SlideShare a Scribd company logo
Enable Secure Mobile & Cloud Collaboration
(ISC)2 Secure Seattle 2013, Security Transcends Technology
Rama Kolappan, Mobile Director, Accellion.
Confidential
Accellion - Snapshot
• Founded 1999
• Headquartered in Palo Alto, CA
• 1,700+ Enterprise Customers
• 11+ Million Enterprise Users
• Secure Mobile File Sharing Solutions
2
Confidential 3
Accellion Customers
Confidential 4
The Problem:
Sharing Enterprise Content Securely in the New iPad Era
The New Reality
• Proliferation of mobile devices and
tablets, led by the iPad.
• Difficulties accessing enterprise
content on mobile devices.
• Easy access to free cloud-based apps.
• Consumerization of IT creating security
challenges.
Confidential 5
Terms of Service: Google Drive
http://www.google.com/intl/en/policies/terms/
"When you upload or otherwise submit content to our
Services, you give Google (and those we work with) a worldwide
license to use, host, store, reproduce, modify, create derivative
works (such as those resulting from translations, adaptations or
other changes we make so that your content works better with
our Services), communicate, publish, publicly perform, publicly
display and distribute such content. The rights you grant in this
license are for the limited purpose of operating, promoting, and
improving our Services, and to develop new ones. This license
continues even if you stop using our Services…”
Confidential 6
A New Population of Mobile Workers
Confidential 7
Productivity Gains from Mobility
Confidential 8
Mobile Productivity Challenges
Security and Data
Leaks
Enterprise data leaks
while moving data
across 3rd party apps
using open-in and
save back
Integrated
Productivity Solution
Only access and view
content. Not able to
create and edit content
securely as an
integrated solution
Collaboration and
Sharing
Collaborate and share
newly created and
edited documents
securely
Confidential 9
What Does BYOD Look Like?
Confidential 10
What Does BYOD Feel Like?
Confidential 11
The BYOD Challenge
How to make
enterprise content
accessible on
mobile devices while
maintaining control
and security?
Confidential 12
Enterprise Mobility Management
Mobile
Device
Management
Mobile
Application
Management
Mobile
Content
Management
Confidential 13
Choosing MDM/MAM Partner
Wrapped vs SDK based solutions
• Wrapped applications enforce following user
polices:
• Cut, Copy, and Paste
• Printing
• Screen Shot Snapshots
• Open-In
• SDK based MDM/MAM APIs
• Authorization and SSO
• Encrypting Data at rest and In-Transit
• Interoperability communication between applications
• Open-In (Whitelisting and Blacklisting)
Confidential 14
Avoiding BYOD Disaster
• Support iOS, Android, and Blackberry devices.
• Support user self-provisioning.
• Provide access to enterprise content stores.
• Provide approved apps.
Enable
• Implement encryption of data at rest and in transit.
• Support remote wipe.
• Integrate user authentication, SSO, Auto credentials
(LDAP, AD).
• Deploy secure cloud data storage.
Secure
• Provide configurable user permissions.
• Ensure comprehensive file tracking and reporting.
• Ensure auditable reports for demonstrating
compliance.
• Manage user policies and profiles.
Manage
15
Cloud Deployment Options
Private
On-Premise
Private
Hosted
Public
Multi-Tenant
• Virtual appliance
• Full control
• Full security, compliance
• Single-tenant
• Secure
• Cloud agility
• Multi-tenant
• Cloud agility
Confidential 16
Security Controls
Enterprise Security
• Anti-Virus
• Data Loss Prevention
• Restricted Admin Access to Content
Authentication / Authorization
• SSO with SAML / OAuth / Kerberos
• Multi-LDAP and AD integration
• Two-Factor Authentication
• Password Policies
• RBAC
Encryption
• Encryption – Data at Rest and
in Motion
• Encryption Strength
• Ownership of Encryption Keys
• FIPS 140-2 Certification
Mobile Security
• Secure Mobile Container
• Whitelisted Helper Applications
• Server Side Viewing
• Remote Wipe
• Offline PIN
Confidential 17
Integrating Enterprise Infrastructure
Mobile Device Management, Mobile Application Management
Enterprise multi-LDAP, Active Directory and AD Groups
Single Sign-On (SAML, OAuth, Kerberos)
Strong Authentication
Mobile Productivity
FTP and SMTP
APIs and Customizations
Confidential 18
Secure Mobile Productivity
• Create and edit content
securely, without the risk
of data leaks during
transit across 3rd party
apps
• Private cloud – Create,
edit and access content
from private cloud with
Accellion Mobile
Productivity Suite
• Content encrypted in
transit and at rest;
content expiration
supported
Confidential 19
Secure Mobile Workflow
• Mobilize existing content
• Internal/external sharing
• Unified access to all content
• No duplication of content
• Centralized control
Confidential 20
Tips for Avoiding BYOD Disaster
• Support multiple mobile platforms
• Extend security to every file and device
• Integrate secure productivity capabilities
• Select private cloud for maximum data security
• Connect to enterprise content management systems
• Deploy anti-virus to keep the malware out
• Integrate DLP to keep the data in
• Block consumer-class services
Accellion provides enterprise-class mobile file sharing
solutions that enable secure anytime, anywhere access to
information while ensuring enterprise security and
compliance.
The world’s leading corporations and government agencies
select Accellion to protect intellectual property, ensure
compliance, improve business productivity and reduce IT
cost.
Learn more about Accellion here: www.accellion.com
Connect with Accellion here:
About Accellion

More Related Content

What's hot

4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + Security4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + Security
Chris Roche
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part II
Proofpoint
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
David J Rosenthal
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
Symantec
 
Norton Zone File-Sharing Service
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing Service
Symantec
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
Kris Wagner
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6
Bartosz Bredy
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
Porticor - The Cloud Security Experts
 
Enterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom VerosyncEnterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom Verosync
BiscomMarketing
 
Cloud Computing & Privacy Protection
Cloud Computing & Privacy ProtectionCloud Computing & Privacy Protection
Cloud Computing & Privacy ProtectionIgor Zboran
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
ashoksankar
 
Laptop management
Laptop managementLaptop management
Laptop management
Killian Delaney
 
Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018
Albert Hoitingh
 
CollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's newCollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's new
Albert Hoitingh
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
David Strom
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
IBM Danmark
 
Next Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud TrustNext Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud Trust
Microsoft Education AU
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
Chief Optimist
 
Endpoint and mobile security
Endpoint and mobile securityEndpoint and mobile security
Endpoint and mobile security
Ken Van Hasselt
 
How to keep track of cloud costs
How to keep track of cloud costsHow to keep track of cloud costs
How to keep track of cloud costs
David Strom
 

What's hot (20)

4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + Security4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + Security
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part II
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Norton Zone File-Sharing Service
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing Service
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
Enterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom VerosyncEnterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom Verosync
 
Cloud Computing & Privacy Protection
Cloud Computing & Privacy ProtectionCloud Computing & Privacy Protection
Cloud Computing & Privacy Protection
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018
 
CollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's newCollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's new
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
 
Next Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud TrustNext Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud Trust
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
Endpoint and mobile security
Endpoint and mobile securityEndpoint and mobile security
Endpoint and mobile security
 
How to keep track of cloud costs
How to keep track of cloud costsHow to keep track of cloud costs
How to keep track of cloud costs
 

Similar to Enable Secure Mobile & Cloud Collaboration

Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
Proofpoint
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Proofpoint
 
Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scripted
Nuno Alves
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
PT Datacomm Diangraha
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
gule mariam
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Security
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
xKinAnx
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
BlackBerry
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
Andris Soroka
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerWSO2
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
CloudIDSummit
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Indus Khaitan
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
Ron Favali
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
IBM Security
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
BlackBerry
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
MobileIron
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 

Similar to Enable Secure Mobile & Cloud Collaboration (20)

Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scripted
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 

More from Proofpoint

You can wear it!
You can wear it!You can wear it!
You can wear it!
Proofpoint
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
Proofpoint
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
Proofpoint
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
Proofpoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
Proofpoint
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
Proofpoint
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
Proofpoint
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
Proofpoint
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
Proofpoint
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
Proofpoint
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
Proofpoint
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
Proofpoint
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityProofpoint
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
Proofpoint
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile PrintingProofpoint
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
Proofpoint
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
Proofpoint
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part I
Proofpoint
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud.
Proofpoint
 

More from Proofpoint (19)

You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part I
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud.
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Enable Secure Mobile & Cloud Collaboration

  • 1. Enable Secure Mobile & Cloud Collaboration (ISC)2 Secure Seattle 2013, Security Transcends Technology Rama Kolappan, Mobile Director, Accellion.
  • 2. Confidential Accellion - Snapshot • Founded 1999 • Headquartered in Palo Alto, CA • 1,700+ Enterprise Customers • 11+ Million Enterprise Users • Secure Mobile File Sharing Solutions 2
  • 4. Confidential 4 The Problem: Sharing Enterprise Content Securely in the New iPad Era The New Reality • Proliferation of mobile devices and tablets, led by the iPad. • Difficulties accessing enterprise content on mobile devices. • Easy access to free cloud-based apps. • Consumerization of IT creating security challenges.
  • 5. Confidential 5 Terms of Service: Google Drive http://www.google.com/intl/en/policies/terms/ "When you upload or otherwise submit content to our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content. The rights you grant in this license are for the limited purpose of operating, promoting, and improving our Services, and to develop new ones. This license continues even if you stop using our Services…”
  • 6. Confidential 6 A New Population of Mobile Workers
  • 8. Confidential 8 Mobile Productivity Challenges Security and Data Leaks Enterprise data leaks while moving data across 3rd party apps using open-in and save back Integrated Productivity Solution Only access and view content. Not able to create and edit content securely as an integrated solution Collaboration and Sharing Collaborate and share newly created and edited documents securely
  • 9. Confidential 9 What Does BYOD Look Like?
  • 10. Confidential 10 What Does BYOD Feel Like?
  • 11. Confidential 11 The BYOD Challenge How to make enterprise content accessible on mobile devices while maintaining control and security?
  • 12. Confidential 12 Enterprise Mobility Management Mobile Device Management Mobile Application Management Mobile Content Management
  • 13. Confidential 13 Choosing MDM/MAM Partner Wrapped vs SDK based solutions • Wrapped applications enforce following user polices: • Cut, Copy, and Paste • Printing • Screen Shot Snapshots • Open-In • SDK based MDM/MAM APIs • Authorization and SSO • Encrypting Data at rest and In-Transit • Interoperability communication between applications • Open-In (Whitelisting and Blacklisting)
  • 14. Confidential 14 Avoiding BYOD Disaster • Support iOS, Android, and Blackberry devices. • Support user self-provisioning. • Provide access to enterprise content stores. • Provide approved apps. Enable • Implement encryption of data at rest and in transit. • Support remote wipe. • Integrate user authentication, SSO, Auto credentials (LDAP, AD). • Deploy secure cloud data storage. Secure • Provide configurable user permissions. • Ensure comprehensive file tracking and reporting. • Ensure auditable reports for demonstrating compliance. • Manage user policies and profiles. Manage
  • 15. 15 Cloud Deployment Options Private On-Premise Private Hosted Public Multi-Tenant • Virtual appliance • Full control • Full security, compliance • Single-tenant • Secure • Cloud agility • Multi-tenant • Cloud agility
  • 16. Confidential 16 Security Controls Enterprise Security • Anti-Virus • Data Loss Prevention • Restricted Admin Access to Content Authentication / Authorization • SSO with SAML / OAuth / Kerberos • Multi-LDAP and AD integration • Two-Factor Authentication • Password Policies • RBAC Encryption • Encryption – Data at Rest and in Motion • Encryption Strength • Ownership of Encryption Keys • FIPS 140-2 Certification Mobile Security • Secure Mobile Container • Whitelisted Helper Applications • Server Side Viewing • Remote Wipe • Offline PIN
  • 17. Confidential 17 Integrating Enterprise Infrastructure Mobile Device Management, Mobile Application Management Enterprise multi-LDAP, Active Directory and AD Groups Single Sign-On (SAML, OAuth, Kerberos) Strong Authentication Mobile Productivity FTP and SMTP APIs and Customizations
  • 18. Confidential 18 Secure Mobile Productivity • Create and edit content securely, without the risk of data leaks during transit across 3rd party apps • Private cloud – Create, edit and access content from private cloud with Accellion Mobile Productivity Suite • Content encrypted in transit and at rest; content expiration supported
  • 19. Confidential 19 Secure Mobile Workflow • Mobilize existing content • Internal/external sharing • Unified access to all content • No duplication of content • Centralized control
  • 20. Confidential 20 Tips for Avoiding BYOD Disaster • Support multiple mobile platforms • Extend security to every file and device • Integrate secure productivity capabilities • Select private cloud for maximum data security • Connect to enterprise content management systems • Deploy anti-virus to keep the malware out • Integrate DLP to keep the data in • Block consumer-class services
  • 21. Accellion provides enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to information while ensuring enterprise security and compliance. The world’s leading corporations and government agencies select Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT cost. Learn more about Accellion here: www.accellion.com Connect with Accellion here: About Accellion