Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Enable Secure Mobile & Cloud Collaboration


Published on

(ISC)2 Secure Seattle 2013 Presentation: Security Transcends Technology
Rama Kolappan, Mobile Director, Accellion.

Published in: Technology
  • Be the first to comment

Enable Secure Mobile & Cloud Collaboration

  1. 1. Enable Secure Mobile & Cloud Collaboration(ISC)2 Secure Seattle 2013, Security Transcends TechnologyRama Kolappan, Mobile Director, Accellion.
  2. 2. ConfidentialAccellion - Snapshot• Founded 1999• Headquartered in Palo Alto, CA• 1,700+ Enterprise Customers• 11+ Million Enterprise Users• Secure Mobile File Sharing Solutions2
  3. 3. Confidential 3Accellion Customers
  4. 4. Confidential 4The Problem:Sharing Enterprise Content Securely in the New iPad EraThe New Reality• Proliferation of mobile devices andtablets, led by the iPad.• Difficulties accessing enterprisecontent on mobile devices.• Easy access to free cloud-based apps.• Consumerization of IT creating securitychallenges.
  5. 5. Confidential 5Terms of Service: Google Drive"When you upload or otherwise submit content to ourServices, you give Google (and those we work with) a worldwidelicense to use, host, store, reproduce, modify, create derivativeworks (such as those resulting from translations, adaptations orother changes we make so that your content works better withour Services), communicate, publish, publicly perform, publiclydisplay and distribute such content. The rights you grant in thislicense are for the limited purpose of operating, promoting, andimproving our Services, and to develop new ones. This licensecontinues even if you stop using our Services…”
  6. 6. Confidential 6A New Population of Mobile Workers
  7. 7. Confidential 7Productivity Gains from Mobility
  8. 8. Confidential 8Mobile Productivity ChallengesSecurity and DataLeaksEnterprise data leakswhile moving dataacross 3rd party appsusing open-in andsave backIntegratedProductivity SolutionOnly access and viewcontent. Not able tocreate and edit contentsecurely as anintegrated solutionCollaboration andSharingCollaborate and sharenewly created andedited documentssecurely
  9. 9. Confidential 9What Does BYOD Look Like?
  10. 10. Confidential 10What Does BYOD Feel Like?
  11. 11. Confidential 11The BYOD ChallengeHow to makeenterprise contentaccessible onmobile devices whilemaintaining controland security?
  12. 12. Confidential 12Enterprise Mobility ManagementMobileDeviceManagementMobileApplicationManagementMobileContentManagement
  13. 13. Confidential 13Choosing MDM/MAM PartnerWrapped vs SDK based solutions• Wrapped applications enforce following userpolices:• Cut, Copy, and Paste• Printing• Screen Shot Snapshots• Open-In• SDK based MDM/MAM APIs• Authorization and SSO• Encrypting Data at rest and In-Transit• Interoperability communication between applications• Open-In (Whitelisting and Blacklisting)
  14. 14. Confidential 14Avoiding BYOD Disaster• Support iOS, Android, and Blackberry devices.• Support user self-provisioning.• Provide access to enterprise content stores.• Provide approved apps.Enable• Implement encryption of data at rest and in transit.• Support remote wipe.• Integrate user authentication, SSO, Auto credentials(LDAP, AD).• Deploy secure cloud data storage.Secure• Provide configurable user permissions.• Ensure comprehensive file tracking and reporting.• Ensure auditable reports for demonstratingcompliance.• Manage user policies and profiles.Manage
  15. 15. 15Cloud Deployment OptionsPrivateOn-PremisePrivateHostedPublicMulti-Tenant• Virtual appliance• Full control• Full security, compliance• Single-tenant• Secure• Cloud agility• Multi-tenant• Cloud agility
  16. 16. Confidential 16Security ControlsEnterprise Security• Anti-Virus• Data Loss Prevention• Restricted Admin Access to ContentAuthentication / Authorization• SSO with SAML / OAuth / Kerberos• Multi-LDAP and AD integration• Two-Factor Authentication• Password Policies• RBACEncryption• Encryption – Data at Rest andin Motion• Encryption Strength• Ownership of Encryption Keys• FIPS 140-2 CertificationMobile Security• Secure Mobile Container• Whitelisted Helper Applications• Server Side Viewing• Remote Wipe• Offline PIN
  17. 17. Confidential 17Integrating Enterprise InfrastructureMobile Device Management, Mobile Application ManagementEnterprise multi-LDAP, Active Directory and AD GroupsSingle Sign-On (SAML, OAuth, Kerberos)Strong AuthenticationMobile ProductivityFTP and SMTPAPIs and Customizations
  18. 18. Confidential 18Secure Mobile Productivity• Create and edit contentsecurely, without the riskof data leaks duringtransit across 3rd partyapps• Private cloud – Create,edit and access contentfrom private cloud withAccellion MobileProductivity Suite• Content encrypted intransit and at rest;content expirationsupported
  19. 19. Confidential 19Secure Mobile Workflow• Mobilize existing content• Internal/external sharing• Unified access to all content• No duplication of content• Centralized control
  20. 20. Confidential 20Tips for Avoiding BYOD Disaster• Support multiple mobile platforms• Extend security to every file and device• Integrate secure productivity capabilities• Select private cloud for maximum data security• Connect to enterprise content management systems• Deploy anti-virus to keep the malware out• Integrate DLP to keep the data in• Block consumer-class services
  21. 21. Accellion provides enterprise-class mobile file sharingsolutions that enable secure anytime, anywhere access toinformation while ensuring enterprise security andcompliance.The world’s leading corporations and government agenciesselect Accellion to protect intellectual property, ensurecompliance, improve business productivity and reduce ITcost.Learn more about Accellion here: www.accellion.comConnect with Accellion here:About Accellion