SlideShare a Scribd company logo
Enable Secure Mobile & Cloud Collaboration
(ISC)2 Secure Seattle 2013, Security Transcends Technology
Rama Kolappan, Mobile Director, Accellion.
Confidential
Accellion - Snapshot
• Founded 1999
• Headquartered in Palo Alto, CA
• 1,700+ Enterprise Customers
• 11+ Million Enterprise Users
• Secure Mobile File Sharing Solutions
2
Confidential 3
Accellion Customers
Confidential 4
The Problem:
Sharing Enterprise Content Securely in the New iPad Era
The New Reality
• Proliferation of mobile devices and
tablets, led by the iPad.
• Difficulties accessing enterprise
content on mobile devices.
• Easy access to free cloud-based apps.
• Consumerization of IT creating security
challenges.
Confidential 5
Terms of Service: Google Drive
http://www.google.com/intl/en/policies/terms/
"When you upload or otherwise submit content to our
Services, you give Google (and those we work with) a worldwide
license to use, host, store, reproduce, modify, create derivative
works (such as those resulting from translations, adaptations or
other changes we make so that your content works better with
our Services), communicate, publish, publicly perform, publicly
display and distribute such content. The rights you grant in this
license are for the limited purpose of operating, promoting, and
improving our Services, and to develop new ones. This license
continues even if you stop using our Services…”
Confidential 6
A New Population of Mobile Workers
Confidential 7
Productivity Gains from Mobility
Confidential 8
Mobile Productivity Challenges
Security and Data
Leaks
Enterprise data leaks
while moving data
across 3rd party apps
using open-in and
save back
Integrated
Productivity Solution
Only access and view
content. Not able to
create and edit content
securely as an
integrated solution
Collaboration and
Sharing
Collaborate and share
newly created and
edited documents
securely
Confidential 9
What Does BYOD Look Like?
Confidential 10
What Does BYOD Feel Like?
Confidential 11
The BYOD Challenge
How to make
enterprise content
accessible on
mobile devices while
maintaining control
and security?
Confidential 12
Enterprise Mobility Management
Mobile
Device
Management
Mobile
Application
Management
Mobile
Content
Management
Confidential 13
Choosing MDM/MAM Partner
Wrapped vs SDK based solutions
• Wrapped applications enforce following user
polices:
• Cut, Copy, and Paste
• Printing
• Screen Shot Snapshots
• Open-In
• SDK based MDM/MAM APIs
• Authorization and SSO
• Encrypting Data at rest and In-Transit
• Interoperability communication between applications
• Open-In (Whitelisting and Blacklisting)
Confidential 14
Avoiding BYOD Disaster
• Support iOS, Android, and Blackberry devices.
• Support user self-provisioning.
• Provide access to enterprise content stores.
• Provide approved apps.
Enable
• Implement encryption of data at rest and in transit.
• Support remote wipe.
• Integrate user authentication, SSO, Auto credentials
(LDAP, AD).
• Deploy secure cloud data storage.
Secure
• Provide configurable user permissions.
• Ensure comprehensive file tracking and reporting.
• Ensure auditable reports for demonstrating
compliance.
• Manage user policies and profiles.
Manage
15
Cloud Deployment Options
Private
On-Premise
Private
Hosted
Public
Multi-Tenant
• Virtual appliance
• Full control
• Full security, compliance
• Single-tenant
• Secure
• Cloud agility
• Multi-tenant
• Cloud agility
Confidential 16
Security Controls
Enterprise Security
• Anti-Virus
• Data Loss Prevention
• Restricted Admin Access to Content
Authentication / Authorization
• SSO with SAML / OAuth / Kerberos
• Multi-LDAP and AD integration
• Two-Factor Authentication
• Password Policies
• RBAC
Encryption
• Encryption – Data at Rest and
in Motion
• Encryption Strength
• Ownership of Encryption Keys
• FIPS 140-2 Certification
Mobile Security
• Secure Mobile Container
• Whitelisted Helper Applications
• Server Side Viewing
• Remote Wipe
• Offline PIN
Confidential 17
Integrating Enterprise Infrastructure
Mobile Device Management, Mobile Application Management
Enterprise multi-LDAP, Active Directory and AD Groups
Single Sign-On (SAML, OAuth, Kerberos)
Strong Authentication
Mobile Productivity
FTP and SMTP
APIs and Customizations
Confidential 18
Secure Mobile Productivity
• Create and edit content
securely, without the risk
of data leaks during
transit across 3rd party
apps
• Private cloud – Create,
edit and access content
from private cloud with
Accellion Mobile
Productivity Suite
• Content encrypted in
transit and at rest;
content expiration
supported
Confidential 19
Secure Mobile Workflow
• Mobilize existing content
• Internal/external sharing
• Unified access to all content
• No duplication of content
• Centralized control
Confidential 20
Tips for Avoiding BYOD Disaster
• Support multiple mobile platforms
• Extend security to every file and device
• Integrate secure productivity capabilities
• Select private cloud for maximum data security
• Connect to enterprise content management systems
• Deploy anti-virus to keep the malware out
• Integrate DLP to keep the data in
• Block consumer-class services
Accellion provides enterprise-class mobile file sharing
solutions that enable secure anytime, anywhere access to
information while ensuring enterprise security and
compliance.
The world’s leading corporations and government agencies
select Accellion to protect intellectual property, ensure
compliance, improve business productivity and reduce IT
cost.
Learn more about Accellion here: www.accellion.com
Connect with Accellion here:
About Accellion

More Related Content

PPTX
Mind the gap: Navigating the Security Challenges of BYOD
PPTX
Executive Alliance Dallas - Accellion Presentation
PPTX
Have content, will travel securely sharing mobile content in the cloud part II
PPTX
itsMERocks Pitch Deck
KEY
Comptel Plus Convention & Expo 2012
PPTX
Secure Your Mobile Content!
PDF
Securing the Mobile Enterprise
PPTX
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...
Mind the gap: Navigating the Security Challenges of BYOD
Executive Alliance Dallas - Accellion Presentation
Have content, will travel securely sharing mobile content in the cloud part II
itsMERocks Pitch Deck
Comptel Plus Convention & Expo 2012
Secure Your Mobile Content!
Securing the Mobile Enterprise
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...

What's hot (20)

PPTX
4 Highlights of Enterprise Mobility + Security
PPTX
Lock Down Mobile and Cloud Data Leaks Part II
PDF
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
PDF
Symantec Enterprise Mobility Vision May 2012
PPTX
Norton Zone File-Sharing Service
PDF
Empower Enterprise Mobility with Microsoft EMS
PDF
Storware KODO - Enterprise Endpoint Data Protection v3.6
PDF
Cloud Security & Cloud Encryption Explained
PDF
Enterprise File Synchronization and Sharing - Biscom Verosync
PPTX
Cloud Computing & Privacy Protection
PDF
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
PDF
Laptop management
PPTX
Azure Information Protection at the Cybercrime and Security Forum 2018
PPTX
CollabDays BeNeLux Sensitivity labels: what's new
PPTX
Picking the right Single Sign On Tool to protect your network
PPT
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
PDF
Next Level Learning IT Track 6 - Cloud Trust
PDF
Beyond the PC: Combating Unmanaged Threats Security
PDF
Endpoint and mobile security
PPT
How to keep track of cloud costs
4 Highlights of Enterprise Mobility + Security
Lock Down Mobile and Cloud Data Leaks Part II
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Symantec Enterprise Mobility Vision May 2012
Norton Zone File-Sharing Service
Empower Enterprise Mobility with Microsoft EMS
Storware KODO - Enterprise Endpoint Data Protection v3.6
Cloud Security & Cloud Encryption Explained
Enterprise File Synchronization and Sharing - Biscom Verosync
Cloud Computing & Privacy Protection
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Laptop management
Azure Information Protection at the Cybercrime and Security Forum 2018
CollabDays BeNeLux Sensitivity labels: what's new
Picking the right Single Sign On Tool to protect your network
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Next Level Learning IT Track 6 - Cloud Trust
Beyond the PC: Combating Unmanaged Threats Security
Endpoint and mobile security
How to keep track of cloud costs
Ad

Similar to Enable Secure Mobile & Cloud Collaboration (20)

PPTX
Accellion SC Congress Chicago Presentation 2014
PPTX
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
PPT
Enterprise mobility management customer presentation december scripted
PPTX
Cloudciti Enterprise File Share Services
PDF
Ibm mobile first protect (maas360)
PPTX
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
PDF
Presentation cloud security the grand challenge
PDF
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
PPTX
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
PDF
BYOD for your business with WSO2 Enterprise Mobility Manager
PDF
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
PDF
CIS14: Mobilize Your Workforce with Secure Identity Services
PDF
Smarter Commerce Summit - IBM MobileFirst Services
PPTX
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
PDF
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
PDF
Cloud Security: What you need to know about IBM SmartCloud Security
PDF
Secure Enterprise File Sharing and Mobile Content Management
PDF
MobileIron's Enterprise Solution for App Security and Management
PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
PDF
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Accellion SC Congress Chicago Presentation 2014
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Enterprise mobility management customer presentation december scripted
Cloudciti Enterprise File Share Services
Ibm mobile first protect (maas360)
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
Presentation cloud security the grand challenge
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
BYOD for your business with WSO2 Enterprise Mobility Manager
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
CIS14: Mobilize Your Workforce with Secure Identity Services
Smarter Commerce Summit - IBM MobileFirst Services
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
Cloud Security: What you need to know about IBM SmartCloud Security
Secure Enterprise File Sharing and Mobile Content Management
MobileIron's Enterprise Solution for App Security and Management
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Ad

More from Proofpoint (19)

PDF
You can wear it!
PDF
Is your enterprise ready for WYOD?
PPTX
Accellion - The European Information Security Summit, London
PDF
The Case for Mobilizing SharePoint
PDF
Adventures in File Sharing
PDF
Mobile Productivity for Field Operations Teams
PDF
Mobile Productivity for Marketing Teams
PDF
Mobile Productivity for Healthcare Teams
PDF
Law Firms: Making the Case for Secure Mobile Productivity
PDF
Mobile Productivity for Legal Teams
PDF
Mobile Productivity for Sales Teams
PPTX
Achieving Secure BYOD in Government Agencies
PPTX
The London Borough of Camden- Making BYOD a Secure Reality
PDF
Accellion Infographic: The Effects of Mobile on the Enterprise
PPTX
Accellion Secure Mobile Printing
PPTX
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
PDF
Accellion infographic-kitepoint
PPTX
Lock Down Mobile and Cloud Data Leaks Part I
PPTX
Have content, will travel securely sharing mobile content in the cloud.
You can wear it!
Is your enterprise ready for WYOD?
Accellion - The European Information Security Summit, London
The Case for Mobilizing SharePoint
Adventures in File Sharing
Mobile Productivity for Field Operations Teams
Mobile Productivity for Marketing Teams
Mobile Productivity for Healthcare Teams
Law Firms: Making the Case for Secure Mobile Productivity
Mobile Productivity for Legal Teams
Mobile Productivity for Sales Teams
Achieving Secure BYOD in Government Agencies
The London Borough of Camden- Making BYOD a Secure Reality
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Secure Mobile Printing
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
Accellion infographic-kitepoint
Lock Down Mobile and Cloud Data Leaks Part I
Have content, will travel securely sharing mobile content in the cloud.

Recently uploaded (20)

PDF
Hybrid model detection and classification of lung cancer
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
project resource management chapter-09.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Tartificialntelligence_presentation.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Zenith AI: Advanced Artificial Intelligence
Hybrid model detection and classification of lung cancer
SOPHOS-XG Firewall Administrator PPT.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Heart disease approach using modified random forest and particle swarm optimi...
A comparative study of natural language inference in Swahili using monolingua...
WOOl fibre morphology and structure.pdf for textiles
Encapsulation_ Review paper, used for researhc scholars
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
project resource management chapter-09.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
A Presentation on Artificial Intelligence
A novel scalable deep ensemble learning framework for big data classification...
Programs and apps: productivity, graphics, security and other tools
Tartificialntelligence_presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Hindi spoken digit analysis for native and non-native speakers
NewMind AI Weekly Chronicles - August'25-Week II
Group 1 Presentation -Planning and Decision Making .pptx
Zenith AI: Advanced Artificial Intelligence

Enable Secure Mobile & Cloud Collaboration

  • 1. Enable Secure Mobile & Cloud Collaboration (ISC)2 Secure Seattle 2013, Security Transcends Technology Rama Kolappan, Mobile Director, Accellion.
  • 2. Confidential Accellion - Snapshot • Founded 1999 • Headquartered in Palo Alto, CA • 1,700+ Enterprise Customers • 11+ Million Enterprise Users • Secure Mobile File Sharing Solutions 2
  • 4. Confidential 4 The Problem: Sharing Enterprise Content Securely in the New iPad Era The New Reality • Proliferation of mobile devices and tablets, led by the iPad. • Difficulties accessing enterprise content on mobile devices. • Easy access to free cloud-based apps. • Consumerization of IT creating security challenges.
  • 5. Confidential 5 Terms of Service: Google Drive http://www.google.com/intl/en/policies/terms/ "When you upload or otherwise submit content to our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content. The rights you grant in this license are for the limited purpose of operating, promoting, and improving our Services, and to develop new ones. This license continues even if you stop using our Services…”
  • 6. Confidential 6 A New Population of Mobile Workers
  • 8. Confidential 8 Mobile Productivity Challenges Security and Data Leaks Enterprise data leaks while moving data across 3rd party apps using open-in and save back Integrated Productivity Solution Only access and view content. Not able to create and edit content securely as an integrated solution Collaboration and Sharing Collaborate and share newly created and edited documents securely
  • 9. Confidential 9 What Does BYOD Look Like?
  • 10. Confidential 10 What Does BYOD Feel Like?
  • 11. Confidential 11 The BYOD Challenge How to make enterprise content accessible on mobile devices while maintaining control and security?
  • 12. Confidential 12 Enterprise Mobility Management Mobile Device Management Mobile Application Management Mobile Content Management
  • 13. Confidential 13 Choosing MDM/MAM Partner Wrapped vs SDK based solutions • Wrapped applications enforce following user polices: • Cut, Copy, and Paste • Printing • Screen Shot Snapshots • Open-In • SDK based MDM/MAM APIs • Authorization and SSO • Encrypting Data at rest and In-Transit • Interoperability communication between applications • Open-In (Whitelisting and Blacklisting)
  • 14. Confidential 14 Avoiding BYOD Disaster • Support iOS, Android, and Blackberry devices. • Support user self-provisioning. • Provide access to enterprise content stores. • Provide approved apps. Enable • Implement encryption of data at rest and in transit. • Support remote wipe. • Integrate user authentication, SSO, Auto credentials (LDAP, AD). • Deploy secure cloud data storage. Secure • Provide configurable user permissions. • Ensure comprehensive file tracking and reporting. • Ensure auditable reports for demonstrating compliance. • Manage user policies and profiles. Manage
  • 15. 15 Cloud Deployment Options Private On-Premise Private Hosted Public Multi-Tenant • Virtual appliance • Full control • Full security, compliance • Single-tenant • Secure • Cloud agility • Multi-tenant • Cloud agility
  • 16. Confidential 16 Security Controls Enterprise Security • Anti-Virus • Data Loss Prevention • Restricted Admin Access to Content Authentication / Authorization • SSO with SAML / OAuth / Kerberos • Multi-LDAP and AD integration • Two-Factor Authentication • Password Policies • RBAC Encryption • Encryption – Data at Rest and in Motion • Encryption Strength • Ownership of Encryption Keys • FIPS 140-2 Certification Mobile Security • Secure Mobile Container • Whitelisted Helper Applications • Server Side Viewing • Remote Wipe • Offline PIN
  • 17. Confidential 17 Integrating Enterprise Infrastructure Mobile Device Management, Mobile Application Management Enterprise multi-LDAP, Active Directory and AD Groups Single Sign-On (SAML, OAuth, Kerberos) Strong Authentication Mobile Productivity FTP and SMTP APIs and Customizations
  • 18. Confidential 18 Secure Mobile Productivity • Create and edit content securely, without the risk of data leaks during transit across 3rd party apps • Private cloud – Create, edit and access content from private cloud with Accellion Mobile Productivity Suite • Content encrypted in transit and at rest; content expiration supported
  • 19. Confidential 19 Secure Mobile Workflow • Mobilize existing content • Internal/external sharing • Unified access to all content • No duplication of content • Centralized control
  • 20. Confidential 20 Tips for Avoiding BYOD Disaster • Support multiple mobile platforms • Extend security to every file and device • Integrate secure productivity capabilities • Select private cloud for maximum data security • Connect to enterprise content management systems • Deploy anti-virus to keep the malware out • Integrate DLP to keep the data in • Block consumer-class services
  • 21. Accellion provides enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to information while ensuring enterprise security and compliance. The world’s leading corporations and government agencies select Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT cost. Learn more about Accellion here: www.accellion.com Connect with Accellion here: About Accellion