How To Connect To Your Customers, Partners Securely, Privately and Effectively


Published on

One of the hardest problems technically is to allow external collaborators to work with internal team effectively. Security and privacy are the chief concerns. With the new paradigm shift, it brings big opportunities for us to do this correctly.

Published in: Technology, Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

How To Connect To Your Customers, Partners Securely, Privately and Effectively

  1. 1. HOW To CONNECT TO Your Customers, PARTNERSSecurely, Privately, EFFECTIVELY<br />Andy Harjanto<br /><br />
  2. 2. Agenda<br />2006-201?: Paradigm shift in <br />Technology, Economy, Social Behaviors<br />
  4. 4. The Common Way: Exchanging EMail<br />Gestone, LLC <br />Suppliers<br />IT manager has less concern about exposing internal resource to externals <br />Email, Attachment can <br />easily be forwarded to <br />others <br />Limited CollaborationMany 1-1; useful internalsites, docs ,data for externals are readily<br />not accessible from Email<br />No installation, just<br />know other’s email address<br />is sufficient<br />
  5. 5. Make External As Users in Company<br />Gestone, LLC - Employees<br />Suppliers, Customers, <br />Vendors, Contractors<br />Document, Media<br />Collaboration<br />File Server<br />Web Site<br />…A new server just came online<br />Is it secured???<br />I have to secure<br />every server!!<br />IT Manager<br />
  6. 6. Make External As Users in Company (Cont’d)<br />Collaboration between Internal and External users are fluid <br />External users feel more as part of the team <br />Security is a big concern, there could be too many servers too manage; One or two servers may not be secured for externals<br />While Internal security attack is hard to mitigate,<br />Letting External into a secure environment can be devastated (e.g sending docs to competitors)<br />Answering a simple question like: “What files, sites Melissa has access to?” is really hard<br />
  7. 7. Single Sign-On and Federation<br />Gestone, LLC - Employee<br />Suppliers, Customers, <br />Vendors, Contractors<br />Logon locally<br />and access other company’s <br />resources <br />Normal Access<br />Established Trusts<br />Security Services<br />Security Services<br />File Server<br />Document, Media<br />Servers<br />Web Servers<br />
  8. 8. Single Sign-On and Federation (Cont’d)<br />Good user experience. User only remembers one set of credentials to access many resources in other companies <br />With a new technique called “Claim Based Security”, richer way to express security controls. For example, “Access Allowed for person’s who have VP title” <br />Need to install and maintain new servers (Security Token Services) on both companies. New client software or OS (operating system) may need also be installed <br />Still Resource Based Model, what it means that security audit must go thru each resource. Answering “Who Has What” access is not easy<br />
  9. 9. Paradigm Shift 2006 – 201? <br />Communicating with Your Customers, Partners<br />OLD WAYS <br />NEW WAYS <br />Control All Public Access and Messages<br />Employees start: <br />Public Relation Company<br />Blogs about products, <br />company<br />Lock Access To Externals<br />Engaging with customers on <br /><ul><li> Inbound: Little access to company resource
  10. 10. Outbound: Discuss forums controlled by company</li></ul>Richer media and Interactivity <br />Conversation Media<br /><ul><li>Mostly Text and Documents</li></li></ul><li>Why Today’s Technology Does Not Work?<br />The foundation was built 20+ years ago, <br />focusing primarily on securing a company<br />“Build Me Moat Around My Castle” <br />Designed based on resources first (Files, Site,Server), then build solutions around them<br />Band-Aid ApproachSolution after solution keep piling up based<br />on this foundation to solve today’s differentrequirements<br />
  11. 11. So, What We Should Build?<br />The foundation should focus on how team<br />collaborates<br />User is the primary driver. Activities, status,<br />content creation should be the front and<br />center to others <br />No New Standards. We do just fine with the current standards in this new world<br />.JPG<br />IM<br />SMS<br />.PDF<br />Email<br />HTTP<br />RSS<br />
  12. 12. What Are The Core Requirements For External Collaboration? <br />Use common tools that we use daily (Email, IM, SMS, Browser). <br />The Following Core Resources Are Good Enough. Seriously, No Need For 10K Software License Anymore <br />Capturing <br />Conversations<br />Unstructured Data(Doc, Pic, Videos)<br />Structured Data(Database, List)<br />Event/Time <br />Management<br />User<br />Activities<br />
  13. 13. What Are The Core Requirements For External Collaboration? (Cont’d) <br />IT Manager: Do not compromise security. I MUST be able to lock down the organization security<br />For interaction with customers, allow easy<br />access to and sharing with social <br />media services <br />
  14. 14. THE WAYS TO Collaborate WITHYOUR CUSTOMERS, PARTNERS<br />Addressing The Problems and Requirements<br />THE NEW World<br />EDITION<br />
  15. 15. Let’s Address Security Concerns, First<br />Resources are cleanly,clearlyseparated by groupcollaboration unit<br />Engineering Team Group(Gestone LLC, R&D - Internal)<br />Project X Group(Collaborate with Other Companies)<br />
  16. 16. Finding Who Has What Access Is So Easy<br />For example: <br />Amy as a Member of Project X has <br />Read Access To All Documents<br />Read and Create Access to Lists<br />Read Access To Group Calendars<br />Scoped To this Collaboration Unit<br />Project X Group(Collaborate with Other Companies)<br />Note: Resources may physically <br />resides on different servers; but<br />the service enforces the access<br />
  17. 17. Collaborate Naturally<br />Model Your Digital World From Real World<br />Marketing<br />Team Of Doctors<br />Marketing<br />Team Of Doctors<br />Family<br />School Projects<br />Family<br />School Projects<br />
  18. 18. Collaborate Naturally (Cont’d)<br />Let User Choose How To Communicate<br />Texting, <br />Mobile Email<br />Email,<br />Browser<br />Project X<br />
  19. 19. Socially Sharing and Connecting <br />Collaborate Internally <br /> within the Group<br />Push Information Publicly<br />Your Customers Are Socially Active Online,… <br />Bring The Goods To Their Places<br />
  20. 20. Example OF User Experience <br />
  21. 21. A sample<br />company<br />Business<br />Activities<br />A Person<br />may belong to<br />many groupcollaborationunit<br />
  22. 22. Multiple <br />Channels<br />(Email, IM, Browser)can be used<br />to access this<br />collaboration<br />unit<br />
  23. 23. It’s up to the user to pick the communication channel <br />appropriate for him for a given collaboration unitfor ranges of time scheduled<br />
  24. 24. Structured and Unstructured Data For Group Collaboration<br />
  25. 25. Access<br />can also be<br />controlled<br />with roles<br />
  26. 26. Summary <br />The new paradigm shift is happening, while we’re still using technology built 20 years ago<br />New, simpler and more external facing infrastructure is needed<br />Best way to model in digital world is to replicate in the real world<br />Group is the based of collaboration platforms<br />People attachment to their gadgets ( mobile phone, iPhone, netbook, Blackberry), less interested in heavy full-feature software.<br />Don’t keep asking customers to come to your site, bring your good news where your customers live digitally<br />Finally, KeepIt Simple! Collaboration should be effortless and simple. It has been done and perfected thousands of years ago, thanks to our early ancestors. <br />
  27. 27. Other Related Slide Decks<br />How To Get Your Team Participating and Collaborating More Effectively <br />Got Plain Old Cell Phone? Let’s Do Interesting Stuff <br />Let’s discuss more on: <br />Linked-in Group<br />Getting notifications on new articles:<br />Facebook, Twitter<br />
  28. 28. End OF THE Slide DECK<br />Andy Harjanto<br /><br />Twitter: @harjanto<br />