SlideShare a Scribd company logo
1 of 28
Download to read offline
Biscom Confidential
Biscom Verosync
Enterprise File Synchronization and Sharing
Presented by Bill Ho, president, Biscom
Biscom Confidential
Questions?
Use the chat feature to the
right of your screen
Q&A
Biscom Confidential
Biscom, Inc.
• Enterprise software company focused on secure document
delivery
• Mission: To provide the most secure, robust, and scalable
systems for mission critical document delivery
• Products
– 1986:First enterprise fax server introduced to world
– 2005:Most secure and scalable file transfer (SFT/MFT) solution
– 2014:IT-friendly enterprise file synchronizationand sharing (EFSS)
Biscom Confidential
What File Sharing and Document Delivery
Issues are Companies Facing
“Our users want to share corporate files and
documents easily but IT needs to maintain control
and manage users, devices, and access.”
Biscom Confidential
Poll #1
Biscom Confidential
Why is Enterprise File Synchronization and
Sharing Important?
• People expect to have access to their
data anytime and anywhere
• More mobile and remote work force
• Increased sharing and collaborations
• Compliance requirements
Biscom Confidential
Introducing Biscom Verosync
A secure file
synchronizationsystem
that IT can control and
use to reporton file
sharing across the
enterprise
1. A lightweight tool for
end users to have
immediate access to
their files from any
computer or device
2. A way to collaborate
instantly with others
For End Users For Administrators
Biscom Confidential
Benefits of Verosync
• Easy
• Seamless
• Fast
• Access from any where
• Access from any device
• Secure
• Secure
• Manageable
• Tracked
• Brandable
• Scalable
• Data is local
For End Users For Administrators
Biscom Confidential
What About SaaS?
“I won't put anything very crucial - I won't put
any of my sources' information in my Dropbox
account, for example, or on Google
Drive…my Social Security number or things
that, you know, if a cybercriminal got a hold of
them or the NSA got a hold of them, I would
be in deep trouble, I don't put that stuff in the
cloud.”
Nicole Perlroth (May 2014)
NY Times Technology Reporter
Biscom Confidential
What About SaaS – Security Concerns?
• Security practices, processes, remedies
• Control and ownership over the systems that contain
sensitive corporate data
• Admin access to files
• Backup and retention policies
• Commingling data with other customers
Biscom Confidential
Poll #2
Biscom Confidential
Verosync Clients
Biscom Confidential
Integrated with Windows Explorer
Server name
Authentication type, e.g. AD or password
Usernameand password
Sync folder
Biscom Confidential
Integrated with Windows Explorer
Synchronized
root folder
• Seamless integration with file system
• Supports local and network file systems
• Unlimited storage
• Private and Shared folders
Biscom Confidential
Integrated with Mac Finder
Synchronized
root folder
• Seamless integration with file system
• Supports local and network file systems
• Unlimited storage
• Private and Shared folders
Biscom Confidential
iOS and Android Mobile Apps
• iPhone, iPad, Android devices supported
• Same view of your files on your desktop
• Online and offline access to files
• Share folders and files easily
• Files encrypted at rest
• Remotely wipe files
Biscom Confidential
iOS and Android Mobile Apps
• iPhone, iPad, Android devices supported
• Same view of your files on your desktop
• Online and offline access to files
• Share folders and files easily
• Files encrypted at rest
• Remotely wipe files
Biscom Confidential
Web File Access
Biscom Confidential
Integrated with Windows Explorer
Biscom Confidential
Shared Links
Biscom Confidential
Web Administration
Biscom Confidential
Web Administration – Space Used
Biscom Confidential
Web Administration
Biscom Confidential
System Config Change Report
Biscom Confidential
Highlights of Biscom Verosync
• Security
– End-to-end encryption
– FIPS 140-2 certified
– Active Directory for user authentication,management
– Track and report on activity and transactions
• Architecture
– Built for corporate needs, not consumer uses
– Three tier: web, application,database/filesystem
– Works with physical,VM, and cloud servers
• Features
– Intuitiveuser interface
– Runs on Windows, Mac, iPhone, iPad, Androidmobile devices
– Core, Advanced,and Enterprise editions
Biscom Confidential
Summary
• Access and share anything, anywhere, on any
device – easily and securely
• Biscom Verosync is the most secure and
manageable synchronization and collaboration
utility in the world
• Explicitly designed to run inside customer IT
infrastructure (local, cloud, virtual) to meet
security needs of IT
Biscom Confidential
Questions
Biscom Confidential
Secure Document
Delivery Blog
www.biscom.com/
company/blog/
On the Web
Biscom.com
Twitter
@biscom
Phone
(800) 477-2472
 Whitepapers
 Case Studies
 and more
Thank you for attending our webinar
We would love to hear from you. Please contact us at:
sales@biscom.comor 1-800-477-2472.

More Related Content

What's hot

Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Igor Zboran
 
Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)BeyondTrust
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTCIgor Zboran
 
Kaseya BYOD Suite
Kaseya BYOD SuiteKaseya BYOD Suite
Kaseya BYOD SuiteKaseya
 
Nero Technology Consulting Services
Nero Technology Consulting ServicesNero Technology Consulting Services
Nero Technology Consulting ServicesAnthony Oren
 
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy ProtectionIdentity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy ProtectionIgor Zboran
 
Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009Alexis Brown
 
Cloud Computing & Privacy Protection
Cloud Computing & Privacy ProtectionCloud Computing & Privacy Protection
Cloud Computing & Privacy ProtectionIgor Zboran
 
My Last Project Was About...
My Last Project Was About...My Last Project Was About...
My Last Project Was About...Patrick Ostertag
 
What are the features of DigiLocker?
What are the features of DigiLocker?What are the features of DigiLocker?
What are the features of DigiLocker?Ravindra Dastikop
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Miguel Isidoro
 
Scug 1803 modern device management
Scug 1803   modern device managementScug 1803   modern device management
Scug 1803 modern device managementPer Larsen
 
Работење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементираРаботење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементираMetamorphosis
 
Ewug 1802 secure your windows device in a modern way
Ewug 1802   secure your windows device in a modern wayEwug 1802   secure your windows device in a modern way
Ewug 1802 secure your windows device in a modern wayPer Larsen
 
GWAVACon - The future of content archiving– E-Mail, Social, Mobil …
GWAVACon - The future of content archiving– E-Mail, Social, Mobil …GWAVACon - The future of content archiving– E-Mail, Social, Mobil …
GWAVACon - The future of content archiving– E-Mail, Social, Mobil …GWAVA
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfMassimo Bertaccini
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingDavid Strom
 
Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Vikash Lalsing (CITP)
 

What's hot (20)

Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)
 
Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTC
 
Kaseya BYOD Suite
Kaseya BYOD SuiteKaseya BYOD Suite
Kaseya BYOD Suite
 
Nero Technology Consulting Services
Nero Technology Consulting ServicesNero Technology Consulting Services
Nero Technology Consulting Services
 
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy ProtectionIdentity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
 
Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009
 
Cloud Computing & Privacy Protection
Cloud Computing & Privacy ProtectionCloud Computing & Privacy Protection
Cloud Computing & Privacy Protection
 
PROOM
PROOMPROOM
PROOM
 
My Last Project Was About...
My Last Project Was About...My Last Project Was About...
My Last Project Was About...
 
What are the features of DigiLocker?
What are the features of DigiLocker?What are the features of DigiLocker?
What are the features of DigiLocker?
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365
 
Scug 1803 modern device management
Scug 1803   modern device managementScug 1803   modern device management
Scug 1803 modern device management
 
Работење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементираРаботење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементира
 
Ewug 1802 secure your windows device in a modern way
Ewug 1802   secure your windows device in a modern wayEwug 1802   secure your windows device in a modern way
Ewug 1802 secure your windows device in a modern way
 
GWAVACon - The future of content archiving– E-Mail, Social, Mobil …
GWAVACon - The future of content archiving– E-Mail, Social, Mobil …GWAVACon - The future of content archiving– E-Mail, Social, Mobil …
GWAVACon - The future of content archiving– E-Mail, Social, Mobil …
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdf
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
 
Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]
 

Similar to Enterprise File Synchronization and Sharing - Biscom Verosync

Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesPT Datacomm Diangraha
 
Secure Document Collaboration with Alfresco
Secure Document Collaboration with AlfrescoSecure Document Collaboration with Alfresco
Secure Document Collaboration with AlfrescoZia Consulting
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
MFILE_Presentation-1
MFILE_Presentation-1MFILE_Presentation-1
MFILE_Presentation-1Ragesh kv
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)PT Datacomm Diangraha
 
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefThe Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefHybrid Cloud
 
Introducing OfficeBox
Introducing OfficeBoxIntroducing OfficeBox
Introducing OfficeBoxDirectReader
 
Webinar: Do Hyperconverged Systems Need File Services?
Webinar: Do Hyperconverged Systems Need File Services?Webinar: Do Hyperconverged Systems Need File Services?
Webinar: Do Hyperconverged Systems Need File Services?Storage Switzerland
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptxkovec2684
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud eventBLAUD
 
IBM Connections Cloud & IBM Docs: Working securely and quickly with content
IBM Connections Cloud & IBM Docs: Working securely and quickly with contentIBM Connections Cloud & IBM Docs: Working securely and quickly with content
IBM Connections Cloud & IBM Docs: Working securely and quickly with contentLuis Benitez
 
AWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS securityAWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS securityAmazon Web Services
 
Enterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataEnterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataSoftControl.net Ltd.
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...ILYA ROITMAN
 
Micro Focus Filr - #MFSummit2017
Micro Focus Filr - #MFSummit2017Micro Focus Filr - #MFSummit2017
Micro Focus Filr - #MFSummit2017Micro Focus
 
IBM Managed File Transfer Portfolio - IBMImpact 2014
IBM Managed File Transfer Portfolio - IBMImpact 2014IBM Managed File Transfer Portfolio - IBMImpact 2014
IBM Managed File Transfer Portfolio - IBMImpact 2014Leif Davidsen
 
Infoaxon extended enterprise
Infoaxon extended enterpriseInfoaxon extended enterprise
Infoaxon extended enterpriseNavnit Saurabh
 

Similar to Enterprise File Synchronization and Sharing - Biscom Verosync (20)

Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
Secure Document Collaboration with Alfresco
Secure Document Collaboration with AlfrescoSecure Document Collaboration with Alfresco
Secure Document Collaboration with Alfresco
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
MFILE_Presentation-1
MFILE_Presentation-1MFILE_Presentation-1
MFILE_Presentation-1
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)
 
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefThe Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
 
Introducing OfficeBox
Introducing OfficeBoxIntroducing OfficeBox
Introducing OfficeBox
 
Why ComConnect
Why ComConnectWhy ComConnect
Why ComConnect
 
Webinar: Do Hyperconverged Systems Need File Services?
Webinar: Do Hyperconverged Systems Need File Services?Webinar: Do Hyperconverged Systems Need File Services?
Webinar: Do Hyperconverged Systems Need File Services?
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
Enterprise File Management Systems
Enterprise File Management SystemsEnterprise File Management Systems
Enterprise File Management Systems
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud event
 
IBM Connections Cloud & IBM Docs: Working securely and quickly with content
IBM Connections Cloud & IBM Docs: Working securely and quickly with contentIBM Connections Cloud & IBM Docs: Working securely and quickly with content
IBM Connections Cloud & IBM Docs: Working securely and quickly with content
 
DMS component for MAXIMO
DMS component for MAXIMODMS component for MAXIMO
DMS component for MAXIMO
 
AWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS securityAWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS security
 
Enterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataEnterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing data
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
 
Micro Focus Filr - #MFSummit2017
Micro Focus Filr - #MFSummit2017Micro Focus Filr - #MFSummit2017
Micro Focus Filr - #MFSummit2017
 
IBM Managed File Transfer Portfolio - IBMImpact 2014
IBM Managed File Transfer Portfolio - IBMImpact 2014IBM Managed File Transfer Portfolio - IBMImpact 2014
IBM Managed File Transfer Portfolio - IBMImpact 2014
 
Infoaxon extended enterprise
Infoaxon extended enterpriseInfoaxon extended enterprise
Infoaxon extended enterprise
 

Recently uploaded

Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 

Recently uploaded (20)

Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 

Enterprise File Synchronization and Sharing - Biscom Verosync

  • 1. Biscom Confidential Biscom Verosync Enterprise File Synchronization and Sharing Presented by Bill Ho, president, Biscom
  • 2. Biscom Confidential Questions? Use the chat feature to the right of your screen Q&A
  • 3. Biscom Confidential Biscom, Inc. • Enterprise software company focused on secure document delivery • Mission: To provide the most secure, robust, and scalable systems for mission critical document delivery • Products – 1986:First enterprise fax server introduced to world – 2005:Most secure and scalable file transfer (SFT/MFT) solution – 2014:IT-friendly enterprise file synchronizationand sharing (EFSS)
  • 4. Biscom Confidential What File Sharing and Document Delivery Issues are Companies Facing “Our users want to share corporate files and documents easily but IT needs to maintain control and manage users, devices, and access.”
  • 6. Biscom Confidential Why is Enterprise File Synchronization and Sharing Important? • People expect to have access to their data anytime and anywhere • More mobile and remote work force • Increased sharing and collaborations • Compliance requirements
  • 7. Biscom Confidential Introducing Biscom Verosync A secure file synchronizationsystem that IT can control and use to reporton file sharing across the enterprise 1. A lightweight tool for end users to have immediate access to their files from any computer or device 2. A way to collaborate instantly with others For End Users For Administrators
  • 8. Biscom Confidential Benefits of Verosync • Easy • Seamless • Fast • Access from any where • Access from any device • Secure • Secure • Manageable • Tracked • Brandable • Scalable • Data is local For End Users For Administrators
  • 9. Biscom Confidential What About SaaS? “I won't put anything very crucial - I won't put any of my sources' information in my Dropbox account, for example, or on Google Drive…my Social Security number or things that, you know, if a cybercriminal got a hold of them or the NSA got a hold of them, I would be in deep trouble, I don't put that stuff in the cloud.” Nicole Perlroth (May 2014) NY Times Technology Reporter
  • 10. Biscom Confidential What About SaaS – Security Concerns? • Security practices, processes, remedies • Control and ownership over the systems that contain sensitive corporate data • Admin access to files • Backup and retention policies • Commingling data with other customers
  • 13. Biscom Confidential Integrated with Windows Explorer Server name Authentication type, e.g. AD or password Usernameand password Sync folder
  • 14. Biscom Confidential Integrated with Windows Explorer Synchronized root folder • Seamless integration with file system • Supports local and network file systems • Unlimited storage • Private and Shared folders
  • 15. Biscom Confidential Integrated with Mac Finder Synchronized root folder • Seamless integration with file system • Supports local and network file systems • Unlimited storage • Private and Shared folders
  • 16. Biscom Confidential iOS and Android Mobile Apps • iPhone, iPad, Android devices supported • Same view of your files on your desktop • Online and offline access to files • Share folders and files easily • Files encrypted at rest • Remotely wipe files
  • 17. Biscom Confidential iOS and Android Mobile Apps • iPhone, iPad, Android devices supported • Same view of your files on your desktop • Online and offline access to files • Share folders and files easily • Files encrypted at rest • Remotely wipe files
  • 25. Biscom Confidential Highlights of Biscom Verosync • Security – End-to-end encryption – FIPS 140-2 certified – Active Directory for user authentication,management – Track and report on activity and transactions • Architecture – Built for corporate needs, not consumer uses – Three tier: web, application,database/filesystem – Works with physical,VM, and cloud servers • Features – Intuitiveuser interface – Runs on Windows, Mac, iPhone, iPad, Androidmobile devices – Core, Advanced,and Enterprise editions
  • 26. Biscom Confidential Summary • Access and share anything, anywhere, on any device – easily and securely • Biscom Verosync is the most secure and manageable synchronization and collaboration utility in the world • Explicitly designed to run inside customer IT infrastructure (local, cloud, virtual) to meet security needs of IT
  • 28. Biscom Confidential Secure Document Delivery Blog www.biscom.com/ company/blog/ On the Web Biscom.com Twitter @biscom Phone (800) 477-2472  Whitepapers  Case Studies  and more Thank you for attending our webinar We would love to hear from you. Please contact us at: sales@biscom.comor 1-800-477-2472.

Editor's Notes

  1. Before we begin, just a few housekeeping items. Any questions that you have as we go through the webinar, please use the chat feature to the right of your GoTo Webinar screen to write down and submit your question. We’ll do our best to get to all questions before we close. Also, anytime you have any technical troubles—you can’t hear me, or something similar—please use that chat feature as well, to alert our moderator team. Now, on to today’s webinar….
  2. Biscom is focused on enterprise customers who need the most reliable and advanced document delivery solutions to support their business. We design and build solutions that meet the most extreme operating environments. Our 28 year history supporting some of the largest companies in the world is a testament to the rock solid craftsmanship and unparalleled support we give to our users. We’re excited to introduce our latest solution that meets the file sync and share needs while providing the level of management and control that IT demands.
  3. From what we’ve heard from our customers, the main concern is around manageability – “Shadow IT” is problematic because it’s not being vetted and can lead to companies going out of compliance. People want Dropbox but with enterprise controls built in.
  4. There are a lot of reasons that sync and share is so hot right now. I think one of the main drivers is around the expectation that you should have access to all your files wherever you are. We’ve gotten so used to having our email accessible anytime through our smart phones, files are the next logical step. As we become a more mobile work force, and adopting more devices to get your work done, it becomes even more compelling to be able to view and share your files with others easily. But synchronizing files and sharing them have to be done securely – so that’s a critical piece of the EFSS market now.
  5. If you break it down into the two groups – end users and administrators – we find that end users just want something that is easy and works intuitively. They want to synchronize all of their files but also share them with people both within their organizations as well as the outside world. Administrators want to provide it but they have their own requirements around security and control. So we really looked at how we could provide the visibility into file sharing that they could manage and report on.
  6. For end users, it’s seamless – Verosync is directly integrated with the file system so they’re not really doing anything different – by simply specifying which folders you want to synchronize, you provide instant access to those files without having to think about it – instead of emailing yourself a file to work on at a different location, you simply go to the synchronized folder, open it up and work on it immediately. No need to shuttle files around. For admins, we focus on the security angle quite a bit as well as total visibility – so you can see exactly what’s going on. Verosync is an on-prem solution, so all your data stays inside your network. We know many companies have restrictions around storing files in third party data centers, so we give you the ability to maintain your files locally.
  7. It is true that the larger SaaS players have to deal with being hacked and attacked – they’re big targets out there. You have to be careful about what you store in the cloud. There have been some high profile data breaches at most of the large SaaS vendors – just Google it and you’ll find plenty of news about it.
  8. Using SaaS isn’t all bad. We provide a fax service that is cloud-based, and we also have a hosted secure mail solution. But you have to think about what types of files you’re putting out into a third party location. And you have to do your due diligence around these – do you know who can access your files? Do you know what their backup strategy is? What happens when you delete your files – are they truly deleted or are they still living on a backup tape somewhere? What about your confidential data being commingled with someone else’s data? Usually, files are saved in a big pool of storage and access is controlled by business logic – what happens if that logic is faulty? There are documented cases of people accidentally viewing other people’s files.
  9. So, the last 10 minutes or so I spent covering EFSS and SaaS, and Biscom’s answer to the sync and share problem are pretty obvious, or at least well known. I think people probably want to see what it looks like. I think one of the things that made Dropbox so successful in the consumer market is the simplicity and ease of use. We strived to maintain that simple and intuitive UI while also providing the tools that IT needs.
  10. Setting up the sync client is easy – this can be installed manually or it can be pushed out through group policy. This is a lightweight app that sits in the system tray. When files are being transferred back and forth, it also pops up notifications in real time and shows you the latest files that have been synchronized.
  11. For end users on Windows, once Verosync is set up, there really isn’t an interface – you’re simply using your files as you always would. Any file that’s stored under your synchronized folder is automatically synchronized with all your other computers and devices. You can sync a local folder on your PC or a network drive as well – it really doesn’t matter where those files live.
  12. If you’re on a Mac, it’s the same – no outwardly visible UI – you access and use your files as you normally would.
  13. For mobile users – you can see all your files on your phone or tablet. You can view files, rename them, delete them, or share them – right from the app. Files are encrypted while on the mobile device as well.
  14. You can also see your synchronized folders on any web browser – no client needed, other than a browser. We also support HTML5 natively, so you have the ability to drag and drop files directly into the browser – it’s pretty much as easy as the desktop file system.
  15. Sharing a file or folder is simple – open the menu next to each folder or file, and enter the email addresses of the people you want to share with. You can make this a public link or you can require authentication. It can be read only or you can let people upload their own files.
  16. Because you might be sharing multiple folders with different people, your Shared Links is the one place to go to see what you’ve put out there. You can also remove the share, see the message you sent, and resend the notification email from this page.
  17. Administration happens through the web – you can manage the application, users, run reports, and customize the application.
  18. Administration happens through the web – you can manage the application, users, run reports, and customize the application.
  19. System activity report shows all transactions, but this can be filtered – here I’m specifying a date range as well as a search string. The search string is highlighted to make it easier to find.
  20. This report can be a huge help to understand changes made to the application – you can see who made the change as well as what the previous value was and what the new value is.
  21. Just to wrap up – I wanted to point out three main aspects of Verosync, and I think it’s also useful to think of any EFSS solution with these three things in mind. Security is probably what most people are concerned about – sure it’s great to provide access to your files, but your corporate files can contain sensitive data, intellectual property, confidential client information, financial data, and lots of other files you’d rather not be the hands of the public. We built Verosync with security as our most important priority. This sets us apart from others in this space. The architecture is also important – not only is it important for security, but you want to make sure it’s flexible enough to deploy in any environment. Verosync was designed as an enterprise application, so it’s able to scale as your needs grow. Finally, it’s crucial to keep it simple – that’s my theme today – easy to use means it will be adopted and used – Verosync is a viable alternative to the unsanctioned applications that people may try to install in your network.
  22. Thank you for your time today – I hope I’ve been able to educate you a bit on the EFSS market and a solution that we believe is the right one for companies that care about their data. We’re happy to work with you one on one, let your try the application in your own environment, and see if it fits your needs. I’ll be taking questions for the next few minutes as well, so hopefully you’ve entered them in the window to the right. If not, you still have time – if I don’t get to all of them today, we can set up time to follow up with you later.
  23. Now we move on to – Q&A. We have lots of questions coming in. Keep sending more, if we don’t get a chance to answer here, we will contact you after the webinar with answers. Ok, first question….