SlideShare a Scribd company logo
Nitin Kohli



Enterprise Collaboration
     Privacy & Security
     Privacy & Security 




       Nitin Kohli
AGENDA                   Nitin Kohli



• Basics

• Vision: The What?

• Process: The HOW?

• Tools

• Privacy and Security

• Other Considerations

• Other Examples
Privacy & Security                                            Nitin Kohli

 The following should be considered:
 The following should be considered:

 1. Secure Intranet
 • Consider using a VPN (virtual private network) to
    Consider using a VPN (virtual private network) to 
    protect "internal" information in transit. 
 • They would also access their "intranet" via this 
    technology. 
    technology
 • Many companies have moved toward SSL VPN or what 
    is called "clientless" VPN. 
 • SSL VPN i l
    SSL VPN simply requires a browser rather than creating 
                           i     b        th th        ti
    the administrative overhead of installing and 
    maintaining client VPN software. 
 • Results in cost savings.
Privacy & Security                                             Nitin Kohli



2. Administrative / Authentication Standards
• Single Sign On (SSO) alleviates the burden of employees 
   and security risk. 
     d             k
• Centralized user provisioning (and deprovisioning) tools 
   make creating and removing accounts, a simpler task. 
• Users passwords are essentially synchronized so they can 
   access all necessary business tools with one user ID and 
   password. 
• “Self‐help" modules can be used to reset passwords.
• Administrative costs savings associated with help desk 
   password resets. 
Privacy & Security                                            Nitin Kohli
3. Access Rights Management
•    Defines Access Control. 
•    The goal is to provide access to just what a person 
     needs to get their job done and nothing more. 
•    “Practice of least privilege". 

4. Interactions with Customers / Outer World
• To ensure information leakage doesn’t happen by 
   employees, additional training may be required.  


5.   Social Bookmarking 
•    It  builds community around topics of interest/role. 
•    Search/browse by tag and user
     Search/browse by tag and user
•    Search/browse the content of the comments 
•    Bookmark URL itself
•     Any search or cross‐correlation can be turned into a 
      Any search or cross correlation can be turned into a
     feed and used other ways (mashups).

More Related Content

What's hot

Identity Live London 2017 | Kenneth May
Identity Live London 2017 | Kenneth MayIdentity Live London 2017 | Kenneth May
Identity Live London 2017 | Kenneth May
ForgeRock
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
ForgeRock
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
ForgeRock
 
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2
 
Blockchain. Massimo Chiriatti, IBM
Blockchain. Massimo Chiriatti, IBMBlockchain. Massimo Chiriatti, IBM
Blockchain. Massimo Chiriatti, IBM
Data Driven Innovation
 
The lazy programmer`s way to secure application
The lazy programmer`s way to secure applicationThe lazy programmer`s way to secure application
The lazy programmer`s way to secure application
Lev Maltsev
 
CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
CloudIDSummit
 
Implementing eGov
Implementing eGovImplementing eGov
Implementing eGov
ForgeRock
 
OpenAM - An Introduction
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An Introduction
ForgeRock
 
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBMEnterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
Data Driven Innovation
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
David Strom
 
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital ServicesCustomer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
ForgeRock
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock
 
Pimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion UsersPimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion Users
ForgeRock
 
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
ForgeRock
 
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Mark Perry
 
Identity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBCIdentity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBC
ForgeRock
 
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity ServerWSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2
 
HSBC - ForgeRock Identity Summit 2017 Dusseldorf
HSBC - ForgeRock Identity Summit 2017 DusseldorfHSBC - ForgeRock Identity Summit 2017 Dusseldorf
HSBC - ForgeRock Identity Summit 2017 Dusseldorf
ForgeRock
 
Identity Management
Identity ManagementIdentity Management
Identity Management
Venkatesh Jambulingam
 

What's hot (20)

Identity Live London 2017 | Kenneth May
Identity Live London 2017 | Kenneth MayIdentity Live London 2017 | Kenneth May
Identity Live London 2017 | Kenneth May
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
 
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
 
Blockchain. Massimo Chiriatti, IBM
Blockchain. Massimo Chiriatti, IBMBlockchain. Massimo Chiriatti, IBM
Blockchain. Massimo Chiriatti, IBM
 
The lazy programmer`s way to secure application
The lazy programmer`s way to secure applicationThe lazy programmer`s way to secure application
The lazy programmer`s way to secure application
 
CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Implementing eGov
Implementing eGovImplementing eGov
Implementing eGov
 
OpenAM - An Introduction
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An Introduction
 
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBMEnterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital ServicesCustomer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Pimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion UsersPimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion Users
 
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
 
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
 
Identity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBCIdentity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBC
 
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity ServerWSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
 
HSBC - ForgeRock Identity Summit 2017 Dusseldorf
HSBC - ForgeRock Identity Summit 2017 DusseldorfHSBC - ForgeRock Identity Summit 2017 Dusseldorf
HSBC - ForgeRock Identity Summit 2017 Dusseldorf
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 

Viewers also liked

Enterprise Collaboration - 2
Enterprise Collaboration - 2Enterprise Collaboration - 2
Enterprise Collaboration - 2
Nitin Kohli
 
Enterprise Collaboration - 1
Enterprise Collaboration - 1Enterprise Collaboration - 1
Enterprise Collaboration - 1
Nitin Kohli
 
Trying to implement enterprise collaboration
Trying to implement enterprise collaborationTrying to implement enterprise collaboration
Trying to implement enterprise collaboration
Stephane Cheikh
 
Enterprise Collaboration -5
Enterprise Collaboration -5Enterprise Collaboration -5
Enterprise Collaboration -5
Nitin Kohli
 
Enterprise Collaboration - 3
Enterprise Collaboration - 3Enterprise Collaboration - 3
Enterprise Collaboration - 3
Nitin Kohli
 
Enterprise Collaboration Solutions
Enterprise Collaboration SolutionsEnterprise Collaboration Solutions
Enterprise Collaboration Solutions
Shreya Vishnoi
 
Making Enterprise Collaboration Work
Making Enterprise Collaboration WorkMaking Enterprise Collaboration Work
Making Enterprise Collaboration Work
Jacob Morgan
 
Making the Case for Social Collaboration in the Enterprise
Making the Case for Social Collaboration in the EnterpriseMaking the Case for Social Collaboration in the Enterprise
Making the Case for Social Collaboration in the Enterprise
Webtrends
 
Big Data and collaboration - Enterprise Digital Summit - Kimind - Miguel Memb...
Big Data and collaboration - Enterprise Digital Summit - Kimind - Miguel Memb...Big Data and collaboration - Enterprise Digital Summit - Kimind - Miguel Memb...
Big Data and collaboration - Enterprise Digital Summit - Kimind - Miguel Memb...
Miguel Membrado
 
Build an enterprise social collaboration strategy
Build an enterprise social collaboration strategyBuild an enterprise social collaboration strategy
Build an enterprise social collaboration strategy
Info-Tech Research Group
 
Tracxn Research: Enterprise Collaboration Landscape, August 2016
Tracxn Research: Enterprise Collaboration Landscape, August 2016Tracxn Research: Enterprise Collaboration Landscape, August 2016
Tracxn Research: Enterprise Collaboration Landscape, August 2016
Tracxn
 

Viewers also liked (11)

Enterprise Collaboration - 2
Enterprise Collaboration - 2Enterprise Collaboration - 2
Enterprise Collaboration - 2
 
Enterprise Collaboration - 1
Enterprise Collaboration - 1Enterprise Collaboration - 1
Enterprise Collaboration - 1
 
Trying to implement enterprise collaboration
Trying to implement enterprise collaborationTrying to implement enterprise collaboration
Trying to implement enterprise collaboration
 
Enterprise Collaboration -5
Enterprise Collaboration -5Enterprise Collaboration -5
Enterprise Collaboration -5
 
Enterprise Collaboration - 3
Enterprise Collaboration - 3Enterprise Collaboration - 3
Enterprise Collaboration - 3
 
Enterprise Collaboration Solutions
Enterprise Collaboration SolutionsEnterprise Collaboration Solutions
Enterprise Collaboration Solutions
 
Making Enterprise Collaboration Work
Making Enterprise Collaboration WorkMaking Enterprise Collaboration Work
Making Enterprise Collaboration Work
 
Making the Case for Social Collaboration in the Enterprise
Making the Case for Social Collaboration in the EnterpriseMaking the Case for Social Collaboration in the Enterprise
Making the Case for Social Collaboration in the Enterprise
 
Big Data and collaboration - Enterprise Digital Summit - Kimind - Miguel Memb...
Big Data and collaboration - Enterprise Digital Summit - Kimind - Miguel Memb...Big Data and collaboration - Enterprise Digital Summit - Kimind - Miguel Memb...
Big Data and collaboration - Enterprise Digital Summit - Kimind - Miguel Memb...
 
Build an enterprise social collaboration strategy
Build an enterprise social collaboration strategyBuild an enterprise social collaboration strategy
Build an enterprise social collaboration strategy
 
Tracxn Research: Enterprise Collaboration Landscape, August 2016
Tracxn Research: Enterprise Collaboration Landscape, August 2016Tracxn Research: Enterprise Collaboration Landscape, August 2016
Tracxn Research: Enterprise Collaboration Landscape, August 2016
 

Similar to Enterprise Collaboration - 4

How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
GlobalSign
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
TechSoup
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
Christina Azzam
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
Chris Haddad
 
Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?
Cyber Security Partners
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
Prof. Jacques Folon (Ph.D)
 
The user s identities
The user s identitiesThe user s identities
The user s identities
Giuliano Latini
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
Perficient, Inc.
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Cloud Security Alliance Lviv Chapter
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
Precisely
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
Precisely
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
Precisely
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
WAFAA AL SALMAN
 
Red Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceRed Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and Compliance
Marc Boorshtein
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
NCC Group
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
woodsy01
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
Kristyn Greenwood
 

Similar to Enterprise Collaboration - 4 (20)

How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
 
Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
The user s identities
The user s identitiesThe user s identities
The user s identities
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Red Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceRed Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and Compliance
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 

Recently uploaded

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 

Recently uploaded (20)

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 

Enterprise Collaboration - 4

  • 1. Nitin Kohli Enterprise Collaboration Privacy & Security Privacy & Security  Nitin Kohli
  • 2. AGENDA Nitin Kohli • Basics • Vision: The What? • Process: The HOW? • Tools • Privacy and Security • Other Considerations • Other Examples
  • 3. Privacy & Security Nitin Kohli The following should be considered: The following should be considered: 1. Secure Intranet • Consider using a VPN (virtual private network) to Consider using a VPN (virtual private network) to  protect "internal" information in transit.  • They would also access their "intranet" via this  technology.  technology • Many companies have moved toward SSL VPN or what  is called "clientless" VPN.  • SSL VPN i l SSL VPN simply requires a browser rather than creating  i b th th ti the administrative overhead of installing and  maintaining client VPN software.  • Results in cost savings.
  • 4. Privacy & Security Nitin Kohli 2. Administrative / Authentication Standards • Single Sign On (SSO) alleviates the burden of employees  and security risk.  d k • Centralized user provisioning (and deprovisioning) tools  make creating and removing accounts, a simpler task.  • Users passwords are essentially synchronized so they can  access all necessary business tools with one user ID and  password.  • “Self‐help" modules can be used to reset passwords. • Administrative costs savings associated with help desk  password resets. 
  • 5. Privacy & Security Nitin Kohli 3. Access Rights Management • Defines Access Control.  • The goal is to provide access to just what a person  needs to get their job done and nothing more.  • “Practice of least privilege".  4. Interactions with Customers / Outer World • To ensure information leakage doesn’t happen by  employees, additional training may be required.   5. Social Bookmarking  • It  builds community around topics of interest/role.  • Search/browse by tag and user Search/browse by tag and user • Search/browse the content of the comments  • Bookmark URL itself • Any search or cross‐correlation can be turned into a  Any search or cross correlation can be turned into a feed and used other ways (mashups).