations 2
  3. 3. Accellion - Snapshot• Headquartered in Palo Alto, CA• 1,600+ Enterprise Customers• 10+ Million Enterprise UsersProvide enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to enterprise content while ensuring security and compliance. 3
  4. 4. The BYOD PhenomenonDevice Q212 Worldwide PurchasesSmartphones 108MTablets 25M 4 Source: IDC, 2012
  5. 5. The BYOD Challenge How to make enterprise content accessible on mobile devices while maintaining control and security? 5
  6. 6. The Dual Persona Mobile User I’m a I’m a ConsumerBusiness User 6
  7. 7. Dual Persona – Which App to Use? 7
  8. 8. Navigating the BYOD Challenge• How to enable employees to access, receive, share and store confidential information on personal devices.• How to control employee use of cloud file storage and collaboration solutions. How to Enable, Secure & Manage access to enterprise content. 8
  9. 9. Navigating the BYOD Challenge • Support iOS, Android, and Blackberry devices. Enable • Support user self-provisioning. • Provide access to enterprise content stores. • Provide Approved Apps. • Encryption of data at rest and in transit. Secure • Remote Wipe. • User authentication, SSO, Auto Credentials (LDAP, AD). • Secure cloud data storage. • Configurable User Permissions. Manage • Comprehensive File Tracking and Reporting. • Auditable reports for demonstrating compliance. • Manage user policies and profiles. 9
  10. 10. Enterprise Mobility ManagementMobile Mobile MobileDevice Application ContentManagement Management Management 10
  11. 11. Private Cloud File SharingPrivate Cloud Public Cloud File Sharing File Sharing 11
  12. 12. Private Cloud vs Public Cloud What is your corporate DNA and tolerance for risk? • No solution is 100% secure … … yet Public Clouds inherently introduce more risk CapEx vs OpEx? • CFO preference? Hybrid Cloud a viable option? • Mix and match for scale, geographical distribution, satellite offices? Hosted vs On Premise? • Hosted Private Cloud? 12
  13. 13. Security Encryption – Data at Rest and in Motion – Across all devices Blacklisting/Whitelisting of Helper Mobile Apps Anti-Virus Data Loss Prevention Server Side Viewing Role Based Access Control Secure Mobile Container – Remote Wipe 13
  14. 14. Enterprise Integrations Enterprise multi-LDAP, Active Directory and AD Groups Single Sign-On (SAML, OAuth, Kerberos) Strong Authentication Mobile Device Management, Mobile App Management Office Productivity FTP and SMTP APIs 14
  15. 15. Compliance and Reporting Reporting Compliance Granularity of Reporting FIPS Compliance Export to 3rd Party Reporting PCI Compliance Log formatting for export SOX Compliance SNMP (Monitoring) HIPAA Compliance Integration with GRC 15
  16. 16. Mobilizing Enterprise Content File Shares Mobile App Web Access 16
  17. 17. Leverage Existing ECM StoresMobilize existing content • SharePoint, other ECM systems • Windows File Shares, NFS, and other file serversShare ExternallyShare Transparently, without duplicating filesCentralize access to disparate content silosCentralize auditing and reporting across disparate content stores 17
  18. 18. Give Users What They Want Enterprise Content • Mobile Access SharePoint • Synced Files/Folders • Collaborative Workspaces • File Sharing • Notification • File Commenting • File Version Tracking 18
  19. 19. Give IT What It Needs Enterprise Content • SSL, Encryption • User Authentication SharePoint • LDAP/AD Integration • SAML/SSO • File Tracking & Reporting – Audit Trail • DLP Integration • Archival Integration • Enterprise Content Plug-ins 19
  20. 20. Tips for Navigating BYOD Challenges • Support multiple mobile platforms • Give IT central control • Extend Security to every file and device • Select Private Cloud for maximum data security • Connect to enterprise content management systems • Deploy anti-virus to keep the bad stuff out • Integrate DLP to keep the good stuff in • Block consumer-class services 20
  21. 21. Thanks!For more information:Visit www.accellion.comor call 1 650 485 4300 21
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×