SlideShare a Scribd company logo
1 of 22
Avoiding BYO Disaster
Executive Alliance: Security Leaders Summit Presentation
Paula Skokowski, VP Products & Marketing
Accellion - Snapshot
    • Founded 1999
    • Headquartered in Palo Alto, CA
    • 1,700+ Enterprise Customers
    • 11+ Million Enterprise Users
    • Secure Mobile File Sharing Solutions




Confidential                                 2
Accellion Customers




Confidential               3
The Challenge
  Accessing and Sharing Enterprise Content in the BYOD Era

                      The New Reality
                      • Proliferation of employee owned mobile
                        devices & tablets, led by the iPad
                      • Difficulties accessing Enterprise Content
                        from Mobile Devices
                      • Consumerization of IT creating security
                        challenges
                        • The Dropbox Problem
                        • The BYOD Challenge




Confidential                                                        4
A New Population of Mobile Workers




Confidential                     5
Productivity Gains from Mobility




Confidential                       6
Mobile Productivity Challenges




  Security and Data            Integrated                Collaboration and
        Leaks              Productivity Solution              Sharing
  Enterprise data leaks       Only access and view       Collaborate and share
while moving data across   content. Not able to create    newly created and
   3rd party apps using     and edit content securely     edited documents
 Open-in and save back      as an integrated solution          securely

 Confidential                                                                    7
What Does BYOD Look Like?




Confidential                  8
What Does BYOD Feel Like?




Confidential                  9
The BYOD Challenge
                          How to make
                          enterprise content
                          accessible on
                          mobile devices
                          while maintaining
                          control and
                          security?




Confidential                                   10
Enterprise Mobility Management




Mobile         Mobile        Mobile
Device         Application   Content
Management     Management    Management

Confidential                              11
Avoiding BYOD Disaster
                        • Support iOS, Android, and Blackberry devices.

               Enable   • Support user self-provisioning.
                        • Provide access to enterprise content stores.
                        • Provide Approved Apps.



                        • Implement Encryption of data at rest and in transit.

               Secure   • Support Remote Wipe.
                        • Integrate User authentication, SSO, Auto Credentials (LDAP, AD).
                        • Deploy Secure cloud data storage.



                        • Provide Configurable User Permissions.

          Manage        • Ensure Comprehensive File Tracking and Reporting.
                        • Ensure Auditable reports for demonstrating compliance.
                        • Manage user policies and profiles.


Confidential                                                                                 12
Verizon Wireless
  Key Requirements:
  •   Access and edit documents from mobile
      devices (Android, BlackBerry, iOS) with
      corporate vs. personal device distinction and    Snapshot:
      access controls.
                                                       • Telecommunications
  •   Collaborate on presentations, sales documents    • HQ: New York
      and proposals internally and externally with
                                                       • 100k users
      partners.
  •   Secure end-to-end environment with
      controls, oversight and auditing capabilities.
  •   Integration into existing enterprise systems;
      SharePoint, LDAP/AD, SSO, Email and DLP.



Confidential                                                              13
Verizon – Road Warrior Solution
                            Private Cloud
                             File Sharing




               Enterprise        DLP        MDM
                Content



                              Archiving
Confidential                                      14
Private vs. Public Cloud File Sharing




Confidential                            15
Security
               Encryption – Data at Rest and in Motion – Across all devices

                  Blacklisting/Whitelisting of Helper Mobile Apps

                    Anti-Virus

                    Data Loss Prevention

                    Server Side Viewing

                  Role Based Access Control

               Secure Mobile Container – Remote Wipe

Confidential                                                                  16
Enterprise Integrations
               Enterprise multi-LDAP, Active Directory and AD Groups

                  Single Sign-On (SAML, OAuth, Kerberos)

                      Strong Authentication

                      Mobile Device Management, Mobile App Management

                      Office Productivity

                  FTP and SMTP

               APIs

Confidential                                                            17
Compliance and Reporting

           Reporting                       Compliance
               Granularity of Reporting    FIPS Compliance

           Export to 3rd Party Reporting   PCI Compliance

               Log formatting for export   SOX Compliance
           SNMP (Monitoring)               HIPAA Compliance
                                           Integration with GRC

Confidential                                                      18
Secure Mobile Productivity•   Create and edit content
                              securely, without the
                              risk of data leaks during
                              transit across 3rd party
                              apps


                          •   Private Cloud –
                              Create, edit and access
                              content from private
                              cloud with Accellion
                              Mobile Productivity
                              Suite


                          •   Content encrypted in
                              transit and at rest;
                              content expiration
Confidential                  supported            19
Secure Mobile Workflow
                       •   Mobilize Existing Content
                       •   Internal/External Sharing
                       •   Unified Access to All Content
                       •   No Duplication of Content
                       •   Centralized Control




Confidential                                          20
Tips for Avoiding BYOD Disaster
     •   Support multiple mobile platforms
     •   Extend Security to every file and device
     •   Integrate Secure Productivity capabilities
     •   Select Private Cloud for maximum data security
     •   Connect to enterprise content management systems
     •   Deploy anti-virus to keep the bad stuff out
     •   Integrate DLP to keep the good stuff in
     •   Block consumer-class services



Confidential                                                21
About Accellion
Accellion provides enterprise-class mobile file sharing
solutions that enable secure anytime, anywhere access to
information while ensuring enterprise security and
compliance.

The world’s leading corporations and government agencies
select Accellion to protect intellectual property, ensure
compliance, improve business productivity and reduce IT
cost.

Learn more about Accellion here: www.accellion.com

Connect with Accellion here:

More Related Content

What's hot

Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IIProofpoint
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Proofpoint
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec
 
TechNet Unleashed: Software Plus Services
TechNet Unleashed: Software Plus ServicesTechNet Unleashed: Software Plus Services
TechNet Unleashed: Software Plus ServicesHarold Wong
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Radhakrishnan Govindan
 
Norton Zone File-Sharing Service
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing ServiceSymantec
 
Hot Cloud Companies: Tap in Systems
Hot Cloud Companies: Tap in SystemsHot Cloud Companies: Tap in Systems
Hot Cloud Companies: Tap in SystemsOpSource
 
UK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteUK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteLeigh Williamson
 
Aus lug lotus protector
Aus lug   lotus protectorAus lug   lotus protector
Aus lug lotus protectoraosborne
 
J75912 nec cloud brochure storage
J75912 nec cloud brochure storageJ75912 nec cloud brochure storage
J75912 nec cloud brochure storageNECIndia
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSDavid J Rosenthal
 

What's hot (20)

Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part II
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: Features
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
TechNet Unleashed: Software Plus Services
TechNet Unleashed: Software Plus ServicesTechNet Unleashed: Software Plus Services
TechNet Unleashed: Software Plus Services
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
The KNOX Story
The KNOX StoryThe KNOX Story
The KNOX Story
 
Norton Zone File-Sharing Service
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing Service
 
Hot Cloud Companies: Tap in Systems
Hot Cloud Companies: Tap in SystemsHot Cloud Companies: Tap in Systems
Hot Cloud Companies: Tap in Systems
 
UK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteUK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynote
 
Aus lug lotus protector
Aus lug   lotus protectorAus lug   lotus protector
Aus lug lotus protector
 
J75912 nec cloud brochure storage
J75912 nec cloud brochure storageJ75912 nec cloud brochure storage
J75912 nec cloud brochure storage
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 

Similar to Executive Alliance Dallas - Accellion Presentation

Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedNuno Alves
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMIBM Danmark
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...AIP Foundation
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Global Business Events
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityInnoTech
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightDirk Nicol
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesPT Datacomm Diangraha
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part IProofpoint
 
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...IndicThreads
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
The New Collaboration Technologies Experience
The New Collaboration Technologies Experience The New Collaboration Technologies Experience
The New Collaboration Technologies Experience Cisco Canada
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)gule mariam
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 

Similar to Executive Alliance Dallas - Accellion Presentation (20)

Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scripted
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your Identity
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part I
 
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
The New Collaboration Technologies Experience
The New Collaboration Technologies Experience The New Collaboration Technologies Experience
The New Collaboration Technologies Experience
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 

More from Proofpoint

You can wear it!
You can wear it!You can wear it!
You can wear it!Proofpoint
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Proofpoint
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePointProofpoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File SharingProofpoint
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsProofpoint
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsProofpoint
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Proofpoint
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityProofpoint
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Proofpoint
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Proofpoint
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityProofpoint
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile PrintingProofpoint
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepointProofpoint
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud. Proofpoint
 

More from Proofpoint (17)

You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud.
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Executive Alliance Dallas - Accellion Presentation

  • 1. Avoiding BYO Disaster Executive Alliance: Security Leaders Summit Presentation Paula Skokowski, VP Products & Marketing
  • 2. Accellion - Snapshot • Founded 1999 • Headquartered in Palo Alto, CA • 1,700+ Enterprise Customers • 11+ Million Enterprise Users • Secure Mobile File Sharing Solutions Confidential 2
  • 4. The Challenge Accessing and Sharing Enterprise Content in the BYOD Era The New Reality • Proliferation of employee owned mobile devices & tablets, led by the iPad • Difficulties accessing Enterprise Content from Mobile Devices • Consumerization of IT creating security challenges • The Dropbox Problem • The BYOD Challenge Confidential 4
  • 5. A New Population of Mobile Workers Confidential 5
  • 6. Productivity Gains from Mobility Confidential 6
  • 7. Mobile Productivity Challenges Security and Data Integrated Collaboration and Leaks Productivity Solution Sharing Enterprise data leaks Only access and view Collaborate and share while moving data across content. Not able to create newly created and 3rd party apps using and edit content securely edited documents Open-in and save back as an integrated solution securely Confidential 7
  • 8. What Does BYOD Look Like? Confidential 8
  • 9. What Does BYOD Feel Like? Confidential 9
  • 10. The BYOD Challenge How to make enterprise content accessible on mobile devices while maintaining control and security? Confidential 10
  • 11. Enterprise Mobility Management Mobile Mobile Mobile Device Application Content Management Management Management Confidential 11
  • 12. Avoiding BYOD Disaster • Support iOS, Android, and Blackberry devices. Enable • Support user self-provisioning. • Provide access to enterprise content stores. • Provide Approved Apps. • Implement Encryption of data at rest and in transit. Secure • Support Remote Wipe. • Integrate User authentication, SSO, Auto Credentials (LDAP, AD). • Deploy Secure cloud data storage. • Provide Configurable User Permissions. Manage • Ensure Comprehensive File Tracking and Reporting. • Ensure Auditable reports for demonstrating compliance. • Manage user policies and profiles. Confidential 12
  • 13. Verizon Wireless Key Requirements: • Access and edit documents from mobile devices (Android, BlackBerry, iOS) with corporate vs. personal device distinction and Snapshot: access controls. • Telecommunications • Collaborate on presentations, sales documents • HQ: New York and proposals internally and externally with • 100k users partners. • Secure end-to-end environment with controls, oversight and auditing capabilities. • Integration into existing enterprise systems; SharePoint, LDAP/AD, SSO, Email and DLP. Confidential 13
  • 14. Verizon – Road Warrior Solution Private Cloud File Sharing Enterprise DLP MDM Content Archiving Confidential 14
  • 15. Private vs. Public Cloud File Sharing Confidential 15
  • 16. Security Encryption – Data at Rest and in Motion – Across all devices Blacklisting/Whitelisting of Helper Mobile Apps Anti-Virus Data Loss Prevention Server Side Viewing Role Based Access Control Secure Mobile Container – Remote Wipe Confidential 16
  • 17. Enterprise Integrations Enterprise multi-LDAP, Active Directory and AD Groups Single Sign-On (SAML, OAuth, Kerberos) Strong Authentication Mobile Device Management, Mobile App Management Office Productivity FTP and SMTP APIs Confidential 17
  • 18. Compliance and Reporting Reporting Compliance Granularity of Reporting FIPS Compliance Export to 3rd Party Reporting PCI Compliance Log formatting for export SOX Compliance SNMP (Monitoring) HIPAA Compliance Integration with GRC Confidential 18
  • 19. Secure Mobile Productivity• Create and edit content securely, without the risk of data leaks during transit across 3rd party apps • Private Cloud – Create, edit and access content from private cloud with Accellion Mobile Productivity Suite • Content encrypted in transit and at rest; content expiration Confidential supported 19
  • 20. Secure Mobile Workflow • Mobilize Existing Content • Internal/External Sharing • Unified Access to All Content • No Duplication of Content • Centralized Control Confidential 20
  • 21. Tips for Avoiding BYOD Disaster • Support multiple mobile platforms • Extend Security to every file and device • Integrate Secure Productivity capabilities • Select Private Cloud for maximum data security • Connect to enterprise content management systems • Deploy anti-virus to keep the bad stuff out • Integrate DLP to keep the good stuff in • Block consumer-class services Confidential 21
  • 22. About Accellion Accellion provides enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to information while ensuring enterprise security and compliance. The world’s leading corporations and government agencies select Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT cost. Learn more about Accellion here: www.accellion.com Connect with Accellion here:

Editor's Notes

  1. The 3 main challenges for Mobile Productivity are: …Security and Data Leaks: Open in Save back model cause potential data leaks as a user can save the document on an iPad or other sources.Integrated Solution: Need an integrated solution that can provide a seamless and secure access to enterprise contentCollab and Share: Not only create and edit securely but also able be able to securely collaborate and share.
  2. Mobilize Existing ContentInternal and External SharingShare Transparently without duplicating contentUnified Access to all Content StoresCentralized Monitoring and Control Across All Content Stores