dss itsec 2013 conference 07.11.2013 - accellion - the secure file-sharing paradox

21
1 The Secure File-Sharing Paradox Presenter: Jes Breslaw Director of Cloud Solutions, EMEA Date: November 7th, 2013

Upload: andris-soroka

Post on 19-Jan-2015

401 views

Category:

Technology


3 download

DESCRIPTION

Presentation from one of the remarkable IT Security events in the Baltic States organized by “Data Security Solutions” (www.dss.lv ) Event took place in Riga, on 7th of November, 2013 and was visited by more than 400 participants at event place and more than 300 via online live streaming.

TRANSCRIPT

Page 1: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

1

The Secure File-Sharing Paradox

Presenter: Jes BreslawDirector of Cloud Solutions, EMEA

Date: November 7th, 2013

Page 2: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

“Nothing is yours. It is to use. It is to share. If you will not share it, you cannot use it.”Ursula K. Le Guin

“….those who learned to collaborate and improvise most effectively have prevailed.”Charles Darwin

“Security is the chief enemy of mortals.” William Shakespeare

Page 3: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

• Founded 1999

• Headquartered in Palo Alto, CA

• 1,900+ Enterprise Customers

• 12+ Million Enterprise Users

• Secure Mobile File Sharing Solutions

Accellion Snapshot

3

Page 4: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

Collaboratework jointly on an activity or project

Securecertain to remain safe

and unthreatened

Sharepost or repost (something)

The Secure-Sharing Paradox

Page 5: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

VPN

1st Dimension - email

Email

• Collaboration over email• All data resides behind the firewall• Remote users on laptops using VPN• Most work done on-site using PC’s• Simple model• Insecure & inefficient

Page 6: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

Extranets & portals

Email/IM

SSLSSL

2nd Dimension - Portals

VPN

• New ‘go-to’ locations on the web• IM but still collaboration over email• Remote users on laptops using VPN• Content still behind the firewall• Sharing improves• Collaboration still insecure & inefficient

Page 7: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

3rd Dimension - Cloud

Page 8: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

3rd Dimension - Cloud

• Where does the content reside?• Where/how do you secure the content?• Who has access to what?• How do you prevent content chaos?• What’s the architecture?• How do the systems integrate?

Page 9: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

Contracts Proposals Projects M&A Meetings BoardDesigns

US HQ European HQ Remote offices Home workers

1st & 2nd dimensions = ad hocLaw Firm Agency Manufacturer Distributor Customer Prospect Consultant

Page 10: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

US HQ European HQ Remote offices Home workers

3rd dimension = platformLaw Firm Agency Manufacturer Distributor Customer Prospect Consultant

Page 11: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

Anytime, Anywhere Access to Enterprise Content

Page 12: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

12

Key Requirements:

• Secure internal/external communications.

• Access documents on mobile devices and tablets

• Integrate into existing line-of-business SharePoint workflows

• Centralized control and management

“Accellion has many of the benefits of a cloud service while allowing us to retain our data on-premise to meet our own

security policies and wider compliance requirements.”

Utilities

2000 employees

Wessex Water

Page 13: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

13

Key Requirements:

• Improve productivity by allowing staff to work from anywhere

• Reduce IT equipment costs by shifting from a PC-centric environment to mobile computing

• Fostered happier employees by giving them the freedom to use devices of their own choosing for business-related activities

• Data security, compliance and privacy controls

Local gov

8,500 employees

“Now we have a solution that’s integrated with our MDM solution and SharePoint, allowing us to securely mobilize our most important content and make BYOD a reality.”

London Borough of Camden

Page 14: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

14

Key Requirements:

• Access/edit docs from Android, BlackBerry, iOS) with corporate vs. personal device distinction and access controls.

• Collaborate on presentations, sales dos and proposals internally & externally with partners.

• Secure end-to-end environment with controls, oversight and auditing capabilities.

• Integration into existing enterprise systems; SharePoint, LDAP/AD, SSO, Email and DLP.

Telecoms

HQ: New York

60k users

Verizon Wireless

Page 15: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

15

Verizon – Road Warrior Solution

Enterprise Content

DLP

Archiving

MDM

Private Cloud File Sharing

Page 16: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

User experience

Page 17: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

17

• ECM and File Share access controls - fully integrated into Accellion Admin Console

• Users, IT or SharePoint Admins can control site access

Enterprise-Grade Administration Tools

Administration

Page 18: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

18

Private On-Premise

Private Hosted

Public Multi-Tenant

•Virtual appliance•Full control•Full security, compliance

•Single-tenant •Secure•Cloud agility

•Multi-tenant •Cloud agility

Cloud Deployment Options

Page 19: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

SecureMake the architecture

fit your needs

ShareEnable secure

mobile alternatives

CollaborateConnect to your

enterprise content

Summary

Page 20: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

20

• Gartner Marketscope on Enterprise File Sync and Sharing• ISMG 2013 Mobile Security Survey Results

Visit www.accellion.com for more information

Resources Available

Page 21: DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing Paradox

21

Thank You!

For more information visitwww.accellion.com