SlideShare a Scribd company logo
1 of 32
Download to read offline
Making BYOD a Secure Reality
The London Borough of Camden
Jes Breslaw, EMEA Marketing Director
Jes.breslaw@Accellion.com
@jesbreslaw
Confidential 2
Agenda
• About Accellion
• London Borough of Camden
• 2012 ICT Strategy overview
• Mobile/BYOD requirements
• Solution
• Benefits
• More information
• Summary
Confidential
Accellion - Snapshot
• Founded 1999
• Headquartered in Palo Alto, CA
• Well established in EMEA
• 1,800+ Enterprise Customers
• 11+ Million Enterprise Users
3
Confidential 4
The Challenge
Accessing and Sharing Enterprise Content in the BYOD Era
The New Reality
• Proliferation of employee owned mobile
devices & tablets, led by the iPad
• Difficulties accessing Enterprise Content
from Mobile Devices
• Consumerisation of IT creating security
challenges
• The Dropbox Problem
• The BYOD Challenge
Confidential 5
A New Population of Mobile Workers
Confidential 6
The opportunity
Workers could gain equivalent of
an extra day per week!
Confidential 7
Mobile Productivity Challenges
Security and Data
Leaks
Enterprise data leaks
while moving data
across 3rd party apps
using open-in and
save back
Integrated
Productivity Solution
Only access and view
content. Not able to
create and edit content
securely as an
integrated solution
Collaboration and
Sharing
Collaborate and share
newly created and
edited documents
securely
Confidential
Secure File Transfer
▪ Send files as secure links
▪ Very large file support (1 TB+)
▪ Rich security options
Secure Collaboration
▪ Secure team workspaces
▪ Invite others to share within workspaces
▪ Desktop-workspace file sync
▪ Versioning, Commenting
▪ Highly flexible access control
Accellion Solution Overview
Kitepoint - Secure Content Access
▪ Access content stored behind the firewall
▪ Secure, anytime access to “Document of Record”
▪ No VPN required
▪ Fully integrated – Download, edit and upload
▪ Supports ECM systems and File Stores
▪ Respects permissions of source
Anytime, Anywhere Access to Enterprise Content
Mobile Productivity Suite
▪ Create, edit and share MS Office compatible files
▪ Fully containerized for end-to-end document security
▪ Works with kiitepoint, Collaboration and Secure Send
Confidential 9
Cloud Deployment Options
Private
On-Premise
Private
Hosted
Public
Multi-Tenant
• Virtual appliance
• Full control
• Full security, compliance
• Single-tenant
• Secure
• Cloud agility
• Multi-tenant
• Cloud agility
Confidential 10
London Borough of Camden
• One of 32 London Boroughs
• Population of 22,100
• Divided into 18 wards
• 8,500 employees
Confidential 11
Strategic IT plan set in 2012
1. Service integration & multi agency
2. Agile Working
3. Right First Time
4. Improving Customer Access and Tackling
Digital Exclusion
5. Tacking Inequality Through Better Data and
Customer Insight
6. Better, Faster, Reliable Infrastructure
Confidential 12
Financial pressures
• £12-13m of potential demand for IT in 2012
• Available capital budget of £7m
• Make additional savings from existing IT spend
• Reduce resources spent on smaller projects with more focus on
transformational projects i.e. agile working
• Ensure discretionary IT spend provides best ROI
• Actively manage overall portfolio of projects
Confidential 13
Strategic IT plan set in 2012
• 2. Agile Working
• Paperless Office
• Anytime, Anywhere Working
• Secure Any Device, Any Platform Access
• Networking our Staff
• Modernise Core Technologies
Confidential 14
Implementing a Mobility/BYOD Policy
• Important part of the council’s strategic plan
• Cost savings
• Accommodation
• Storage and admin for paper
• Device refresh
• Productivity & creativity
• Team collaboration
• Work anywhere
Confidential 15
Mobile platform requirements
• Productivity:
• Integrate with SharePoint and File Shares with no VPN
• Support seamless workflows
• Enabled team/3rd party collaboration
• Secure editing of office documents
Confidential 16
Mobile platform requirements
• Security:
• Supported government regulated Impact Levels (ILs)
• Saved audit trails for compliance
• Secured data with multilayered authentication
• User authentication
• Application blocking
• LDAP/AD integration
• Encryption of data in transit and at rest
• Had multiple deployment options
• IOS & Android
• Private cloud/cloud
Confidential 17
Starting the search
• Talk to trusted advisors
• We asked our own customers how they share files
• Prioritize deployment type
• Private cloud, public, hybrid, hosted, etc.
• Consider future scenarios
• Number of users, mobile devices, types of files
• Determine must-haves and nice-to-haves
Confidential
18
LBoC – BYOD solution
Private Cloud
File Sharing
Enterprise Content
Office clients MDM
3rd parties
Devices
Confidential 19
Combined Solution Architecture
Confidential 20
Real time access to all
enterprise content,
including access to:
• SharePoint
• Windows File Shares
• Secure workspaces
Confidential 21
Full editing suite
Confidential 22
Secure file transfer
Confidential 23
…secure links
Confidential 24
Open-In Policies
Open-In policies are determined by the Administrator
Open-in Enabled Open-in Disabled
Confidential 25
DLP Policies (Cut-Copy-Paste)
Cut, Copy and Paste
policies are controlled via
MobileIron VSP Dashboard
No DLP
Policy
Paste
Disabled
Cut-Copy- paste policies are determined by the Adminstrator
Confidential 26
"Accellion acts as the single platform for users to
access, review and collaborate on content from
mobile devices of their choosing,”
Confidential 27
Benefits of Accellion in LBoC
• Productivity gains
• Cost savings through reduced accommodation requirements
• Happier employees through council-wide support for mobile
file-sharing
• Extend existing ECM investments + improve adoption
• Track and report on all file sharing activities
• A quick win – made IT look good!
Confidential 28
Resources
Confidential
Gartner MarketScope Report
Confidential 30
White Papers
• 5 Best Practices for Secure Enterprise Content Mobility
• BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
• Mobilize SharePoint Securely: Top 5 Enterprise Requirements
• 10 Mobile Security Requirements for BYOD
• + more
Confidential 31
Summary
• Support multiple mobile platforms
• Block consumer-class services
• Extend Security to every file and device
• Integrate Secure Productivity capabilities
• Select Private Cloud for maximum data security
• Connect to enterprise content management systems
Confidential 32
Thank you
www.accellion.com
@accellion
www.linkedin.com/company/accellion
www.facebook.com/Accellion
jes.breslaw@accellion.com @jesbreslaw
“Now we have a solution that’s integrated with our MDM solution
and SharePoint, allowing us to securely mobilise our most important
content and make BYOD a reality.”
Ian Lawrence - IT Manager
London Borough of Camden

More Related Content

What's hot

Elevate Your Digital Experiences with Cloud Content Management on Box
Elevate Your Digital Experiences with Cloud Content Management on BoxElevate Your Digital Experiences with Cloud Content Management on Box
Elevate Your Digital Experiences with Cloud Content Management on Boxrivetlogic
 
How to Make the Right First Step Towards the Cloud
How to Make the Right First Step Towards the CloudHow to Make the Right First Step Towards the Cloud
How to Make the Right First Step Towards the Cloudbrightsolid
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators
 
IBM RTP Dojo Launch
IBM RTP Dojo LaunchIBM RTP Dojo Launch
IBM RTP Dojo LaunchIBM
 
Desktop Network Systems what we do
Desktop Network Systems what we doDesktop Network Systems what we do
Desktop Network Systems what we doVince Bailey
 
Collaborative BIM - Asite Breakfast Seminar 2013-10-16
Collaborative BIM - Asite Breakfast Seminar 2013-10-16Collaborative BIM - Asite Breakfast Seminar 2013-10-16
Collaborative BIM - Asite Breakfast Seminar 2013-10-16Nathan Doughty
 
Accessibility & the Cloud: Current & Future Trends - Dr Scott Hollier at the ...
Accessibility & the Cloud: Current & Future Trends - Dr Scott Hollier at the ...Accessibility & the Cloud: Current & Future Trends - Dr Scott Hollier at the ...
Accessibility & the Cloud: Current & Future Trends - Dr Scott Hollier at the ...Media Access Australia
 
Managing IT in Business- IBM Report 2018
Managing IT in Business-  IBM Report 2018Managing IT in Business-  IBM Report 2018
Managing IT in Business- IBM Report 2018MayankAgrawal205
 
To the Cloud through Collaboration in 6 weeks!
To the Cloud through Collaboration in 6 weeks!To the Cloud through Collaboration in 6 weeks!
To the Cloud through Collaboration in 6 weeks!brightsolid
 
FinTech Belgium - Fintech Belgium MeetUp on Platformisation Strategy - Erik ...
FinTech Belgium - Fintech Belgium MeetUp on Platformisation Strategy -  Erik ...FinTech Belgium - Fintech Belgium MeetUp on Platformisation Strategy -  Erik ...
FinTech Belgium - Fintech Belgium MeetUp on Platformisation Strategy - Erik ...FinTech Belgium
 
Content is King: Presentation to Cross Media Innocation Center at RIT
Content is King: Presentation to Cross Media Innocation Center at RITContent is King: Presentation to Cross Media Innocation Center at RIT
Content is King: Presentation to Cross Media Innocation Center at RITMatt Turner
 
Eduserv cloud services
Eduserv cloud servicesEduserv cloud services
Eduserv cloud servicesEduserv
 
brightsolid Tech Trends in Energy
brightsolid Tech Trends in Energybrightsolid Tech Trends in Energy
brightsolid Tech Trends in Energybrightsolid
 
Cloud and security impacts
Cloud and security impactsCloud and security impacts
Cloud and security impactsShekhar Gupta
 
Alfresco Day Stockholm 2015 - Case Study: Tieto
Alfresco Day Stockholm 2015 - Case Study: TietoAlfresco Day Stockholm 2015 - Case Study: Tieto
Alfresco Day Stockholm 2015 - Case Study: TietoNicole Szigeti
 
IoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and BlockchainIoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and BlockchainValerie Lampkin
 
Cloud Customer Architecture for Enterprise Social Collaboration
Cloud Customer Architecture for Enterprise Social CollaborationCloud Customer Architecture for Enterprise Social Collaboration
Cloud Customer Architecture for Enterprise Social CollaborationCloud Standards Customer Council
 

What's hot (20)

PROOM
PROOMPROOM
PROOM
 
Elevate Your Digital Experiences with Cloud Content Management on Box
Elevate Your Digital Experiences with Cloud Content Management on BoxElevate Your Digital Experiences with Cloud Content Management on Box
Elevate Your Digital Experiences with Cloud Content Management on Box
 
How to Make the Right First Step Towards the Cloud
How to Make the Right First Step Towards the CloudHow to Make the Right First Step Towards the Cloud
How to Make the Right First Step Towards the Cloud
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
IBM RTP Dojo Launch
IBM RTP Dojo LaunchIBM RTP Dojo Launch
IBM RTP Dojo Launch
 
Desktop Network Systems what we do
Desktop Network Systems what we doDesktop Network Systems what we do
Desktop Network Systems what we do
 
Collaborative BIM - Asite Breakfast Seminar 2013-10-16
Collaborative BIM - Asite Breakfast Seminar 2013-10-16Collaborative BIM - Asite Breakfast Seminar 2013-10-16
Collaborative BIM - Asite Breakfast Seminar 2013-10-16
 
Accessibility & the Cloud: Current & Future Trends - Dr Scott Hollier at the ...
Accessibility & the Cloud: Current & Future Trends - Dr Scott Hollier at the ...Accessibility & the Cloud: Current & Future Trends - Dr Scott Hollier at the ...
Accessibility & the Cloud: Current & Future Trends - Dr Scott Hollier at the ...
 
Managing IT in Business- IBM Report 2018
Managing IT in Business-  IBM Report 2018Managing IT in Business-  IBM Report 2018
Managing IT in Business- IBM Report 2018
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
To the Cloud through Collaboration in 6 weeks!
To the Cloud through Collaboration in 6 weeks!To the Cloud through Collaboration in 6 weeks!
To the Cloud through Collaboration in 6 weeks!
 
FinTech Belgium - Fintech Belgium MeetUp on Platformisation Strategy - Erik ...
FinTech Belgium - Fintech Belgium MeetUp on Platformisation Strategy -  Erik ...FinTech Belgium - Fintech Belgium MeetUp on Platformisation Strategy -  Erik ...
FinTech Belgium - Fintech Belgium MeetUp on Platformisation Strategy - Erik ...
 
Content is King: Presentation to Cross Media Innocation Center at RIT
Content is King: Presentation to Cross Media Innocation Center at RITContent is King: Presentation to Cross Media Innocation Center at RIT
Content is King: Presentation to Cross Media Innocation Center at RIT
 
Eduserv cloud services
Eduserv cloud servicesEduserv cloud services
Eduserv cloud services
 
brightsolid Tech Trends in Energy
brightsolid Tech Trends in Energybrightsolid Tech Trends in Energy
brightsolid Tech Trends in Energy
 
Cloud and security impacts
Cloud and security impactsCloud and security impacts
Cloud and security impacts
 
Alfresco Day Stockholm 2015 - Case Study: Tieto
Alfresco Day Stockholm 2015 - Case Study: TietoAlfresco Day Stockholm 2015 - Case Study: Tieto
Alfresco Day Stockholm 2015 - Case Study: Tieto
 
IoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and BlockchainIoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and Blockchain
 
Cloud Customer Architecture for Enterprise Social Collaboration
Cloud Customer Architecture for Enterprise Social CollaborationCloud Customer Architecture for Enterprise Social Collaboration
Cloud Customer Architecture for Enterprise Social Collaboration
 
Hyperledger: Market, Technology & Community Update
Hyperledger: Market, Technology & Community UpdateHyperledger: Market, Technology & Community Update
Hyperledger: Market, Technology & Community Update
 

Viewers also liked

The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePointProofpoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File SharingProofpoint
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsProofpoint
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsProofpoint
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Proofpoint
 

Viewers also liked (6)

The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 

Similar to The London Borough of Camden- Making BYOD a Secure Reality

IBM Cloud Solution - Blue Box
IBM Cloud Solution - Blue BoxIBM Cloud Solution - Blue Box
IBM Cloud Solution - Blue BoxDaniele Bolletta
 
IBM Business Connect 2015 - Bluemix Overview
IBM Business Connect 2015 - Bluemix OverviewIBM Business Connect 2015 - Bluemix Overview
IBM Business Connect 2015 - Bluemix Overviewgjuljo
 
IBM Solutions Connect 2013 - Enterprise Content Management
IBM Solutions Connect 2013 - Enterprise Content ManagementIBM Solutions Connect 2013 - Enterprise Content Management
IBM Solutions Connect 2013 - Enterprise Content ManagementIBM Software India
 
Private Cloud Overview
Private Cloud OverviewPrivate Cloud Overview
Private Cloud OverviewEdKerstein
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the CloudGaryArdito
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions Troy C. Fulton
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Brian K. Dickard
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackLaurenWendler
 
130424 bitkom ucc_cloud_v06
130424 bitkom ucc_cloud_v06130424 bitkom ucc_cloud_v06
130424 bitkom ucc_cloud_v06Michael Burian
 
IBM INTEGRATION BUS (IIB V10)—DATA ROUTING AND TRANSFORMATION
IBM INTEGRATION BUS (IIB V10)—DATA ROUTING AND TRANSFORMATIONIBM INTEGRATION BUS (IIB V10)—DATA ROUTING AND TRANSFORMATION
IBM INTEGRATION BUS (IIB V10)—DATA ROUTING AND TRANSFORMATIONKellton Tech Solutions Ltd
 
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)VMware Tanzu
 
The IBM Research Compute Cloud (RC2): Innovation, Best Practices and Lessons ...
The IBM Research Compute Cloud (RC2): Innovation, Best Practices and Lessons ...The IBM Research Compute Cloud (RC2): Innovation, Best Practices and Lessons ...
The IBM Research Compute Cloud (RC2): Innovation, Best Practices and Lessons ...Society of Women Engineers
 
Webinar: The 5 Most Critical Things to Understand About Modern Data Integration
Webinar: The 5 Most Critical Things to Understand About Modern Data IntegrationWebinar: The 5 Most Critical Things to Understand About Modern Data Integration
Webinar: The 5 Most Critical Things to Understand About Modern Data IntegrationSnapLogic
 
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law SkyLaw Professional Corporation
 
Choosing Public vs. Private vs. Hybrid Cloud Computing
Choosing Public vs. Private vs. Hybrid Cloud ComputingChoosing Public vs. Private vs. Hybrid Cloud Computing
Choosing Public vs. Private vs. Hybrid Cloud ComputingSkytap Cloud
 
cloud computing - isaca conference 2012
cloud computing - isaca conference 2012cloud computing - isaca conference 2012
cloud computing - isaca conference 2012Jonathan Houston
 
Gov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGovCloud Network
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionDell EMC World
 

Similar to The London Borough of Camden- Making BYOD a Secure Reality (20)

IBM Cloud Solution - Blue Box
IBM Cloud Solution - Blue BoxIBM Cloud Solution - Blue Box
IBM Cloud Solution - Blue Box
 
IBM Business Connect 2015 - Bluemix Overview
IBM Business Connect 2015 - Bluemix OverviewIBM Business Connect 2015 - Bluemix Overview
IBM Business Connect 2015 - Bluemix Overview
 
IBM Solutions Connect 2013 - Enterprise Content Management
IBM Solutions Connect 2013 - Enterprise Content ManagementIBM Solutions Connect 2013 - Enterprise Content Management
IBM Solutions Connect 2013 - Enterprise Content Management
 
Private Cloud Overview
Private Cloud OverviewPrivate Cloud Overview
Private Cloud Overview
 
Forecast deploy3 100_ak2
Forecast deploy3 100_ak2Forecast deploy3 100_ak2
Forecast deploy3 100_ak2
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover Track
 
130424 bitkom ucc_cloud_v06
130424 bitkom ucc_cloud_v06130424 bitkom ucc_cloud_v06
130424 bitkom ucc_cloud_v06
 
Byod bpost
Byod bpostByod bpost
Byod bpost
 
IBM INTEGRATION BUS (IIB V10)—DATA ROUTING AND TRANSFORMATION
IBM INTEGRATION BUS (IIB V10)—DATA ROUTING AND TRANSFORMATIONIBM INTEGRATION BUS (IIB V10)—DATA ROUTING AND TRANSFORMATION
IBM INTEGRATION BUS (IIB V10)—DATA ROUTING AND TRANSFORMATION
 
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
 
The IBM Research Compute Cloud (RC2): Innovation, Best Practices and Lessons ...
The IBM Research Compute Cloud (RC2): Innovation, Best Practices and Lessons ...The IBM Research Compute Cloud (RC2): Innovation, Best Practices and Lessons ...
The IBM Research Compute Cloud (RC2): Innovation, Best Practices and Lessons ...
 
Webinar: The 5 Most Critical Things to Understand About Modern Data Integration
Webinar: The 5 Most Critical Things to Understand About Modern Data IntegrationWebinar: The 5 Most Critical Things to Understand About Modern Data Integration
Webinar: The 5 Most Critical Things to Understand About Modern Data Integration
 
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
 
Choosing Public vs. Private vs. Hybrid Cloud Computing
Choosing Public vs. Private vs. Hybrid Cloud ComputingChoosing Public vs. Private vs. Hybrid Cloud Computing
Choosing Public vs. Private vs. Hybrid Cloud Computing
 
cloud computing - isaca conference 2012
cloud computing - isaca conference 2012cloud computing - isaca conference 2012
cloud computing - isaca conference 2012
 
Gov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_final
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 

More from Proofpoint

You can wear it!
You can wear it!You can wear it!
You can wear it!Proofpoint
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Proofpoint
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityProofpoint
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Proofpoint
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Proofpoint
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Proofpoint
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile PrintingProofpoint
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud CollaborationProofpoint
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationProofpoint
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepointProofpoint
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationProofpoint
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODProofpoint
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IIProofpoint
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part IProofpoint
 
Have content, will travel securely sharing mobile content in the cloud part II
Have content, will travel  securely sharing mobile content in the cloud part IIHave content, will travel  securely sharing mobile content in the cloud part II
Have content, will travel securely sharing mobile content in the cloud part IIProofpoint
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud. Proofpoint
 

More from Proofpoint (19)

You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud Collaboration
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYOD
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part II
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part I
 
Have content, will travel securely sharing mobile content in the cloud part II
Have content, will travel  securely sharing mobile content in the cloud part IIHave content, will travel  securely sharing mobile content in the cloud part II
Have content, will travel securely sharing mobile content in the cloud part II
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud.
 

Recently uploaded

3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud DataEric D. Schabell
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.IPLOOK Networks
 
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfQ4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfTejal81
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxKaustubhBhavsar6
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...DianaGray10
 
UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4DianaGray10
 
Introduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationIntroduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationKnoldus Inc.
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameKapil Thakar
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsDianaGray10
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNeo4j
 
Top 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTop 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTopCSSGallery
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInThousandEyes
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kitJamie (Taka) Wang
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptxHansamali Gamage
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfInfopole1
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdfThe Good Food Institute
 
Technical SEO for Improved Accessibility WTS FEST
Technical SEO for Improved Accessibility  WTS FESTTechnical SEO for Improved Accessibility  WTS FEST
Technical SEO for Improved Accessibility WTS FESTBillieHyde
 

Recently uploaded (20)

3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.
 
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfQ4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptx
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...
 
UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4
 
Introduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationIntroduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its application
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First Frame
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projects
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile Brochure
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4j
 
Top 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTop 10 Squarespace Development Companies
Top 10 Squarespace Development Companies
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kit
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf
 
Technical SEO for Improved Accessibility WTS FEST
Technical SEO for Improved Accessibility  WTS FESTTechnical SEO for Improved Accessibility  WTS FEST
Technical SEO for Improved Accessibility WTS FEST
 

The London Borough of Camden- Making BYOD a Secure Reality

  • 1. Making BYOD a Secure Reality The London Borough of Camden Jes Breslaw, EMEA Marketing Director Jes.breslaw@Accellion.com @jesbreslaw
  • 2. Confidential 2 Agenda • About Accellion • London Borough of Camden • 2012 ICT Strategy overview • Mobile/BYOD requirements • Solution • Benefits • More information • Summary
  • 3. Confidential Accellion - Snapshot • Founded 1999 • Headquartered in Palo Alto, CA • Well established in EMEA • 1,800+ Enterprise Customers • 11+ Million Enterprise Users 3
  • 4. Confidential 4 The Challenge Accessing and Sharing Enterprise Content in the BYOD Era The New Reality • Proliferation of employee owned mobile devices & tablets, led by the iPad • Difficulties accessing Enterprise Content from Mobile Devices • Consumerisation of IT creating security challenges • The Dropbox Problem • The BYOD Challenge
  • 5. Confidential 5 A New Population of Mobile Workers
  • 6. Confidential 6 The opportunity Workers could gain equivalent of an extra day per week!
  • 7. Confidential 7 Mobile Productivity Challenges Security and Data Leaks Enterprise data leaks while moving data across 3rd party apps using open-in and save back Integrated Productivity Solution Only access and view content. Not able to create and edit content securely as an integrated solution Collaboration and Sharing Collaborate and share newly created and edited documents securely
  • 8. Confidential Secure File Transfer ▪ Send files as secure links ▪ Very large file support (1 TB+) ▪ Rich security options Secure Collaboration ▪ Secure team workspaces ▪ Invite others to share within workspaces ▪ Desktop-workspace file sync ▪ Versioning, Commenting ▪ Highly flexible access control Accellion Solution Overview Kitepoint - Secure Content Access ▪ Access content stored behind the firewall ▪ Secure, anytime access to “Document of Record” ▪ No VPN required ▪ Fully integrated – Download, edit and upload ▪ Supports ECM systems and File Stores ▪ Respects permissions of source Anytime, Anywhere Access to Enterprise Content Mobile Productivity Suite ▪ Create, edit and share MS Office compatible files ▪ Fully containerized for end-to-end document security ▪ Works with kiitepoint, Collaboration and Secure Send
  • 9. Confidential 9 Cloud Deployment Options Private On-Premise Private Hosted Public Multi-Tenant • Virtual appliance • Full control • Full security, compliance • Single-tenant • Secure • Cloud agility • Multi-tenant • Cloud agility
  • 10. Confidential 10 London Borough of Camden • One of 32 London Boroughs • Population of 22,100 • Divided into 18 wards • 8,500 employees
  • 11. Confidential 11 Strategic IT plan set in 2012 1. Service integration & multi agency 2. Agile Working 3. Right First Time 4. Improving Customer Access and Tackling Digital Exclusion 5. Tacking Inequality Through Better Data and Customer Insight 6. Better, Faster, Reliable Infrastructure
  • 12. Confidential 12 Financial pressures • £12-13m of potential demand for IT in 2012 • Available capital budget of £7m • Make additional savings from existing IT spend • Reduce resources spent on smaller projects with more focus on transformational projects i.e. agile working • Ensure discretionary IT spend provides best ROI • Actively manage overall portfolio of projects
  • 13. Confidential 13 Strategic IT plan set in 2012 • 2. Agile Working • Paperless Office • Anytime, Anywhere Working • Secure Any Device, Any Platform Access • Networking our Staff • Modernise Core Technologies
  • 14. Confidential 14 Implementing a Mobility/BYOD Policy • Important part of the council’s strategic plan • Cost savings • Accommodation • Storage and admin for paper • Device refresh • Productivity & creativity • Team collaboration • Work anywhere
  • 15. Confidential 15 Mobile platform requirements • Productivity: • Integrate with SharePoint and File Shares with no VPN • Support seamless workflows • Enabled team/3rd party collaboration • Secure editing of office documents
  • 16. Confidential 16 Mobile platform requirements • Security: • Supported government regulated Impact Levels (ILs) • Saved audit trails for compliance • Secured data with multilayered authentication • User authentication • Application blocking • LDAP/AD integration • Encryption of data in transit and at rest • Had multiple deployment options • IOS & Android • Private cloud/cloud
  • 17. Confidential 17 Starting the search • Talk to trusted advisors • We asked our own customers how they share files • Prioritize deployment type • Private cloud, public, hybrid, hosted, etc. • Consider future scenarios • Number of users, mobile devices, types of files • Determine must-haves and nice-to-haves
  • 18. Confidential 18 LBoC – BYOD solution Private Cloud File Sharing Enterprise Content Office clients MDM 3rd parties Devices
  • 20. Confidential 20 Real time access to all enterprise content, including access to: • SharePoint • Windows File Shares • Secure workspaces
  • 24. Confidential 24 Open-In Policies Open-In policies are determined by the Administrator Open-in Enabled Open-in Disabled
  • 25. Confidential 25 DLP Policies (Cut-Copy-Paste) Cut, Copy and Paste policies are controlled via MobileIron VSP Dashboard No DLP Policy Paste Disabled Cut-Copy- paste policies are determined by the Adminstrator
  • 26. Confidential 26 "Accellion acts as the single platform for users to access, review and collaborate on content from mobile devices of their choosing,”
  • 27. Confidential 27 Benefits of Accellion in LBoC • Productivity gains • Cost savings through reduced accommodation requirements • Happier employees through council-wide support for mobile file-sharing • Extend existing ECM investments + improve adoption • Track and report on all file sharing activities • A quick win – made IT look good!
  • 30. Confidential 30 White Papers • 5 Best Practices for Secure Enterprise Content Mobility • BYOD File Sharing – Go Private Cloud to Mitigate Data Risks • Mobilize SharePoint Securely: Top 5 Enterprise Requirements • 10 Mobile Security Requirements for BYOD • + more
  • 31. Confidential 31 Summary • Support multiple mobile platforms • Block consumer-class services • Extend Security to every file and device • Integrate Secure Productivity capabilities • Select Private Cloud for maximum data security • Connect to enterprise content management systems
  • 32. Confidential 32 Thank you www.accellion.com @accellion www.linkedin.com/company/accellion www.facebook.com/Accellion jes.breslaw@accellion.com @jesbreslaw “Now we have a solution that’s integrated with our MDM solution and SharePoint, allowing us to securely mobilise our most important content and make BYOD a reality.” Ian Lawrence - IT Manager London Borough of Camden

Editor's Notes

  1. This is a need that is cross industry Access, create & share information anywhere Challenge is iPad disrupted ‘how’ we use information = dropbox problem = data leakage also skydrive, icloud and other free tools
  2. This is the problem, 1.3bn mobile workers = in YOUR organisation Why are we excited? Productivity gains,
  3. INTEL - 23,500 BYOD, employees saving on average 57 mins (5 million hours in 2012) Federal agencies - 76% believe mobile devices increased productivity = 1 h 48 min per day (2013 Digital Dilemma, Telework Exchange) Mobile data access can help police officers save 30 minutes every day. (Deloitte: Gov. on the Go: Boosting Public-Sector Productivity by Going Mobile) Tablet users gain 66mins extra productivity CDW Tablet Poll Dec 2012
  4. Duplication of data in file sharing apps Users want to create and edit documents People want to collaborate outside of your firewall
  5. Paperless Office: Drive out 30 KM of paper through the Council wide adoption of electronic records and document management •Anytime, Anywhere Working: Enable staff to access Council IT systems from any internet connected location •Secure Any Device, Any Platform Access: Enable staff to bring their own devices and access the Council’s network (including personal computers and telephones) •Networking Our Staff, Socialising our Knowledge: transform collaboration through social media, video conferencing, messaging and shared working & new intranet •Modernise Core Technologies: Deploy modern versions of Microsoft Office, Internet Explorer and e-mail so staff have access to the latest features that help everyone to work more productively
  6. Paperless Office: Drive out 30 KM of paper through the Council wide adoption of electronic records and document management •Anytime, Anywhere Working: Enable staff to access Council IT systems from any internet connected location •Secure Any Device, Any Platform Access: Enable staff to bring their own devices and access the Council’s network (including personal computers and telephones) •Networking Our Staff, Socialising our Knowledge: transform collaboration through social media, video conferencing, messaging and shared working & new intranet •Modernise Core Technologies: Deploy modern versions of Microsoft Office, Internet Explorer and e-mail so staff have access to the latest features that help everyone to work more productively
  7. Paperless Office: Drive out 30 KM of paper through the Council wide adoption of electronic records and document management •Anytime, Anywhere Working: Enable staff to access Council IT systems from any internet connected location •Secure Any Device, Any Platform Access: Enable staff to bring their own devices and access the Council’s network (including personal computers and telephones) •Networking Our Staff, Socialising our Knowledge: transform collaboration through social media, video conferencing, messaging and shared working & new intranet •Modernise Core Technologies: Deploy modern versions of Microsoft Office, Internet Explorer and e-mail so staff have access to the latest features that help everyone to work more productively
  8. The London Borough of Camden needed to find a mobile file sharing solution that provided: Internal controls: The Borough needed ultimate authority about where and how its corporate data was stored, accessed and transferred. Impact levels: Government regulations mandate different levels of security and access dependent on the type of data, such as personal identification. The organization needed a solution that could support varying impact levels (ILs), which are outlined by government standards, to differentiate access availability. Multiple deployment options: While the organization required that data be stored on-premise, it wanted the flexibility to move to a public cloud or hybrid environment in the future, if desired. SharePoint integration: The organization invested in SharePoint as its primary content repository and so needed to ensure that mobile users could continue to access SharePoint as needed, from anywhere, eliminating the need to turn to consumer-based file sharing workarounds, such as Dropbox, which was banned from use by the Borough. Seamless workflows: The solution of choice had to be intuitive, allowing both employees and external third parties to quickly locate and securely share desired documents, edit as needed and upload current versions. True collaboration: While sharing files was key, employees also needed to be able to share ideas – providing comments and input about works in progress via a shared workspace. Audit trail: To maintain compliance with BYOD guidelines from the Information Commission Office (ICO) and prevent potentially large fines, the Borough required a solution that automatically tracked all data changes and mobile file sharing activities. Multi-layered authentication: Mobile data access was required to be authenticated via LDAP, as well as via an assigned user pin number.
  9. The London Borough of Camden needed to find a mobile file sharing solution that provided: Internal controls: The Borough needed ultimate authority about where and how its corporate data was stored, accessed and transferred. Impact levels: Government regulations mandate different levels of security and access dependent on the type of data, such as personal identification. The organization needed a solution that could support varying impact levels (ILs), which are outlined by government standards, to differentiate access availability. Multiple deployment options: While the organization required that data be stored on-premise, it wanted the flexibility to move to a public cloud or hybrid environment in the future, if desired. SharePoint integration: The organization invested in SharePoint as its primary content repository and so needed to ensure that mobile users could continue to access SharePoint as needed, from anywhere, eliminating the need to turn to consumer-based file sharing workarounds, such as Dropbox, which was banned from use by the Borough. Seamless workflows: The solution of choice had to be intuitive, allowing both employees and external third parties to quickly locate and securely share desired documents, edit as needed and upload current versions. True collaboration: While sharing files was key, employees also needed to be able to share ideas – providing comments and input about works in progress via a shared workspace. Audit trail: To maintain compliance with BYOD guidelines from the Information Commission Office (ICO) and prevent potentially large fines, the Borough required a solution that automatically tracked all data changes and mobile file sharing activities. Multi-layered authentication: Mobile data access was required to be authenticated via LDAP, as well as via an assigned user pin number.
  10. Paperless Office: Drive out 30 KM of paper through the Council wide adoption of electronic records and document management •Anytime, Anywhere Working: Enable staff to access Council IT systems from any internet connected location •Secure Any Device, Any Platform Access: Enable staff to bring their own devices and access the Council’s network (including personal computers and telephones) •Networking Our Staff, Socialising our Knowledge: transform collaboration through social media, video conferencing, messaging and shared working & new intranet •Modernise Core Technologies: Deploy modern versions of Microsoft Office, Internet Explorer and e-mail so staff have access to the latest features that help everyone to work more productively
  11. The Accellion system is built around the Secure File Transfer core. This robust system has been successfully rolled out to thousands of customers; in industries ranging from Advertising and Pharmaceuticals. Document expiration, other access restrictions Secure collaboration is built around SFT, providing incremental features to support realtime collaboration with co-workers, business partners and customers while maintaining high levels of security, access control and auditabiity to address corporate and IT concerns.