Rama Kolappan, Mobile Director with Accellion, recently addressed the topic of Enabling Secure and Mobile Cloud Collaboration at Secure Seattle 2013 . The 3 key messages to enterprises:
1) You are not alone; mobile productivity challenges face all types of organizations.
2) The BYOD trend can do more good than harm.
3) Sharing enterprise content securely in this era of the iPad is realistic and easier than you think.
4. Confidential 4
The Problem:
Sharing Enterprise Content Securely in the New iPad Era
The New Reality
• Proliferation of mobile devices and
tablets, led by the iPad.
• Difficulties accessing enterprise
content on mobile devices.
• Easy access to free cloud-based apps.
• Consumerization of IT creating security
challenges.
5. Confidential 5
Terms of Service: Google Drive
http://www.google.com/intl/en/policies/terms/
"When you upload or otherwise submit content to our Services,
you give Google (and those we work with) a worldwide license to
use, host, store, reproduce, modify, create derivative works (such
as those resulting from translations, adaptations or other
changes we make so that your content works better with our
Services), communicate, publish, publicly perform, publicly
display and distribute such content. The rights you grant in this
license are for the limited purpose of operating, promoting, and
improving our Services, and to develop new ones. This license
continues even if you stop using our Services…”
8. Confidential 8
Mobile Productivity Challenges
Security and Data
Leaks
Enterprise data leaks
while moving data
across 3rd party apps
using open-in and
save back
Integrated
Productivity Solution
Only access and view
content. Not able to
create and edit content
securely as an
integrated solution
Collaboration and
Sharing
Collaborate and share
newly created and
edited documents
securely
13. Confidential 13
Choosing MDM/MAM Partner
Wrapped vs SDK based solutions
• Wrapped applications enforce following user
polices:
• Cut, Copy, and Paste
• Printing
• Screen Shot Snapshots
• Open-In
• SDK based MDM/MAM APIs
• Authorization and SSO
• Encrypting Data at rest and In-Transit
• Interoperability communication between applications
• Open-In (Whitelisting and Blacklisting)
14. Confidential 14
Avoiding BYOD Disaster
• Support iOS, Android, and Blackberry devices.
• Support user self-provisioning.
• Provide access to enterprise content stores.
• Provide approved apps.
Enable
• Implement encryption of data at rest and in transit.
• Support remote wipe.
• Integrate user authentication, SSO, Auto credentials
(LDAP, AD).
• Deploy secure cloud data storage.
Secure
• Provide configurable user permissions.
• Ensure comprehensive file tracking and reporting.
• Ensure auditable reports for demonstrating
compliance.
• Manage user policies and profiles.
Manage
16. Confidential 16
Security Controls
Enterprise Security
• Anti-Virus
• Data Loss Prevention
• Restricted Admin Access to Content
Authentication / Authorization
• SSO with SAML / OAuth / Kerberos
• Multi-LDAP and AD integration
• Two-Factor Authentication
• Password Policies
• RBAC
Encryption
• Encryption – Data at Rest and
in Motion
• Encryption Strength
• Ownership of Encryption Keys
• FIPS 140-2 Certification
Mobile Security
• Secure Mobile Container
• Whitelisted Helper Applications
• Server Side Viewing
• Remote Wipe
• Offline PIN
17. Confidential 17
Integrating Enterprise Infrastructure
Mobile Device Management, Mobile Application Management
Enterprise multi-LDAP, Active Directory and AD Groups
Single Sign-On (SAML, OAuth, Kerberos)
Strong Authentication
Mobile Productivity
FTP and SMTP
APIs and Customizations
18. Confidential 18
Secure Mobile Productivity
• Create and edit content
securely, without the risk
of data leaks during
transit across 3rd party
apps
• Private cloud – Create,
edit and access content
from private cloud with
Accellion Mobile
Productivity Suite
• Content encrypted in
transit and at rest;
content expiration
supported
19. Confidential 19
Secure Mobile Workflow
• Mobilize existing content
• Internal/external sharing
• Unified access to all content
• No duplication of content
• Centralized control
20. Confidential 20
Tips for Avoiding BYOD Disaster
• Support multiple mobile platforms
• Extend security to every file and device
• Integrate secure productivity capabilities
• Select private cloud for maximum data security
• Connect to enterprise content management systems
• Deploy anti-virus to keep the malware out
• Integrate DLP to keep the data in
• Block consumer-class services
21. Accellion provides enterprise-class mobile file sharing
solutions that enable secure anytime, anywhere access to
information while ensuring enterprise security and
compliance.
The world’s leading corporations and government agencies
select Accellion to protect intellectual property, ensure
compliance, improve business productivity and reduce IT
cost.
Learn more about Accellion here: www.accellion.com
Connect with Accellion here:
About Accellion