Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Three Principals for Simple, Secure Content Sharing

375 views

Published on

The risks of insecure content sharing are rampant no matter which platform you’re using. By following three principles for simple, secure sharing, an organization can stay mobile and connected – without risking a security breach.

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

Three Principals for Simple, Secure Content Sharing

  1. 1. 3 Principles for Simple, Secure Sharing 1
  2. 2. We do business in a mobile, cloud-based, connected environment – and it’s not slowing down. 2
  3. 3. We do business in a mobile, cloud-based, connected environment – and it’s not slowing down. The projected world wide shipments of smartphones and tablets in 2014 is expected to reach 2.2 billion. (Gartner) 3
  4. 4. Not only are we buying more smartphones and tablets – we’re using them for work. 4
  5. 5. Not only are we buying more smartphones and tablets – we’re using them for work. 81% of Americans use their personal mobile devices for work. (Gartner) 5
  6. 6. Not only are we buying more smartphones and tablets – we’re using them for work. By 2017, half of employers will require employees to supply their own device for work purposes. (Gartner) 81% of Americans use their personal mobile devices for work. (Gartner) 6
  7. 7. The BYOD (bring your own device) movement has fueled the growth of mobility in businesses of all sizes – from enterprises to SMBs. 7
  8. 8. The BYOD (bring your own device) movement has fueled the growth of mobility in businesses of all sizes – from enterprises to SMBs. The BYOD and enterprise mobility market is expected to grow at the rate of 15% annually – up to $181 billion by 2017. (Computer World) 8
  9. 9. But for all of the convenience and cost savings that mobile devices can bring to the workplace – there’s one big problem… 9
  10. 10. But for all of the convenience and cost savings that mobile devices can bring to the workplace – there’s one big problem… SECURITY 10
  11. 11. There is a pressing need for secure sharing… 11
  12. 12. There is a pressing need for secure sharing… Whether you’re sharing between computers, 12
  13. 13. There is a pressing need for secure sharing… Whether you’re sharing between computers, between mobile devices, 13
  14. 14. There is a pressing need for secure sharing… Whether you’re sharing between computers, between mobile devices, Or anywhere across the cloud. 14
  15. 15. The risks of insecure sharing are rampant no matter which platform you’re using. 15
  16. 16. The risks of insecure sharing are rampant no matter which platform you’re using. According to the Leaking Vault, over 1.29 billion records were disclosed internationally between 2005 and 2011. 16
  17. 17. The risks of insecure sharing are rampant no matter which platform you’re using. 17
  18. 18. Deliberate theft and stealing. 18
  19. 19. Deliberate theft and stealing. Employee error or carelessness. 19
  20. 20. Deliberate theft and stealing. Employee error or carelessness. Lost or stolen devices. 20
  21. 21. Deliberate theft and stealing. Employee error or carelessness. Lost or stolen devices. Insecure channels of sharing. 21
  22. 22. Sharing information across the cloud is essential - but risky. In order to keep information secure, organizations need to adopt security practices that offer protection at the document level. 22
  23. 23. Why at the document level? 23
  24. 24. Why at the document level? BYOD devices may not have sufficient security to protect important data. 24
  25. 25. Why at the document level? BYOD devices may not have sufficient security to protect important data. Password protected devices can be lost or stolen, and then cracked. 25
  26. 26. Why at the document level? BYOD devices may not have sufficient security to protect important data. Password protected devices can be lost or stolen, and then cracked. Forwarded or shared documents could be accessed by third parties without your authorization. 26
  27. 27. By following three principles for simple, secure sharing, an organization can stay mobile and connected – without risking a security breach. 27
  28. 28. If content security measures are too difficult, they simply won’t be used. 28
  29. 29. If content security measures are too difficult, they simply won’t be used. 47% of employees using personal mobile devices at work do not believe they are “in compliance” with their company’s mobile device policy. 29
  30. 30. Employees engage in risky behavior with mobile devices and content despite knowing better. 30
  31. 31. Employees engage in risky behavior with mobile devices and content despite knowing better. 36% click on unverified links from social media. 31
  32. 32. Employees engage in risky behavior with mobile devices and content despite knowing better. 36% click on unverified links from social media. 11% use cloud services to send/share work documents without IT permission. 32
  33. 33. Employees engage in risky behavior with mobile devices and content despite knowing better. 36% click on unverified links from social media. 11% use cloud services to send/share work documents without IT permission. 12% store work passwords on their devices. 33
  34. 34. Principle #1 A content security solution has to be easy to use. 34
  35. 35. Principle #1 A content security solution has to be easy to use. Integrated into the preferred sharing platform (web, email or mobile). 35
  36. 36. Principle #1 A content security solution has to be easy to use. Integrated into the preferred sharing platform (web, email or mobile). No complicated infrastructure requirements. 36
  37. 37. Principle #1 A content security solution has to be easy to use. Integrated into the preferred sharing platform (web, email or mobile). No complicated infrastructure requirements. No extra burden on the IT department. 37
  38. 38. Principle #2 Secure, simple sharing also means sharing across multiple device types. 38
  39. 39. Principle #2 Secure, simple sharing also means sharing across multiple device types. Embracing BYOD means handling the security needs for multiple device types. 39
  40. 40. Principle #2 Secure, simple sharing also means sharing across multiple device types. Embracing BYOD means handling the security needs for multiple device types. In a recent survey from IDC, IT managers underestimated the number of consumer Devices n their networks by 50%. 40
  41. 41. Principle #3 Simple, secure sharing solutions need to address multiple file types. 41
  42. 42. Principle #3 Simple, secure sharing solutions need to address multiple file types. We live in a multimedia environment. We share: 42
  43. 43. Principle #3 Simple, secure sharing solutions need to address multiple file types. We live in a multimedia environment. We share: Documents 43
  44. 44. Principle #3 Simple, secure sharing solutions need to address multiple file types. We live in a multimedia environment. We share: Documents Videos 44
  45. 45. Principle #3 Simple, secure sharing solutions need to address multiple file types. We live in a multimedia environment. We share: Documents Videos PDFs 45
  46. 46. Principle #3 Simple, secure sharing solutions need to address multiple file types. We live in a multimedia environment. We share: Documents Videos PDFs Images 46
  47. 47. Principle #3 Simple, secure sharing solutions need to address multiple file types. We live in a multimedia environment. We share: Documents Videos PDFs Images And more 47
  48. 48. Principle #3 Simple, secure sharing solutions need to address multiple file types. A simple, secure sharing solution has to work with multiple file types to support the real world business environment. 48
  49. 49. Simple, secure sharing is possible – across mobile devices, the cloud or through an API. 49
  50. 50. Content Raven provides: Simple, one-click encryption for multiple file types. Actionable analytics to track and control content sharing. API integration. And more!
  51. 51. Sign up for free at: www.contentraven.com

×