• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Securing Business: Strategic Enablement of Users
 

Securing Business: Strategic Enablement of Users

on

  • 1,443 views

Sending big files is not as easy as it sounds and it definitely is appropriate to use email or ftp. Communicate securely and enable users to do business through a strategy, not technology.

Sending big files is not as easy as it sounds and it definitely is appropriate to use email or ftp. Communicate securely and enable users to do business through a strategy, not technology.

Statistics

Views

Total Views
1,443
Views on SlideShare
1,425
Embed Views
18

Actions

Likes
1
Downloads
0
Comments
0

2 Embeds 18

http://managedfiletransfer.wordpress.com 15
http://www.slideshare.net 3

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Overtime things get implemented as one offs --- these one off solutions create a “hairball” of processes and data exchange across systems, data centers and geographies. Not good.
  • Stonebranch simplifies this
  • Just re-iterate tha with the security, monitoring and support for ad-hoc Stonebranch can be a single platform for securing the enterprise and the “people”.

Securing Business: Strategic Enablement of Users Securing Business: Strategic Enablement of Users Presentation Transcript

  • Business & IT: From Infrastructure to People
  • Business and IT Realities
    • Always on communications
    • Confidential communications
    • Global Infrastructures
    • Duplicate systems
    • Complexity is growing
    • Compliance is critical
  • Green IT Security & Compliance Business Process Business Continuity Risk Management ITIL Cost Management Process Maturity Capacity Planning Service Delivery Contingency Planning Supply-Chain Management Disaster Recovery Data Management Enterprise to Enterprise Collaboration Business Value IT Pain Management Performance Value for IT Revenue Enhancement Strategic Value Strategic Advantage Revenue Growth Profit Growth Cost Reduction Business Agility Server Consolidation Virtualization IT Automation Workload Optimization Data Management Risk Management Capacity Planning SOX HIPAA Basel II Healthcare Information Exchange Fax Business Service Management EDI provisioning X.509
  • Communications Landscape: The Reality Latency Content/Context Batch Real-Time Bulk Transactional Documents Messages
    • >80% of data movement today is by file exchange
    • 80% of the data movement remains unmanaged
    • The primary method of multi-enterprise integration will continue to be file exchange
    • Only about one-seventh of all healthcare transactions are processed electronically today.
    Meta Group / Gartner
  • The Impact: Communications Chaos Limited Visibility | Enforcement Issues | Operational Risk email ftp sms files messages fax B2B
  • 1: MFT Ain’t Just for Technologist
    • MFT requirements don't just come from the data center. They also come from users who need to send files in an ad hoc fashion to support collaboration and compliance .
  • Where’s your data? FTP alone is not a viable option to give you the insight, security and performance and, ultimately, the risk mitigation necessary to responsibly conduct business . iPhone's problems concerns a new SMS vulnerability that could allow an attacker to remotely install and run unsigned software code with root access to the iPhone. Because e-mail connects through many routers and mail servers on its way to the recipient, it is inherently vulnerable to both physical and virtual eavesdropping . Current industry standards do not place emphasis on security ; information is transferred in plain text , and mail servers regularly conduct unprotected backups of e-mail that passes through.
  • 2. Modernization isn’t Only a Platform Decision
    • IT modernization initiatives and the underlying scheduling and communication foundations should also be modernized.
  • Modernization is about Extending Value
  • The modernizing automating communication improves…
    • Customers service
    • Project document reviews
    • Contracts and agreements
    • Personal Healthcare Info
    • Strategic planning
    • Product Design timelines
    • Governmental filings
    • Insurance claims
    Operations Processes
    • Integration
    • Visibility
    • Compliance
    • Reporting
    • Workflows
    • Service Levels
    • Costs
    • Revenue
  • 3. IT is the bottleneck!
    • The speed of business requires business focused solutions which require less IT assistance for provisioning and ongoing demand management
  • One size does not fit all Business processes and people have different requirements and capabilities
  • Users Think Out of the IT Box For Communications and File Exchange
  • Users have Options that don’t require IT or Budget authorization!
  •  
  • It won’t happen to me…. The University of Miami announced that a case of six computer backup tapes containing the personal health information of some 2.1 million patients was stolen from a vehicle on 17 March. The data included information on hospital patients dating back to 1 January 1999. 2.1M patient records stolen NY Presbyterian Hospital employee stole patient information as part of an identity theft ring. The patient admissions rep accessed the personal health information of nearly 50,000 patients. He began to access the files and sell the information in early 2006. Hospital employee sells 50K patient records Health insurer WellPoint confirmed that the Social Security numbers, pharmacy and prescription records, and other personal health information for approximately 130,000 of its customers were left unsecured on the public Internet. Insurer leaves 130K records unsecured
  • 4. Compliance drives Value
    • IT and business compliance are rapidly merging. The impact of audits and operations require effective governance & security for file transfer
  • Changing Processes It’s about continued compliance and improved agility, not technology
  • Changing Healthcare Compliance
    • Security Rules Apply Directly to Business Associates
    • Stricter PHI Management Requirements
    • Electronic Healthcare records
    • Required HSS Audits
  • TARP
  • 5. Process is as Process Does
    • Centralized secure file transfer disciplines and technologies to manage end-to-end business processes is required on-premises, for software as a service, outsourcing or in the cloud.
  • Where’s your file? Multiple Platforms & Tools = Complexity
  • Connections are EVERYWHERE! Infrastructure, Files and People
  • Unified Communications: Processes, Payloads & People
  • A Single Platform for Platforms Payload and People
      • Processes
      • Data Centers
      • Application
      • Integration
      • Expert Systems
      • People
      • Messaging
      • Ad-hoc Exchange
      • Flexible Deployment
      • Payload
      • Security
      • Encryption
      • Data exchange
      • Expert Data Management
    INDESCA INFITRAN Scribbos
  • So what are you going to do?
  • One size does not fit all Different capabilities, scale and value
  • Benefits of Strategic MFT Approach
    • Secure Communications
      • Customers, Outsourced Services, Partners
    • Improved Service Levels
      • Automated workflows
    • Improved compliance
      • Corporate (Internal controls/audits, security, sustainability)
      • Governmental (SOX, Basel II, HIPAA…)
    • Security Enforcement
      • Process level governance
      • Content and session encryption
    • Improved visibility and control
      • Process status
      • Exceptions
      • Transactions and Trends
  • Benefits of a Centralized Solution
    • Legacy
    • Emerging
    Single Operational Environment
    • Policy Definition
    • Run-time Enforcement
    Single Governance Environment
    • Single Repository
    • Rules based notifications
    Better Audit Capability
    • User access
    • Encryption
    Better Corporate Security
  • Questions? Please use the chat features of the webinar