DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox
-
Upload
andris-soroka -
Category
Technology
-
view
402 -
download
3
description
Transcript of DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox
![Page 1: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/1.jpg)
1
The Secure File-Sharing Paradox
Presenter: Jes BreslawDirector of Cloud Solutions, EMEA
Date: November 7th, 2013
![Page 2: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/2.jpg)
“Nothing is yours. It is to use. It is to share. If you will not share it, you cannot use it.”Ursula K. Le Guin
“….those who learned to collaborate and improvise most effectively have prevailed.”Charles Darwin
“Security is the chief enemy of mortals.” William Shakespeare
![Page 3: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/3.jpg)
• Founded 1999
• Headquartered in Palo Alto, CA
• 1,900+ Enterprise Customers
• 12+ Million Enterprise Users
• Secure Mobile File Sharing Solutions
Accellion Snapshot
3
![Page 4: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/4.jpg)
Collaboratework jointly on an activity or project
Securecertain to remain safe
and unthreatened
Sharepost or repost (something)
The Secure-Sharing Paradox
![Page 5: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/5.jpg)
VPN
1st Dimension - email
• Collaboration over email• All data resides behind the firewall• Remote users on laptops using VPN• Most work done on-site using PC’s• Simple model• Insecure & inefficient
![Page 6: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/6.jpg)
Extranets & portals
Email/IM
SSLSSL
2nd Dimension - Portals
VPN
• New ‘go-to’ locations on the web• IM but still collaboration over email• Remote users on laptops using VPN• Content still behind the firewall• Sharing improves• Collaboration still insecure & inefficient
![Page 7: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/7.jpg)
3rd Dimension - Cloud
![Page 8: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/8.jpg)
3rd Dimension - Cloud
• Where does the content reside?• Where/how do you secure the content?• Who has access to what?• How do you prevent content chaos?• What’s the architecture?• How do the systems integrate?
![Page 9: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/9.jpg)
Contracts Proposals Projects M&A Meetings BoardDesigns
US HQ European HQ Remote offices Home workers
1st & 2nd dimensions = ad hocLaw Firm Agency Manufacturer Distributor Customer Prospect Consultant
![Page 10: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/10.jpg)
US HQ European HQ Remote offices Home workers
3rd dimension = platformLaw Firm Agency Manufacturer Distributor Customer Prospect Consultant
![Page 11: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/11.jpg)
Anytime, Anywhere Access to Enterprise Content
![Page 12: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/12.jpg)
12
Key Requirements:
• Secure internal/external communications.
• Access documents on mobile devices and tablets
• Integrate into existing line-of-business SharePoint workflows
• Centralized control and management
“Accellion has many of the benefits of a cloud service while allowing us to retain our data on-premise to meet our own
security policies and wider compliance requirements.”
Utilities
2000 employees
Wessex Water
![Page 13: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/13.jpg)
13
Key Requirements:
• Improve productivity by allowing staff to work from anywhere
• Reduce IT equipment costs by shifting from a PC-centric environment to mobile computing
• Fostered happier employees by giving them the freedom to use devices of their own choosing for business-related activities
• Data security, compliance and privacy controls
Local gov
8,500 employees
“Now we have a solution that’s integrated with our MDM solution and SharePoint, allowing us to securely mobilize our most important content and make BYOD a reality.”
London Borough of Camden
![Page 14: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/14.jpg)
14
Key Requirements:
• Access/edit docs from Android, BlackBerry, iOS) with corporate vs. personal device distinction and access controls.
• Collaborate on presentations, sales dos and proposals internally & externally with partners.
• Secure end-to-end environment with controls, oversight and auditing capabilities.
• Integration into existing enterprise systems; SharePoint, LDAP/AD, SSO, Email and DLP.
Telecoms
HQ: New York
60k users
Verizon Wireless
![Page 15: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/15.jpg)
15
Verizon – Road Warrior Solution
Enterprise Content
DLP
Archiving
MDM
Private Cloud File Sharing
![Page 16: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/16.jpg)
User experience
![Page 17: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/17.jpg)
17
• ECM and File Share access controls - fully integrated into Accellion Admin Console
• Users, IT or SharePoint Admins can control site access
Enterprise-Grade Administration Tools
Administration
![Page 18: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/18.jpg)
18
Private On-Premise
Private Hosted
Public Multi-Tenant
•Virtual appliance•Full control•Full security, compliance
•Single-tenant •Secure•Cloud agility
•Multi-tenant •Cloud agility
Cloud Deployment Options
![Page 19: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/19.jpg)
SecureMake the architecture
fit your needs
ShareEnable secure
mobile alternatives
CollaborateConnect to your
enterprise content
Summary
![Page 20: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/20.jpg)
20
• Gartner Marketscope on Enterprise File Sync and Sharing• ISMG 2013 Mobile Security Survey Results
Visit www.accellion.com for more information
Resources Available
![Page 21: DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing Paradox](https://reader036.fdocuments.net/reader036/viewer/2022062617/54bce9b14a7959815b8b45d6/html5/thumbnails/21.jpg)
21
Thank You!
For more information visitwww.accellion.com