Published on November 13, 2013
The Secure File-Sharing Paradox Presenter: Date: Jes Breslaw Director of Cloud Solutions, EMEA November 7th, 2013 1
“….those who learned to collaborate and improvise most effectively have prevailed.” Charles Darwin “Nothing is yours. It is to use. It is to share. If you will not share it, you cannot use it.” Ursula K. Le Guin “Security is the chief enemy of mortals.” William Shakespeare
Accellion Snapshot • Founded 1999 • Headquartered in Palo Alto, CA • 1,900+ Enterprise Customers • 12+ Million Enterprise Users • Secure Mobile File Sharing Solutions 3
The Secure-Sharing Paradox Secure certain to remain safe and unthreatened Share post or repost (something) Collaborate work jointly on an activity or project
1st Dimension - email Email • • • • • • VPN Collaboration over email All data resides behind the firewall Remote users on laptops using VPN Most work done on-site using PC’s Simple model Insecure & inefficient
2nd Dimension - Portals SSL SSL Extranets & portals Email/IM • • • • • • VPN New ‘go-to’ locations on the web IM but still collaboration over email Remote users on laptops using VPN Content still behind the firewall Sharing improves Collaboration still insecure & inefficient
3rd Dimension - Cloud
3rd Dimension - Cloud • • • • • • Where does the content reside? Where/how do you secure the content? Who has access to what? How do you prevent content chaos? What’s the architecture? How do the systems integrate?
1st & 2nd dimensions = ad hoc Law Firm Designs US HQ Agency Contracts Manufacturer Proposals European HQ Distributor Projects Remote offices Customer Prospect M&A Meetings Home workers Consultant Board
3rd dimension = platform Law Firm US HQ Agency Manufacturer European HQ Distributor Remote offices Customer Prospect Home workers Consultant
Anytime, Anywhere Access to Enterprise Content
Wessex Water Key Requirements: • Secure internal/external communications. Utilities 2000 employees • Access documents on mobile devices and tablets • Integrate into existing line-of-business SharePoint workflows • Centralized control and management “Accellion has many of the benefits of a cloud service while allowing us to retain our data on-premise to meet our own security policies and wider compliance requirements.” 12
London Borough of Camden Key Requirements: Local gov 8,500 employees • Improve productivity by allowing staff to work from anywhere • Reduce IT equipment costs by shifting from a PC-centric environment to mobile computing • Fostered happier employees by giving them the freedom to use devices of their own choosing for business-related activities • Data security, compliance and privacy controls “Now we have a solution that’s integrated with our MDM solution and SharePoint, allowing us to securely mobilize our most important content and make BYOD a reality.” 13
Verizon Wireless Key Requirements: • Access/edit docs from Android, BlackBerry, iOS) with corporate vs. personal device distinction and access controls. Telecoms HQ: New York 60k users • Collaborate on presentations, sales dos and proposals internally & externally with partners. • Secure end-to-end environment with controls, oversight and auditing capabilities. • Integration into existing enterprise systems; SharePoint, LDAP/AD, SSO, Email and DLP. 14
Verizon – Road Warrior Solution Private Cloud File Sharing Enterprise Content DLP MDM Archiving 15
Administration Enterprise-Grade Administration Tools • ECM and File Share access controls - fully integrated into Accellion Admin Console • Users, IT or SharePoint Admins can control site access 17
Cloud Deployment Options Private On-Premise Private Hosted Public Multi-Tenant • Virtual appliance • Full control • Full security, compliance • Single-tenant • Secure • Cloud agility • Multi-tenant • Cloud agility 18
Summary Secure Make the architecture fit your needs Share Enable secure mobile alternatives Collaborate Connect to your enterprise content
Resources Available • Gartner Marketscope on Enterprise File Sync and Sharing • ISMG 2013 Mobile Security Survey Results Visit www.accellion.com for more information 20
Thank You! For more information visit www.accellion.com 21
Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...
In this presentation we will describe our experience developing with a highly dyna...
Presentation to the LITA Forum 7th November 2014 Albuquerque, NM
Un recorrido por los cambios que nos generará el wearabletech en el futuro
Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...
View 515 Accellion posts, presentations, experts, and more. Get the professional knowledge you need on LinkedIn. LinkedIn Home What is LinkedIn? Join Today
View 131 Secure File Sharing posts, presentations, ... Interim CFO at Zyber Secure Mobile Solutions Inc., ... Partnership Integration at Accellion Inc, ...
... Scholarship to attend day two of this conference at the Marriott ... the Paradox of PCI DSS. James Seaman, CISM ... such as file sharing ...
Advertising Programmes Business Solutions +Google About Google Google.com © 2015 - Privacy - Terms ...
Record. Record your audio with our iOS/Android app or via the chirbit web based recorder. Upload. Upload your audio files of up to 120mb each. Chirbit ...