Your employees – and your company data – are on the go every day. As a result, your employees are relying on the use of 3rd party online services without IT approval – that is Shadow IT in your own organization. That’s some risky business. Where in the world is your Corporate Data?
With TeraGo Cloud Drive we are giving you back control of your most valuable asset, your data.
In this webinar you will learn about:
How Shadow IT is picking up velocity due to the accessibility and ease of cloud applications
Consequences of weak corporate security mechanisms
How to give your IT department control of your data and its’ security
Your employees – and your company data – are on the go every day. As a result, your employees are relying on the use of 3rd party online services without IT approval – that is Shadow IT in your own organization. That’s some risky business. Where in the world is your Corporate Data?
With TeraGo Cloud Drive we are giving you back control of your most valuable asset, your data.
In this webinar you will learn about:
How Shadow IT is picking up velocity due to the accessibility and ease of cloud applications
Consequences of weak corporate security mechanisms
How to give your IT department control of your data and its’ security
The cloud is challenging every aspect of how organizations deal with user file storage, collaboration, office storage and data protection
Organizations are now looking for smarter, less expensive tools that make them more agile IT-as-a-Service providers
Anymore, users are looking for apps and cloud-integrated services that redefine both economics and service levels in the enterprise
Shadow IT is a term often used to describe information-technology systems and solutions built and used inside organizations without explicit organizational approval. It is also used, along with the term "Stealth IT", to describe solutions specified and deployed by departments other than the IT department.
Company data is moving outside the corporate firewall at a rapid pace, and that trend is only going to continue. IT managers need to maintain control of that data anywhere, and at all times.
http://thumbnails-visually.netdna-ssl.com/the-nightmare-of-securing-your-unstructured-data-in-the-era-of-the-borderless-enterprise_519ea836dc271_w1500.png
Capabilities include :
Two-factor authentication that provides strong controls on who can access the service
Remote data shredding to ensure there no possibility of data getting into the wrong hands after the loss of a device
Strong controls on passwords
Audit trails to ensure compliance
Admin-defined policies on what can be uploaded and shared
And– the best approach to managing your encryption keys – you generate and own your keys, no 3rd party is involved in any aspect of the encryption process
Source-based encryption: Encrypting your files before they are sent to the cloud. This in addition to TLS/SSL in-transit encryption.
Private encryption key management: The ability to control your encryption keys exclusively, preventing service provider staff and other 3rd parties from accessing your files when stored in the cloud.
Password policy enforcement: Ability to enforce use of strong passwords and password expiration period on users.
2-factor authentication: Ability to require 2-factor authentication (via email) for account/device activation as well as shared links access.
Data integrity checks: Preventing ‘man in the middle’ attacks and tampering with your files by ensuring that the data that arrived in the cloud is the same data that left your device. This is typically done using hashes or fingerprinting such as the SHA-1 standard.
Password Policy & Strength Enforcement – allows administrators to set password policies to ensure rotational passwords are used over time, reducing the opportunity for impersonation.
Malware Detection & Prevention
Data Loss Prevention Software (DLP)
http://www.ctera.com/products/technology/end-to-end-security
IT Manager
Ability to choose vendor and management services to integrate into existing IT infrastructure
Key Value Propositions: Toolset for internal data management; seamless integration into existing environment; ability to manage/monitor usage
Corporate Security Officer
Ability to accept/reject IT services based on adherence to corporate security policies
Key Value Propositions: Ability to protect corporate IP information via encryption; prevent unauthorized 3rd party access; ability to destroy data on lost/stolen devices
Source-based encryption: Encrypting your files before they are sent to the cloud. This in addition to TLS/SSL in-transit encryption.
Private encryption key management: The ability to control your encryption keys exclusively, preventing service provider staff and other 3rd parties from accessing your files when stored in the cloud.
Password policy enforcement: Ability to enforce use of strong passwords and password expiration period on users.
2-factor authentication: Ability to require 2-factor authentication (via email) for account/device activation as well as shared links access.
Data integrity checks: Preventing ‘man in the middle’ attacks and tampering with your files by ensuring that the data that arrived in the cloud is the same data that left your device. This is typically done using hashes or fingerprinting such as the SHA-1 standard.
Password Policy & Strength Enforcement – allows administrators to set password policies to ensure rotational passwords are used over time, reducing the opportunity for impersonation.
Malware Detection & Prevention
Data Loss Prevention Software (DLP)
http://www.ctera.com/products/technology/end-to-end-security