SlideShare a Scribd company logo
1 of 26
© 2016 TeraGo Networks Inc. 1© 2016 TeraGo Networks Inc. 29 September 2016
© 2016 TeraGo Networks Inc. 2
Abstract
Your employees – and your company data – are on the go every day. As a
result, your employees are relying on the use of 3rd party online services
without IT approval – that is Shadow IT in your own organization. That’s some
risky business. Where in the world is your Corporate Data?
With TeraGo Cloud Drive we are giving you back control of your most
valuable asset, your data.
In this webinar you will learn about:
1. How Shadow IT is picking up velocity due to the accessibility and ease of cloud
applications
2. Consequences of weak corporate security mechanisms
3. How to give your IT department control of your data and its’ security
© 2016 TeraGo Networks Inc. 3
Logistics for today’s webinar
• This webinar will be recorded and can be found on our website (www.terago.ca)
• Please save your questions for the Q&A segment at the end of the webinar, but
feel free to use the Questions box to type out your questions during the session.
• Duration: 2:00-2:45 EST
Q&A: 2:45-3:00 EST
© 2016 TeraGo Networks Inc. 4
Today’s Speaker
Ashish Patel
Director, Cloud & Data Centre Services
TeraGo
@pateltech
https://ca.linkedin.com/in/ashishipatel
© 2016 TeraGo Networks Inc. 5
Corporat
e
HQ
Where in the World is Your Corporate Data?
Your employees – and corporate data – are on the move every day.
75
%
70% of employees using
personal devices to
access corporate data.
of the workforce is
mobile – avg. user
has 3.3 connected
devices.
53
seconds
More than 50% of laptops
stolen result in data
breaches.
Every
1 laptop is stolen.
>
50%
Attacks can happen in
less than 2 seconds.
of WiFi networks
are susceptible to
abuse.
50%
Within the next 3-4
years.
of corporate data
will reside outside
the corporate DC.
Sources: Gartner, 2014. Slideshare.net. Tabtimes.com
© 2016 TeraGo Networks Inc. 6
Where in the World is Your Corporate Data?
Your employees – and corporate data – are on the move every day.
Corporat
e
HQ
72
%
Even though 77% of
companies prohibit this
use.
of employees use
file sharing
services for work
purposes.
70
%
Exacerbated by 66% of
employees save corporate
files on USB media.
of sensitive
information is lost
on USB drives.
Sources: Gartner, 2014. Slideshare.net. Tabtimes.com
© 2016 TeraGo Networks Inc. 7
Time to take a
quick poll…
© 2016 TeraGo Networks Inc. 8
Corporat
e
HQ
Cloud is Transforming The Enterprise
• The cloud is challenging every aspect of how organizations deal with user file storage,
collaboration, office storage and data protection
• Organizations are now looking for smarter, less expensive tools that make them more agile IT-as-
a-Service providers
• Anymore, users are looking for apps and cloud-integrated services that redefine both economics
and service levels in the enterprise
Cloud
Storage
Home Directories NAS
Data Protection Tape
Yesterday Today
File, Sync, & Share
Branch Storage Servers
Collaboration ECM
Replace
Legacy Servers
Data
Sovereignty
Eliminate
‘Shadow IT’
© 2016 TeraGo Networks Inc. 9
Shadow IT
Used without IT approval or
policy applied.
© 2016 TeraGo Networks Inc. 10
IT departments commonly refer to any non-approved IT activity as “shadow IT”, which is
picking up velocity due to the accessibility and ease of cloud applications.
Source: Stratecast and McAfee
Sound familiar?
© 2016 TeraGo Networks Inc. 11
Time to take a
quick poll…
© 2016 TeraGo Networks Inc. 12
Business and IT need to work more closely - and faster
1. Technology decisions don’t have to
take months of analysis and
planning. But neither should they be
made in isolation.
2. Need a common language between
the business and IT – a shared plan
and vision of the digital future.
3. A simple visual model is the easiest
way to get everyone on board. The
goal is to quickly set the direction,
not the destination, so work can start
quickly.
Source: LinkedIn User David Reiss
© 2016 TeraGo Networks Inc. 13
BYOD, Data Control, Data Loss, and Enforcing Security Policies are key
factors that obstruct confidential information management in companies.
Control Data Loss BYOD Security
Information grows.
More volume.
Shared more.
The exchange of
documentation
through “public
clouds” increases.
More document
sharing through
mobile devices,
especially BYOD.
Data protection and
privacy regulations
become more strict.
½ of firms supporting BYOD report data breaches.
Sources: Symantec & PwC
© 2016 TeraGo Networks Inc. 14
Corporate BYOD security mechanisms are weak as more and more critical documents are leaving the
security perimeter of the company to locations and devices outside of IT Department’s control.
Sources: BMC Software
© 2016 TeraGo Networks Inc. 15
Left to the personal device, employees will draw on “Shadow IT”
and use the easiest means available to meet share their files.
Sources: Osterman Research Inc.
© 2016 TeraGo Networks Inc. 16
These data breaches have a wide array of ramifications to your
business, beyond financial losses as well.
Sources: Symantec, PwC, Network Computing.com
© 2016 TeraGo Networks Inc. 17
Current and former employees are among the most common
estimated source of security incidents
Sources: Symantec, PwC, Network Computing.com
© 2016 TeraGo Networks Inc. 18© 2016 TeraGo Networks Inc. 29 September 2016
TeraGo Cloud Drive
A simple, secure data storage and collaboration service that enables workforce
mobility, Bring-Your-Own-Device, and collaboration while maintaining IT control.
© 2016 TeraGo Networks Inc. 19
TeraGo Cloud Drive overview
Supported OS
A simple, secure data storage and collaboration service that enables
workforce mobility, Bring-Your-Own-Device, and collaboration while
maintaining IT control.
• Meets Enterprise security standards for data management.
• Equipped to adopt corporate IT policies and controls.
• Supports file versioning and synchronization for on major
platforms.
• Deployed and protected by TeraGo Tier 3 datacenters in
Canada.
• Sync across laptops, desktops, mobile
devices & servers
• Sync multiple folders and pre-existing
folders
• File versioning
• Integration support - AD and LDAP Single-
Sign On, and Microsoft Outlook
• Source-based AES encryption of data at-
rest, in-flight
• 2-factor authentication for file invitations
• Device lock and wipe tools
• Multi-profile support: one desktop, many
users
Feature highlights:
© 2016 TeraGo Networks Inc. 21
TeraGo Cloud Drive vs The Competition
© 2016 TeraGo Networks Inc. 22
Value for the IT Manager
Full Multi-
Tenancy
Support with
emphasis on
customer
segregation
Ability deploy
and customize
their own IT
policies to
corporate
requirements
Simple
integration into
existing IT
infrastructure
Multi-Device
and App
support on all
major platforms
All data resided
in TeraGo Tier
3 Canadian
Data Centers
Leading
Security
Features
© 2016 TeraGo Networks Inc. 23
Value for the Chief Security Officer
Source-based encryption
Encrypting your files before they are sent to
the cloud. This in addition to TLS/SSL in-transit
encryption.
Private encryption key
management
Control your encryption keys exclusively,
preventing provider from accessing your files
when stored in the cloud.
Password policy enforcement
Ability to enforce use of strong passwords and
expiration period on users. Allows
administrators to set password policies to
ensure rotational passwords are used,
reducing the chance for impersonation.
2-factor authentication
Ability to require 2-factor authentication (via
email) for account/device activation as well as
shared links access.
Data integrity checks
Preventing ‘man in the middle’ attacks and file
tampering using hashes or fingerprinting such
as the SHA-1 standard.
Physical Security
Data is fully protected in TeraGo Tier 3,
SSAE16 Compliant Data Centers with 24/7
video monitoring and manned security.
© 2016 TeraGo Networks Inc. 24
Value for the End-User
Self-
Provisioned
Collaboration
Workspace
Ability to
collaborate
externally, with
appropriate
security
controls
Work Anywhere
Sync files from
laptops, phones,
and tablets via
agents and
mobile apps
Retain all
synced files
from current
and past users
Large file
support (no
limit on
individual file
size)
Built-in version
control,
eliminate need
to save multiple
files
© 2016 TeraGo Networks Inc. 25
Time to take a
quick poll…
© 2016 TeraGo Networks Inc. 26
Q&A
© 2016 TeraGo Networks Inc. 27
Let’s Connect!
@TeraGo_Netwo
rks
TeraGo
bit.ly/2du5L5e
www.terago.c
a 1.866.TERAGO.
1

More Related Content

What's hot

DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudForcepoint LLC
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldElastica Inc.
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Big security for_big_data
Big security for_big_dataBig security for_big_data
Big security for_big_dataShyam Sarkar
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
netskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdfnetskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdftest888649
 
Symantec 2011 Social Media Protection Flash Poll Global Results
Symantec 2011 Social Media Protection Flash Poll Global ResultsSymantec 2011 Social Media Protection Flash Poll Global Results
Symantec 2011 Social Media Protection Flash Poll Global ResultsSymantec
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud IdentityNetIQ
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for SlackSachin Yadav
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2016
 

What's hot (20)

DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Big security for_big_data
Big security for_big_dataBig security for_big_data
Big security for_big_data
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
netskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdfnetskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdf
 
Symantec 2011 Social Media Protection Flash Poll Global Results
Symantec 2011 Social Media Protection Flash Poll Global ResultsSymantec 2011 Social Media Protection Flash Poll Global Results
Symantec 2011 Social Media Protection Flash Poll Global Results
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
DLP
DLPDLP
DLP
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for Slack
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 

Similar to Where in the world is your Corporate data?

Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
Thailand Business with the Cloud Service
Thailand Business with  the Cloud ServiceThailand Business with  the Cloud Service
Thailand Business with the Cloud ServiceIMC Institute
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloudFREVVO
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption publicJohn Mathon
 
The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityMarkLogic
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud ComputingIMC Institute
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataHybrid Cloud
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Storage Switzerland
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...Arbp Worldwide
 

Similar to Where in the world is your Corporate data? (20)

Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Thailand Business with the Cloud Service
Thailand Business with  the Cloud ServiceThailand Business with  the Cloud Service
Thailand Business with the Cloud Service
 
Trends in IoT 2017
Trends in IoT 2017Trends in IoT 2017
Trends in IoT 2017
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption public
 
The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data Security
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud Computing
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented data
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 

More from Ashish Patel

Thinking In Cloud Native
Thinking In Cloud NativeThinking In Cloud Native
Thinking In Cloud NativeAshish Patel
 
American Marketing Association, Legendary Leadership Series: Think like a sof...
American Marketing Association, Legendary Leadership Series: Think like a sof...American Marketing Association, Legendary Leadership Series: Think like a sof...
American Marketing Association, Legendary Leadership Series: Think like a sof...Ashish Patel
 
Digital is more than just technology
Digital is more than just technologyDigital is more than just technology
Digital is more than just technologyAshish Patel
 
Digital Transformation: Embracing a Growth Mindset
Digital Transformation: Embracing a Growth MindsetDigital Transformation: Embracing a Growth Mindset
Digital Transformation: Embracing a Growth MindsetAshish Patel
 
Can your business survive the next disaster?
Can your business survive the next disaster?Can your business survive the next disaster?
Can your business survive the next disaster?Ashish Patel
 
DevOps and the Enterprise Cloud
DevOps and the Enterprise CloudDevOps and the Enterprise Cloud
DevOps and the Enterprise CloudAshish Patel
 
TeraGo Corporate Services Overview
TeraGo Corporate Services OverviewTeraGo Corporate Services Overview
TeraGo Corporate Services OverviewAshish Patel
 
IBM Cloud OpenStack Services
IBM Cloud OpenStack ServicesIBM Cloud OpenStack Services
IBM Cloud OpenStack ServicesAshish Patel
 
IBM Corporate Services Corps - Experience in Malaysia
IBM Corporate Services Corps - Experience in MalaysiaIBM Corporate Services Corps - Experience in Malaysia
IBM Corporate Services Corps - Experience in MalaysiaAshish Patel
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
IBM Rational AppScan Technical Overview
IBM Rational AppScan Technical OverviewIBM Rational AppScan Technical Overview
IBM Rational AppScan Technical OverviewAshish Patel
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewAshish Patel
 
Application Response Measurement (ARM) based Monitoring for Eclipse
Application Response Measurement (ARM) based Monitoring for EclipseApplication Response Measurement (ARM) based Monitoring for Eclipse
Application Response Measurement (ARM) based Monitoring for EclipseAshish Patel
 
IBM Performance Optimizaiton Toolkit for Rational Performance Tester
IBM Performance Optimizaiton Toolkit for Rational Performance TesterIBM Performance Optimizaiton Toolkit for Rational Performance Tester
IBM Performance Optimizaiton Toolkit for Rational Performance TesterAshish Patel
 
IBM Performance Optimizaiton Toolkit for Rational Application Developer
IBM Performance Optimizaiton Toolkit for Rational Application DeveloperIBM Performance Optimizaiton Toolkit for Rational Application Developer
IBM Performance Optimizaiton Toolkit for Rational Application DeveloperAshish Patel
 
Using and Extending the Eclipse Test and Performance Tools Platform (TPTP) fo...
Using and Extending the Eclipse Test and Performance Tools Platform (TPTP) fo...Using and Extending the Eclipse Test and Performance Tools Platform (TPTP) fo...
Using and Extending the Eclipse Test and Performance Tools Platform (TPTP) fo...Ashish Patel
 

More from Ashish Patel (16)

Thinking In Cloud Native
Thinking In Cloud NativeThinking In Cloud Native
Thinking In Cloud Native
 
American Marketing Association, Legendary Leadership Series: Think like a sof...
American Marketing Association, Legendary Leadership Series: Think like a sof...American Marketing Association, Legendary Leadership Series: Think like a sof...
American Marketing Association, Legendary Leadership Series: Think like a sof...
 
Digital is more than just technology
Digital is more than just technologyDigital is more than just technology
Digital is more than just technology
 
Digital Transformation: Embracing a Growth Mindset
Digital Transformation: Embracing a Growth MindsetDigital Transformation: Embracing a Growth Mindset
Digital Transformation: Embracing a Growth Mindset
 
Can your business survive the next disaster?
Can your business survive the next disaster?Can your business survive the next disaster?
Can your business survive the next disaster?
 
DevOps and the Enterprise Cloud
DevOps and the Enterprise CloudDevOps and the Enterprise Cloud
DevOps and the Enterprise Cloud
 
TeraGo Corporate Services Overview
TeraGo Corporate Services OverviewTeraGo Corporate Services Overview
TeraGo Corporate Services Overview
 
IBM Cloud OpenStack Services
IBM Cloud OpenStack ServicesIBM Cloud OpenStack Services
IBM Cloud OpenStack Services
 
IBM Corporate Services Corps - Experience in Malaysia
IBM Corporate Services Corps - Experience in MalaysiaIBM Corporate Services Corps - Experience in Malaysia
IBM Corporate Services Corps - Experience in Malaysia
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
IBM Rational AppScan Technical Overview
IBM Rational AppScan Technical OverviewIBM Rational AppScan Technical Overview
IBM Rational AppScan Technical Overview
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product Overview
 
Application Response Measurement (ARM) based Monitoring for Eclipse
Application Response Measurement (ARM) based Monitoring for EclipseApplication Response Measurement (ARM) based Monitoring for Eclipse
Application Response Measurement (ARM) based Monitoring for Eclipse
 
IBM Performance Optimizaiton Toolkit for Rational Performance Tester
IBM Performance Optimizaiton Toolkit for Rational Performance TesterIBM Performance Optimizaiton Toolkit for Rational Performance Tester
IBM Performance Optimizaiton Toolkit for Rational Performance Tester
 
IBM Performance Optimizaiton Toolkit for Rational Application Developer
IBM Performance Optimizaiton Toolkit for Rational Application DeveloperIBM Performance Optimizaiton Toolkit for Rational Application Developer
IBM Performance Optimizaiton Toolkit for Rational Application Developer
 
Using and Extending the Eclipse Test and Performance Tools Platform (TPTP) fo...
Using and Extending the Eclipse Test and Performance Tools Platform (TPTP) fo...Using and Extending the Eclipse Test and Performance Tools Platform (TPTP) fo...
Using and Extending the Eclipse Test and Performance Tools Platform (TPTP) fo...
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Where in the world is your Corporate data?

  • 1. © 2016 TeraGo Networks Inc. 1© 2016 TeraGo Networks Inc. 29 September 2016
  • 2. © 2016 TeraGo Networks Inc. 2 Abstract Your employees – and your company data – are on the go every day. As a result, your employees are relying on the use of 3rd party online services without IT approval – that is Shadow IT in your own organization. That’s some risky business. Where in the world is your Corporate Data? With TeraGo Cloud Drive we are giving you back control of your most valuable asset, your data. In this webinar you will learn about: 1. How Shadow IT is picking up velocity due to the accessibility and ease of cloud applications 2. Consequences of weak corporate security mechanisms 3. How to give your IT department control of your data and its’ security
  • 3. © 2016 TeraGo Networks Inc. 3 Logistics for today’s webinar • This webinar will be recorded and can be found on our website (www.terago.ca) • Please save your questions for the Q&A segment at the end of the webinar, but feel free to use the Questions box to type out your questions during the session. • Duration: 2:00-2:45 EST Q&A: 2:45-3:00 EST
  • 4. © 2016 TeraGo Networks Inc. 4 Today’s Speaker Ashish Patel Director, Cloud & Data Centre Services TeraGo @pateltech https://ca.linkedin.com/in/ashishipatel
  • 5. © 2016 TeraGo Networks Inc. 5 Corporat e HQ Where in the World is Your Corporate Data? Your employees – and corporate data – are on the move every day. 75 % 70% of employees using personal devices to access corporate data. of the workforce is mobile – avg. user has 3.3 connected devices. 53 seconds More than 50% of laptops stolen result in data breaches. Every 1 laptop is stolen. > 50% Attacks can happen in less than 2 seconds. of WiFi networks are susceptible to abuse. 50% Within the next 3-4 years. of corporate data will reside outside the corporate DC. Sources: Gartner, 2014. Slideshare.net. Tabtimes.com
  • 6. © 2016 TeraGo Networks Inc. 6 Where in the World is Your Corporate Data? Your employees – and corporate data – are on the move every day. Corporat e HQ 72 % Even though 77% of companies prohibit this use. of employees use file sharing services for work purposes. 70 % Exacerbated by 66% of employees save corporate files on USB media. of sensitive information is lost on USB drives. Sources: Gartner, 2014. Slideshare.net. Tabtimes.com
  • 7. © 2016 TeraGo Networks Inc. 7 Time to take a quick poll…
  • 8. © 2016 TeraGo Networks Inc. 8 Corporat e HQ Cloud is Transforming The Enterprise • The cloud is challenging every aspect of how organizations deal with user file storage, collaboration, office storage and data protection • Organizations are now looking for smarter, less expensive tools that make them more agile IT-as- a-Service providers • Anymore, users are looking for apps and cloud-integrated services that redefine both economics and service levels in the enterprise Cloud Storage Home Directories NAS Data Protection Tape Yesterday Today File, Sync, & Share Branch Storage Servers Collaboration ECM Replace Legacy Servers Data Sovereignty Eliminate ‘Shadow IT’
  • 9. © 2016 TeraGo Networks Inc. 9 Shadow IT Used without IT approval or policy applied.
  • 10. © 2016 TeraGo Networks Inc. 10 IT departments commonly refer to any non-approved IT activity as “shadow IT”, which is picking up velocity due to the accessibility and ease of cloud applications. Source: Stratecast and McAfee Sound familiar?
  • 11. © 2016 TeraGo Networks Inc. 11 Time to take a quick poll…
  • 12. © 2016 TeraGo Networks Inc. 12 Business and IT need to work more closely - and faster 1. Technology decisions don’t have to take months of analysis and planning. But neither should they be made in isolation. 2. Need a common language between the business and IT – a shared plan and vision of the digital future. 3. A simple visual model is the easiest way to get everyone on board. The goal is to quickly set the direction, not the destination, so work can start quickly. Source: LinkedIn User David Reiss
  • 13. © 2016 TeraGo Networks Inc. 13 BYOD, Data Control, Data Loss, and Enforcing Security Policies are key factors that obstruct confidential information management in companies. Control Data Loss BYOD Security Information grows. More volume. Shared more. The exchange of documentation through “public clouds” increases. More document sharing through mobile devices, especially BYOD. Data protection and privacy regulations become more strict. ½ of firms supporting BYOD report data breaches. Sources: Symantec & PwC
  • 14. © 2016 TeraGo Networks Inc. 14 Corporate BYOD security mechanisms are weak as more and more critical documents are leaving the security perimeter of the company to locations and devices outside of IT Department’s control. Sources: BMC Software
  • 15. © 2016 TeraGo Networks Inc. 15 Left to the personal device, employees will draw on “Shadow IT” and use the easiest means available to meet share their files. Sources: Osterman Research Inc.
  • 16. © 2016 TeraGo Networks Inc. 16 These data breaches have a wide array of ramifications to your business, beyond financial losses as well. Sources: Symantec, PwC, Network Computing.com
  • 17. © 2016 TeraGo Networks Inc. 17 Current and former employees are among the most common estimated source of security incidents Sources: Symantec, PwC, Network Computing.com
  • 18. © 2016 TeraGo Networks Inc. 18© 2016 TeraGo Networks Inc. 29 September 2016 TeraGo Cloud Drive A simple, secure data storage and collaboration service that enables workforce mobility, Bring-Your-Own-Device, and collaboration while maintaining IT control.
  • 19. © 2016 TeraGo Networks Inc. 19 TeraGo Cloud Drive overview Supported OS A simple, secure data storage and collaboration service that enables workforce mobility, Bring-Your-Own-Device, and collaboration while maintaining IT control. • Meets Enterprise security standards for data management. • Equipped to adopt corporate IT policies and controls. • Supports file versioning and synchronization for on major platforms. • Deployed and protected by TeraGo Tier 3 datacenters in Canada. • Sync across laptops, desktops, mobile devices & servers • Sync multiple folders and pre-existing folders • File versioning • Integration support - AD and LDAP Single- Sign On, and Microsoft Outlook • Source-based AES encryption of data at- rest, in-flight • 2-factor authentication for file invitations • Device lock and wipe tools • Multi-profile support: one desktop, many users Feature highlights:
  • 20. © 2016 TeraGo Networks Inc. 21 TeraGo Cloud Drive vs The Competition
  • 21. © 2016 TeraGo Networks Inc. 22 Value for the IT Manager Full Multi- Tenancy Support with emphasis on customer segregation Ability deploy and customize their own IT policies to corporate requirements Simple integration into existing IT infrastructure Multi-Device and App support on all major platforms All data resided in TeraGo Tier 3 Canadian Data Centers Leading Security Features
  • 22. © 2016 TeraGo Networks Inc. 23 Value for the Chief Security Officer Source-based encryption Encrypting your files before they are sent to the cloud. This in addition to TLS/SSL in-transit encryption. Private encryption key management Control your encryption keys exclusively, preventing provider from accessing your files when stored in the cloud. Password policy enforcement Ability to enforce use of strong passwords and expiration period on users. Allows administrators to set password policies to ensure rotational passwords are used, reducing the chance for impersonation. 2-factor authentication Ability to require 2-factor authentication (via email) for account/device activation as well as shared links access. Data integrity checks Preventing ‘man in the middle’ attacks and file tampering using hashes or fingerprinting such as the SHA-1 standard. Physical Security Data is fully protected in TeraGo Tier 3, SSAE16 Compliant Data Centers with 24/7 video monitoring and manned security.
  • 23. © 2016 TeraGo Networks Inc. 24 Value for the End-User Self- Provisioned Collaboration Workspace Ability to collaborate externally, with appropriate security controls Work Anywhere Sync files from laptops, phones, and tablets via agents and mobile apps Retain all synced files from current and past users Large file support (no limit on individual file size) Built-in version control, eliminate need to save multiple files
  • 24. © 2016 TeraGo Networks Inc. 25 Time to take a quick poll…
  • 25. © 2016 TeraGo Networks Inc. 26 Q&A
  • 26. © 2016 TeraGo Networks Inc. 27 Let’s Connect! @TeraGo_Netwo rks TeraGo bit.ly/2du5L5e www.terago.c a 1.866.TERAGO. 1

Editor's Notes

  1. Your employees – and your company data – are on the go every day. As a result, your employees are relying on the use of 3rd party online services without IT approval – that is Shadow IT in your own organization. That’s some risky business. Where in the world is your Corporate Data? With TeraGo Cloud Drive we are giving you back control of your most valuable asset, your data. In this webinar you will learn about: How Shadow IT is picking up velocity due to the accessibility and ease of cloud applications Consequences of weak corporate security mechanisms How to give your IT department control of your data and its’ security
  2. The cloud is challenging every aspect of how organizations deal with user file storage, collaboration, office storage and data protection Organizations are now looking for smarter, less expensive tools that make them more agile IT-as-a-Service providers Anymore, users are looking for apps and cloud-integrated services that redefine both economics and service levels in the enterprise
  3. Shadow IT is a term often used to describe information-technology systems and solutions built and used inside organizations without explicit organizational approval. It is also used, along with the term "Stealth IT", to describe solutions specified and deployed by departments other than the IT department.
  4. http://blog.caspio.com/paas-in-action/transform-shadow-it-into-innovation-using-caspio/
  5. Company data is moving outside the corporate firewall at a rapid pace, and that trend is only going to continue. IT managers need to maintain control of that data anywhere, and at all times. http://thumbnails-visually.netdna-ssl.com/the-nightmare-of-securing-your-unstructured-data-in-the-era-of-the-borderless-enterprise_519ea836dc271_w1500.png
  6. Capabilities include : Two-factor authentication that provides strong controls on who can access the service Remote data shredding to ensure there no possibility of data getting into the wrong hands after the loss of a device Strong controls on passwords Audit trails to ensure compliance Admin-defined policies on what can be uploaded and shared And– the best approach to managing your encryption keys – you generate and own your keys, no 3rd party is involved in any aspect of the encryption process Source-based encryption: Encrypting your files before they are sent to the cloud. This in addition to TLS/SSL in-transit encryption. Private encryption key management: The ability to control your encryption keys exclusively, preventing service provider staff and other 3rd parties from accessing your files when stored in the cloud. Password policy enforcement: Ability to enforce use of strong passwords and password expiration period on users. 2-factor authentication: Ability to require 2-factor authentication (via email) for account/device activation as well as shared links access. Data integrity checks: Preventing ‘man in the middle’ attacks and tampering with your files by ensuring that the data that arrived in the cloud is the same data that left your device. This is typically done using hashes or fingerprinting such as the SHA-1 standard. Password Policy & Strength Enforcement – allows administrators to set password policies to ensure rotational passwords are used over time, reducing the opportunity for impersonation. Malware Detection & Prevention  Data Loss Prevention Software (DLP) http://www.ctera.com/products/technology/end-to-end-security
  7. IT Manager Ability to choose vendor and management services to integrate into existing IT infrastructure Key Value Propositions: Toolset for internal data management; seamless integration into existing environment; ability to manage/monitor usage
  8. Corporate Security Officer Ability to accept/reject IT services based on adherence to corporate security policies Key Value Propositions: Ability to protect corporate IP information via encryption; prevent unauthorized 3rd party access; ability to destroy data on lost/stolen devices Source-based encryption: Encrypting your files before they are sent to the cloud. This in addition to TLS/SSL in-transit encryption. Private encryption key management: The ability to control your encryption keys exclusively, preventing service provider staff and other 3rd parties from accessing your files when stored in the cloud. Password policy enforcement: Ability to enforce use of strong passwords and password expiration period on users. 2-factor authentication: Ability to require 2-factor authentication (via email) for account/device activation as well as shared links access. Data integrity checks: Preventing ‘man in the middle’ attacks and tampering with your files by ensuring that the data that arrived in the cloud is the same data that left your device. This is typically done using hashes or fingerprinting such as the SHA-1 standard. Password Policy & Strength Enforcement – allows administrators to set password policies to ensure rotational passwords are used over time, reducing the opportunity for impersonation. Malware Detection & Prevention  Data Loss Prevention Software (DLP) http://www.ctera.com/products/technology/end-to-end-security