Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Executive Alliance Dallas - Accellion Presentation


Published on

In the executive briefing, "How to Avoid BYO Disaster", Paula Skokowski, VP of Products and Marketing at Accellion, Gold Sponsor, provided insight into some of the more important trends and issues related to supporting and securing mobile access to confidential information in the BYOD post-PC era, their drivers, and expected impacts as organizations look to control and secure enterprise content.

Published in: Technology

Executive Alliance Dallas - Accellion Presentation

  1. 1. Avoiding BYO DisasterExecutive Alliance: Security Leaders Summit PresentationPaula Skokowski, VP Products & Marketing
  2. 2. Accellion - Snapshot • Founded 1999 • Headquartered in Palo Alto, CA • 1,700+ Enterprise Customers • 11+ Million Enterprise Users • Secure Mobile File Sharing SolutionsConfidential 2
  3. 3. Accellion CustomersConfidential 3
  4. 4. The Challenge Accessing and Sharing Enterprise Content in the BYOD Era The New Reality • Proliferation of employee owned mobile devices & tablets, led by the iPad • Difficulties accessing Enterprise Content from Mobile Devices • Consumerization of IT creating security challenges • The Dropbox Problem • The BYOD ChallengeConfidential 4
  5. 5. A New Population of Mobile WorkersConfidential 5
  6. 6. Productivity Gains from MobilityConfidential 6
  7. 7. Mobile Productivity Challenges Security and Data Integrated Collaboration and Leaks Productivity Solution Sharing Enterprise data leaks Only access and view Collaborate and sharewhile moving data across content. Not able to create newly created and 3rd party apps using and edit content securely edited documents Open-in and save back as an integrated solution securely Confidential 7
  8. 8. What Does BYOD Look Like?Confidential 8
  9. 9. What Does BYOD Feel Like?Confidential 9
  10. 10. The BYOD Challenge How to make enterprise content accessible on mobile devices while maintaining control and security?Confidential 10
  11. 11. Enterprise Mobility ManagementMobile Mobile MobileDevice Application ContentManagement Management ManagementConfidential 11
  12. 12. Avoiding BYOD Disaster • Support iOS, Android, and Blackberry devices. Enable • Support user self-provisioning. • Provide access to enterprise content stores. • Provide Approved Apps. • Implement Encryption of data at rest and in transit. Secure • Support Remote Wipe. • Integrate User authentication, SSO, Auto Credentials (LDAP, AD). • Deploy Secure cloud data storage. • Provide Configurable User Permissions. Manage • Ensure Comprehensive File Tracking and Reporting. • Ensure Auditable reports for demonstrating compliance. • Manage user policies and profiles.Confidential 12
  13. 13. Verizon Wireless Key Requirements: • Access and edit documents from mobile devices (Android, BlackBerry, iOS) with corporate vs. personal device distinction and Snapshot: access controls. • Telecommunications • Collaborate on presentations, sales documents • HQ: New York and proposals internally and externally with • 100k users partners. • Secure end-to-end environment with controls, oversight and auditing capabilities. • Integration into existing enterprise systems; SharePoint, LDAP/AD, SSO, Email and DLP.Confidential 13
  14. 14. Verizon – Road Warrior Solution Private Cloud File Sharing Enterprise DLP MDM Content ArchivingConfidential 14
  15. 15. Private vs. Public Cloud File SharingConfidential 15
  16. 16. Security Encryption – Data at Rest and in Motion – Across all devices Blacklisting/Whitelisting of Helper Mobile Apps Anti-Virus Data Loss Prevention Server Side Viewing Role Based Access Control Secure Mobile Container – Remote WipeConfidential 16
  17. 17. Enterprise Integrations Enterprise multi-LDAP, Active Directory and AD Groups Single Sign-On (SAML, OAuth, Kerberos) Strong Authentication Mobile Device Management, Mobile App Management Office Productivity FTP and SMTP APIsConfidential 17
  18. 18. Compliance and Reporting Reporting Compliance Granularity of Reporting FIPS Compliance Export to 3rd Party Reporting PCI Compliance Log formatting for export SOX Compliance SNMP (Monitoring) HIPAA Compliance Integration with GRCConfidential 18
  19. 19. Secure Mobile Productivity• Create and edit content securely, without the risk of data leaks during transit across 3rd party apps • Private Cloud – Create, edit and access content from private cloud with Accellion Mobile Productivity Suite • Content encrypted in transit and at rest; content expirationConfidential supported 19
  20. 20. Secure Mobile Workflow • Mobilize Existing Content • Internal/External Sharing • Unified Access to All Content • No Duplication of Content • Centralized ControlConfidential 20
  21. 21. Tips for Avoiding BYOD Disaster • Support multiple mobile platforms • Extend Security to every file and device • Integrate Secure Productivity capabilities • Select Private Cloud for maximum data security • Connect to enterprise content management systems • Deploy anti-virus to keep the bad stuff out • Integrate DLP to keep the good stuff in • Block consumer-class servicesConfidential 21
  22. 22. About AccellionAccellion provides enterprise-class mobile file sharingsolutions that enable secure anytime, anywhere access toinformation while ensuring enterprise security andcompliance.The world’s leading corporations and government agenciesselect Accellion to protect intellectual property, ensurecompliance, improve business productivity and reduce ITcost.Learn more about Accellion here: www.accellion.comConnect with Accellion here: