The document outlines 3 principles for simple, secure sharing of information in today's mobile work environment: 1) Content security solutions must be easy to use and integrated with preferred sharing platforms without extra burden on IT. 2) Solutions must support secure sharing across multiple device types to accommodate BYOD trends. 3) Solutions must address sharing of multiple file types like documents, videos, images to match real work sharing needs. The document advocates for solutions like Content Raven that provide simple, one-click encryption across file types with analytics and API integration to enable secure sharing on mobile devices and cloud.
2. We do business in a mobile, cloud-based, connected
environment – and it’s not slowing down.
2
3. We do business in a mobile, cloud-based, connected
environment – and it’s not
slowing down.
The projected world wide shipments of smartphones
and tablets in 2014 is expected
to reach 2.2 billion. (Gartner)
3
4. Not only are we
buying more
smartphones and
tablets – we’re using
them for work.
4
5. Not only are we
buying more
smartphones and
tablets – we’re using
them for work.
81% of Americans use their
personal mobile devices for work.
(Gartner)
5
6. Not only are we
buying more
smartphones and
tablets – we’re using
them for work.
By 2017, half of employers will
require employees to supply their
own device for work purposes.
(Gartner)
81% of Americans use their
personal mobile devices for work.
(Gartner)
6
7. The BYOD (bring your own device) movement has
fueled the growth of mobility in businesses of all
sizes – from enterprises to SMBs.
7
8. The BYOD (bring your own device) movement has
fueled the growth of mobility in businesses of all
sizes – from enterprises to SMBs.
The BYOD and enterprise mobility market is expected
to grow at the rate of 15% annually –
up to $181 billion by 2017. (Computer World)
8
9. But for all of the convenience and cost savings that
mobile devices can bring to the workplace –
there’s one big problem…
9
10. But for all of the convenience and cost savings that
mobile devices can bring to the workplace –
there’s one big problem…
SECURITY
10
11. There is a pressing
need for secure
sharing…
11
12. There is a pressing
need for secure
sharing…
Whether you’re sharing between computers,
12
13. There is a pressing
need for secure
sharing…
Whether you’re sharing between computers,
between mobile devices,
13
14. There is a pressing
need for secure
sharing…
Whether you’re sharing between computers,
between mobile devices,
Or anywhere across the cloud.
14
15. The risks of insecure sharing are rampant
no matter which platform you’re using.
15
16. The risks of insecure sharing are rampant
no matter which platform you’re using.
According to the Leaking Vault, over 1.29 billion
records were disclosed internationally between 2005
and 2011.
16
17. The risks of insecure sharing are rampant
no matter which platform you’re using.
17
20. Deliberate theft and stealing.
Employee error or carelessness.
Lost or stolen devices.
20
21. Deliberate theft and stealing.
Employee error or carelessness.
Lost or stolen devices.
Insecure channels of sharing.
21
22. Sharing information across the cloud
is essential - but risky.
In order to keep information secure, organizations
need to adopt security practices that offer protection at
the document level.
22
24. Why at the document level?
BYOD devices may not have sufficient security to
protect important data.
24
25. Why at the document level?
BYOD devices may not have sufficient security to
protect important data.
Password protected devices can be lost or stolen, and
then cracked.
25
26. Why at the document level?
BYOD devices may not have sufficient security to
protect important data.
Password protected devices can be lost or stolen, and
then cracked.
Forwarded or shared documents could be accessed
by third parties without your authorization.
26
27. By following three principles for simple, secure
sharing, an organization can stay mobile and
connected – without risking a security breach.
27
28. If content security measures are too difficult,
they simply won’t be used.
28
29. If content security measures are too difficult,
they simply won’t be used.
47% of employees using personal mobile devices at
work do not believe they are “in compliance” with their
company’s mobile device policy.
29
30. Employees engage in risky behavior with mobile
devices and content despite knowing better.
30
31. Employees engage in risky behavior with mobile
devices and content despite knowing better.
36% click on unverified links from social media.
31
32. Employees engage in risky behavior with mobile
devices and content despite knowing better.
36% click on unverified links from social media.
11% use cloud services to send/share work
documents without IT permission.
32
33. Employees engage in risky behavior with mobile
devices and content despite knowing better.
36% click on unverified links from social media.
11% use cloud services to send/share work
documents without IT permission.
12% store work passwords on their devices.
33
35. Principle
#1
A content security solution has to be easy
to use.
Integrated into the preferred sharing platform
(web, email or mobile).
35
36. Principle
#1
A content security solution has to be easy
to use.
Integrated into the preferred sharing platform
(web, email or mobile).
No complicated infrastructure requirements.
36
37. Principle
#1
A content security solution has to be easy
to use.
Integrated into the preferred sharing platform
(web, email or mobile).
No complicated infrastructure requirements.
No extra burden on the IT department.
37
39. Principle
#2
Secure, simple sharing also means
sharing across multiple device types.
Embracing BYOD means handling the security needs
for multiple device types.
39
40. Principle
#2
Secure, simple sharing also means
sharing across multiple device types.
Embracing BYOD means handling the security needs
for multiple device types.
In a recent survey from IDC, IT managers
underestimated the number of consumer
Devices n their networks by 50%.
40
43. Principle
#3
Simple, secure sharing solutions need
to address multiple file types.
We live in a multimedia environment. We share:
Documents
43
44. Principle
#3
Simple, secure sharing solutions need
to address multiple file types.
We live in a multimedia environment. We share:
Documents
Videos
44
45. Principle
#3
Simple, secure sharing solutions need
to address multiple file types.
We live in a multimedia environment. We share:
Documents
Videos
PDFs
45
46. Principle
#3
Simple, secure sharing solutions need
to address multiple file types.
We live in a multimedia environment. We share:
Documents
Videos
PDFs
Images
46
47. Principle
#3
Simple, secure sharing solutions need
to address multiple file types.
We live in a multimedia environment. We share:
Documents
Videos
PDFs
Images
And more
47
48. Principle
#3
Simple, secure sharing solutions need
to address multiple file types.
A simple, secure sharing solution has to work with
multiple file types to support the real world business
environment.
48
49. Simple, secure sharing is possible – across mobile
devices, the cloud or through an API.
49
50. Content Raven provides:
Simple, one-click encryption for multiple file types.
Actionable analytics to track and control
content sharing.
API integration.
And more!