Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Accellion SC Congress Chicago Presentation 2014


Published on

In his presentation "Securing Content in the Changing Landscape of the Mobile Enterprise", Rama Kolappan Director of Product Marketing at Accellion, provided insight into some of the more important trends and issues related to supporting and securing mobile access to confidential information in the BYOD post-PC era.

SC Congress Chicago is a unique conference and expo experience for private and public sector information security professionals. It offers practical solutions, expert guidance and timely information.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Accellion SC Congress Chicago Presentation 2014

  1. 1. Securing Content in the Changing Landscape of the Mobile Enterprise SC Congress Chicago, November 20, 2013 Rama Kolappan Director, Product Marketing Accellion, Inc.
  2. 2. The Problem: Sharing Enterprise Content Securely in the New iPad Era The New Reality • Proliferation of mobile devices and tablets, led by the iPad. • Difficulties accessing enterprise content on mobile devices. • Easy access to free cloud-based apps. • Consumerization of IT creating security challenges. Confidential 2
  3. 3. The BYOD Challenge How to make enterprise content accessible on mobile devices while maintaining control and security? Confidential
  4. 4. Enterprise Mobile Productivity Evolution Email, Contacts, Calendar Content, Backup, Store, Sync Collaboration & Sharing Productivity Trend Confidential Content Creation, Editing, Printing ECM & Content Access
  5. 5. Mobility and BYOD Trends Confidential State of Mobility Survey (6275 Organizations surveyed) Symantec 5
  6. 6. Enterprise Mobility Management Mobile Device Management Confidential Mobile Application Management Mobile Content Management 6
  7. 7. Mobile Security – iSMG Survey What are your biggest mobile security / privacy concerns? Which new security controls will you invest in during 2013? 74% Data security 48% Application security 31% 30% Continuous monitoring 24% Auditing and logging 28% Device configuration 31% Identity and access management 31% Authentication 33% Mobile device management solution 39% Malware 34% E-mail encryption 43% Unsecured wireless networks 34% Anti-malware protection 54% User behavior Authentication Data encryption 66% Device security 48% Awareness and training 24% 19% Mobile application management… 26% Managing multiple platforms 22% Managing mobile device inventory Varying privacy regulations across geographical regions Confidential 20% 13% VPN 8% 0% 15% Physical access controls 7% Internal application development 40% 60% Spring 2013. iSMG Survey: 200+ respondents (CIOs, CISOs, IT Directors, other senior leaders) 80% 0% 20% 40% 60%
  8. 8. Mobile Content Management Requirements Key Considerations Mobile Productivity Mobilize Existing Content Confidential Cloud Deployment Options Security Controls
  9. 9. Cloud Deployment Options Private On-Premise Private Hosted No data co-mingling Virtual appliance Full control Full security, compliance • Data Sovereignty • No data co-mingling • Security and control • Low CapEx • • • • Public Multi-Tenant • Multi-tenant • Low CapEx
  10. 10. Security Controls Authentication / Authorization Enterprise Security • Anti-Virus • Data Loss Prevention • Restricted Admin Access to Content • • • • • Encryption • Encryption – Data at Rest and in Motion • Encryption Strength • FIPS 140-2 Certification Confidential SSO with SAML/OAuth/Kerberos Multi-LDAP and AD integration Two-Factor Authentication Password Policies RBAC Mobile Security • • • • • Secure Mobile Container Whitelisted Helper Applications Server Side Viewing Selective Remote Wipe Offline PIN
  11. 11. Finding the Right Balance Good Usability Confidential Too Many Controls?
  12. 12. Mobilize Enterprise Content • Mobilize existing content • SharePoint, Windows File Shares • Internal/external sharing • Unified access to all content • No duplication of content • Centralized control Confidential
  13. 13. Secure Mobile Productivity • Create and edit content securely, without the risk of data leaks during transit across 3rd party apps • Private cloud – Create, edit and access content from private cloud with Accellion Mobile Productivity capabilities Confidential • Data encrypted in transit and at rest; content expiration supported
  14. 14. Mobile Content Management Requirements Key Considerations Mobile Productivity Mobilize Existing Content Confidential Cloud Deployment Options Security Controls
  15. 15. Accellion - Snapshot • Founded 1999 • Headquartered in Palo Alto, CA • 2,000+ Enterprise Customers • 12+ Million Enterprise Users • Secure Mobile File Sharing Solutions Confidential
  16. 16. Accellion Customers Confidential 16
  17. 17. Gartner MarketScope Accellion Rated “Strong Positive” Highest Possible Rating Confidential
  18. 18. Accellion Solution Overview Anytime, Anywhere Access to Enterprise Content Secure File Transfer • Send files as secure links • Very large file support (1 TB+) • Rich security options Secure Collaboration & Sharing • • • • Secure team workspaces Desktop-workspace file sync Versioning, Commenting Highly flexible access control Secure Content Access • Access content stored behind the firewall • Secure, anytime access to “Document of Record” • No VPN required • Respects permissions of source Confidential Mobile Productivity • Create, edit and share MS Office compatible files • Fully containerized for end-to-end document security • Works with ECM, Collaboration and Secure Send
  19. 19. MANAGE SECURE ENGAGE Avoiding BYOD Disaster Confidential Enabl e Secur e Mana ge • Support iOS, Android, and Windows devices. • Support user self-provisioning. • Provide access to enterprise content stores. • Provide approved apps. • Provide secure mobile printing. • Implement encryption of data at rest and in transit. • Support remote wipe. • Integrate user authentication, SSO, Auto credentials (LDAP, AD). • Integrate DLP to keep data in. • Provide configurable user permissions. • Ensure comprehensive file tracking and reporting. • Ensure auditable reports for demonstrating compliance. • Manage user policies and profiles. 19
  20. 20. Learn More Web Whitepapers, Datasheets, Videos, Analyst Reports, Blogs Call 1-855-485-4300 Social Media Confidential Twitter @Accellion LinkedIn Facebook
  21. 21. About Accellion Accellion provides enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to information while ensuring enterprise security and compliance. The world’s leading corporations and government agencies select Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT cost. Learn more about Accellion here: Connect with Accellion here:
  22. 22. Thank You! For more information visit Confidential 22