SlideShare uma empresa Scribd logo
1 de 32
Making BYOD a Secure Reality
The London Borough of Camden
Jes Breslaw, EMEA Marketing Director
Jes.breslaw@Accellion.com
@jesbreslaw
Confidential 2
Agenda
• About Accellion
• London Borough of Camden
• 2012 ICT Strategy overview
• Mobile/BYOD requirements
• Solution
• Benefits
• More information
• Summary
Confidential
Accellion - Snapshot
• Founded 1999
• Headquartered in Palo Alto, CA
• Well established in EMEA
• 1,800+ Enterprise Customers
• 11+ Million Enterprise Users
3
Confidential 4
The Challenge
Accessing and Sharing Enterprise Content in the BYOD Era
The New Reality
• Proliferation of employee owned mobile
devices & tablets, led by the iPad
• Difficulties accessing Enterprise Content
from Mobile Devices
• Consumerisation of IT creating security
challenges
• The Dropbox Problem
• The BYOD Challenge
Confidential 5
A New Population of Mobile Workers
Confidential 6
The opportunity
Workers could gain equivalent of
an extra day per week!
Confidential 7
Mobile Productivity Challenges
Security and Data
Leaks
Enterprise data leaks
while moving data
across 3rd party apps
using open-in and
save back
Integrated
Productivity Solution
Only access and view
content. Not able to
create and edit content
securely as an
integrated solution
Collaboration and
Sharing
Collaborate and share
newly created and
edited documents
securely
Confidential
Secure File Transfer
▪ Send files as secure links
▪ Very large file support (1 TB+)
▪ Rich security options
Secure Collaboration
▪ Secure team workspaces
▪ Invite others to share within workspaces
▪ Desktop-workspace file sync
▪ Versioning, Commenting
▪ Highly flexible access control
Accellion Solution Overview
Kitepoint - Secure Content Access
▪ Access content stored behind the firewall
▪ Secure, anytime access to “Document of Record”
▪ No VPN required
▪ Fully integrated – Download, edit and upload
▪ Supports ECM systems and File Stores
▪ Respects permissions of source
Anytime, Anywhere Access to Enterprise Content
Mobile Productivity Suite
▪ Create, edit and share MS Office compatible files
▪ Fully containerized for end-to-end document security
▪ Works with kiitepoint, Collaboration and Secure Send
Confidential 9
Cloud Deployment Options
Private
On-Premise
Private
Hosted
Public
Multi-Tenant
• Virtual appliance
• Full control
• Full security, compliance
• Single-tenant
• Secure
• Cloud agility
• Multi-tenant
• Cloud agility
Confidential 10
London Borough of Camden
• One of 32 London Boroughs
• Population of 22,100
• Divided into 18 wards
• 8,500 employees
Confidential 11
Strategic IT plan set in 2012
1. Service integration & multi agency
2. Agile Working
3. Right First Time
4. Improving Customer Access and Tackling
Digital Exclusion
5. Tacking Inequality Through Better Data and
Customer Insight
6. Better, Faster, Reliable Infrastructure
Confidential 12
Financial pressures
• £12-13m of potential demand for IT in 2012
• Available capital budget of £7m
• Make additional savings from existing IT spend
• Reduce resources spent on smaller projects with more focus on
transformational projects i.e. agile working
• Ensure discretionary IT spend provides best ROI
• Actively manage overall portfolio of projects
Confidential 13
Strategic IT plan set in 2012
• 2. Agile Working
• Paperless Office
• Anytime, Anywhere Working
• Secure Any Device, Any Platform Access
• Networking our Staff
• Modernise Core Technologies
Confidential 14
Implementing a Mobility/BYOD Policy
• Important part of the council’s strategic plan
• Cost savings
• Accommodation
• Storage and admin for paper
• Device refresh
• Productivity & creativity
• Team collaboration
• Work anywhere
Confidential 15
Mobile platform requirements
• Productivity:
• Integrate with SharePoint and File Shares with no VPN
• Support seamless workflows
• Enabled team/3rd party collaboration
• Secure editing of office documents
Confidential 16
Mobile platform requirements
• Security:
• Supported government regulated Impact Levels (ILs)
• Saved audit trails for compliance
• Secured data with multilayered authentication
• User authentication
• Application blocking
• LDAP/AD integration
• Encryption of data in transit and at rest
• Had multiple deployment options
• IOS & Android
• Private cloud/cloud
Confidential 17
Starting the search
• Talk to trusted advisors
• We asked our own customers how they share files
• Prioritize deployment type
• Private cloud, public, hybrid, hosted, etc.
• Consider future scenarios
• Number of users, mobile devices, types of files
• Determine must-haves and nice-to-haves
Confidential
18
LBoC – BYOD solution
Private Cloud
File Sharing
Enterprise Content
Office clients MDM
3rd parties
Devices
Confidential 19
Combined Solution Architecture
Confidential 20
Real time access to all
enterprise content,
including access to:
• SharePoint
• Windows File Shares
• Secure workspaces
Confidential 21
Full editing suite
Confidential 22
Secure file transfer
Confidential 23
…secure links
Confidential 24
Open-In Policies
Open-In policies are determined by the Administrator
Open-in Enabled Open-in Disabled
Confidential 25
DLP Policies (Cut-Copy-Paste)
Cut, Copy and Paste
policies are controlled via
MobileIron VSP Dashboard
No DLP
Policy
Paste
Disabled
Cut-Copy- paste policies are determined by the Adminstrator
Confidential 26
"Accellion acts as the single platform for users to
access, review and collaborate on content from
mobile devices of their choosing,”
Confidential 27
Benefits of Accellion in LBoC
• Productivity gains
• Cost savings through reduced accommodation requirements
• Happier employees through council-wide support for mobile
file-sharing
• Extend existing ECM investments + improve adoption
• Track and report on all file sharing activities
• A quick win – made IT look good!
Confidential 28
Resources
Confidential
Gartner MarketScope Report
Confidential 30
White Papers
• 5 Best Practices for Secure Enterprise Content Mobility
• BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
• Mobilize SharePoint Securely: Top 5 Enterprise Requirements
• 10 Mobile Security Requirements for BYOD
• + more
Confidential 31
Summary
• Support multiple mobile platforms
• Block consumer-class services
• Extend Security to every file and device
• Integrate Secure Productivity capabilities
• Select Private Cloud for maximum data security
• Connect to enterprise content management systems
Confidential 32
Thank you
www.accellion.com
@accellion
www.linkedin.com/company/accellion
www.facebook.com/Accellion
jes.breslaw@accellion.com @jesbreslaw
“Now we have a solution that’s integrated with our MDM solution
and SharePoint, allowing us to securely mobilise our most important
content and make BYOD a reality.”
Ian Lawrence - IT Manager
London Borough of Camden

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

PROOM
PROOMPROOM
PROOM
 
Elevate Your Digital Experiences with Cloud Content Management on Box
Elevate Your Digital Experiences with Cloud Content Management on BoxElevate Your Digital Experiences with Cloud Content Management on Box
Elevate Your Digital Experiences with Cloud Content Management on Box
 
How to Make the Right First Step Towards the Cloud
How to Make the Right First Step Towards the CloudHow to Make the Right First Step Towards the Cloud
How to Make the Right First Step Towards the Cloud
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
IBM RTP Dojo Launch
IBM RTP Dojo LaunchIBM RTP Dojo Launch
IBM RTP Dojo Launch
 
Desktop Network Systems what we do
Desktop Network Systems what we doDesktop Network Systems what we do
Desktop Network Systems what we do
 
Collaborative BIM - Asite Breakfast Seminar 2013-10-16
Collaborative BIM - Asite Breakfast Seminar 2013-10-16Collaborative BIM - Asite Breakfast Seminar 2013-10-16
Collaborative BIM - Asite Breakfast Seminar 2013-10-16
 
Accessibility & the Cloud: Current & Future Trends - Dr Scott Hollier at the ...
Accessibility & the Cloud: Current & Future Trends - Dr Scott Hollier at the ...Accessibility & the Cloud: Current & Future Trends - Dr Scott Hollier at the ...
Accessibility & the Cloud: Current & Future Trends - Dr Scott Hollier at the ...
 
Managing IT in Business- IBM Report 2018
Managing IT in Business-  IBM Report 2018Managing IT in Business-  IBM Report 2018
Managing IT in Business- IBM Report 2018
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
To the Cloud through Collaboration in 6 weeks!
To the Cloud through Collaboration in 6 weeks!To the Cloud through Collaboration in 6 weeks!
To the Cloud through Collaboration in 6 weeks!
 
FinTech Belgium - Fintech Belgium MeetUp on Platformisation Strategy - Erik ...
FinTech Belgium - Fintech Belgium MeetUp on Platformisation Strategy -  Erik ...FinTech Belgium - Fintech Belgium MeetUp on Platformisation Strategy -  Erik ...
FinTech Belgium - Fintech Belgium MeetUp on Platformisation Strategy - Erik ...
 
Content is King: Presentation to Cross Media Innocation Center at RIT
Content is King: Presentation to Cross Media Innocation Center at RITContent is King: Presentation to Cross Media Innocation Center at RIT
Content is King: Presentation to Cross Media Innocation Center at RIT
 
Eduserv cloud services
Eduserv cloud servicesEduserv cloud services
Eduserv cloud services
 
brightsolid Tech Trends in Energy
brightsolid Tech Trends in Energybrightsolid Tech Trends in Energy
brightsolid Tech Trends in Energy
 
Cloud and security impacts
Cloud and security impactsCloud and security impacts
Cloud and security impacts
 
Alfresco Day Stockholm 2015 - Case Study: Tieto
Alfresco Day Stockholm 2015 - Case Study: TietoAlfresco Day Stockholm 2015 - Case Study: Tieto
Alfresco Day Stockholm 2015 - Case Study: Tieto
 
IoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and BlockchainIoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and Blockchain
 
Cloud Customer Architecture for Enterprise Social Collaboration
Cloud Customer Architecture for Enterprise Social CollaborationCloud Customer Architecture for Enterprise Social Collaboration
Cloud Customer Architecture for Enterprise Social Collaboration
 
Hyperledger: Market, Technology & Community Update
Hyperledger: Market, Technology & Community UpdateHyperledger: Market, Technology & Community Update
Hyperledger: Market, Technology & Community Update
 

Destaque

Destaque (6)

The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 

Semelhante a The London Borough of Camden- Making BYOD a Secure Reality

Private Cloud Overview
Private Cloud OverviewPrivate Cloud Overview
Private Cloud Overview
EdKerstein
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
GaryArdito
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
Brian K. Dickard
 
130424 bitkom ucc_cloud_v06
130424 bitkom ucc_cloud_v06130424 bitkom ucc_cloud_v06
130424 bitkom ucc_cloud_v06
Michael Burian
 
cloud computing - isaca conference 2012
cloud computing - isaca conference 2012cloud computing - isaca conference 2012
cloud computing - isaca conference 2012
Jonathan Houston
 

Semelhante a The London Borough of Camden- Making BYOD a Secure Reality (20)

IBM Cloud Solution - Blue Box
IBM Cloud Solution - Blue BoxIBM Cloud Solution - Blue Box
IBM Cloud Solution - Blue Box
 
IBM Business Connect 2015 - Bluemix Overview
IBM Business Connect 2015 - Bluemix OverviewIBM Business Connect 2015 - Bluemix Overview
IBM Business Connect 2015 - Bluemix Overview
 
IBM Solutions Connect 2013 - Enterprise Content Management
IBM Solutions Connect 2013 - Enterprise Content ManagementIBM Solutions Connect 2013 - Enterprise Content Management
IBM Solutions Connect 2013 - Enterprise Content Management
 
Private Cloud Overview
Private Cloud OverviewPrivate Cloud Overview
Private Cloud Overview
 
Forecast deploy3 100_ak2
Forecast deploy3 100_ak2Forecast deploy3 100_ak2
Forecast deploy3 100_ak2
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover Track
 
130424 bitkom ucc_cloud_v06
130424 bitkom ucc_cloud_v06130424 bitkom ucc_cloud_v06
130424 bitkom ucc_cloud_v06
 
Byod bpost
Byod bpostByod bpost
Byod bpost
 
IBM INTEGRATION BUS (IIB V10)—DATA ROUTING AND TRANSFORMATION
IBM INTEGRATION BUS (IIB V10)—DATA ROUTING AND TRANSFORMATIONIBM INTEGRATION BUS (IIB V10)—DATA ROUTING AND TRANSFORMATION
IBM INTEGRATION BUS (IIB V10)—DATA ROUTING AND TRANSFORMATION
 
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
 
The IBM Research Compute Cloud (RC2): Innovation, Best Practices and Lessons ...
The IBM Research Compute Cloud (RC2): Innovation, Best Practices and Lessons ...The IBM Research Compute Cloud (RC2): Innovation, Best Practices and Lessons ...
The IBM Research Compute Cloud (RC2): Innovation, Best Practices and Lessons ...
 
Webinar: The 5 Most Critical Things to Understand About Modern Data Integration
Webinar: The 5 Most Critical Things to Understand About Modern Data IntegrationWebinar: The 5 Most Critical Things to Understand About Modern Data Integration
Webinar: The 5 Most Critical Things to Understand About Modern Data Integration
 
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
 
Choosing Public vs. Private vs. Hybrid Cloud Computing
Choosing Public vs. Private vs. Hybrid Cloud ComputingChoosing Public vs. Private vs. Hybrid Cloud Computing
Choosing Public vs. Private vs. Hybrid Cloud Computing
 
cloud computing - isaca conference 2012
cloud computing - isaca conference 2012cloud computing - isaca conference 2012
cloud computing - isaca conference 2012
 
Gov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_final
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 

Mais de Proofpoint

Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
Proofpoint
 

Mais de Proofpoint (19)

You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud Collaboration
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYOD
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part II
 
Lock Down Mobile and Cloud Data Leaks Part I
Lock Down Mobile  and Cloud Data Leaks Part ILock Down Mobile  and Cloud Data Leaks Part I
Lock Down Mobile and Cloud Data Leaks Part I
 
Have content, will travel securely sharing mobile content in the cloud part II
Have content, will travel  securely sharing mobile content in the cloud part IIHave content, will travel  securely sharing mobile content in the cloud part II
Have content, will travel securely sharing mobile content in the cloud part II
 
Have content, will travel securely sharing mobile content in the cloud.
Have content, will travel  securely sharing mobile content in the cloud. Have content, will travel  securely sharing mobile content in the cloud.
Have content, will travel securely sharing mobile content in the cloud.
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

The London Borough of Camden- Making BYOD a Secure Reality

  • 1. Making BYOD a Secure Reality The London Borough of Camden Jes Breslaw, EMEA Marketing Director Jes.breslaw@Accellion.com @jesbreslaw
  • 2. Confidential 2 Agenda • About Accellion • London Borough of Camden • 2012 ICT Strategy overview • Mobile/BYOD requirements • Solution • Benefits • More information • Summary
  • 3. Confidential Accellion - Snapshot • Founded 1999 • Headquartered in Palo Alto, CA • Well established in EMEA • 1,800+ Enterprise Customers • 11+ Million Enterprise Users 3
  • 4. Confidential 4 The Challenge Accessing and Sharing Enterprise Content in the BYOD Era The New Reality • Proliferation of employee owned mobile devices & tablets, led by the iPad • Difficulties accessing Enterprise Content from Mobile Devices • Consumerisation of IT creating security challenges • The Dropbox Problem • The BYOD Challenge
  • 5. Confidential 5 A New Population of Mobile Workers
  • 6. Confidential 6 The opportunity Workers could gain equivalent of an extra day per week!
  • 7. Confidential 7 Mobile Productivity Challenges Security and Data Leaks Enterprise data leaks while moving data across 3rd party apps using open-in and save back Integrated Productivity Solution Only access and view content. Not able to create and edit content securely as an integrated solution Collaboration and Sharing Collaborate and share newly created and edited documents securely
  • 8. Confidential Secure File Transfer ▪ Send files as secure links ▪ Very large file support (1 TB+) ▪ Rich security options Secure Collaboration ▪ Secure team workspaces ▪ Invite others to share within workspaces ▪ Desktop-workspace file sync ▪ Versioning, Commenting ▪ Highly flexible access control Accellion Solution Overview Kitepoint - Secure Content Access ▪ Access content stored behind the firewall ▪ Secure, anytime access to “Document of Record” ▪ No VPN required ▪ Fully integrated – Download, edit and upload ▪ Supports ECM systems and File Stores ▪ Respects permissions of source Anytime, Anywhere Access to Enterprise Content Mobile Productivity Suite ▪ Create, edit and share MS Office compatible files ▪ Fully containerized for end-to-end document security ▪ Works with kiitepoint, Collaboration and Secure Send
  • 9. Confidential 9 Cloud Deployment Options Private On-Premise Private Hosted Public Multi-Tenant • Virtual appliance • Full control • Full security, compliance • Single-tenant • Secure • Cloud agility • Multi-tenant • Cloud agility
  • 10. Confidential 10 London Borough of Camden • One of 32 London Boroughs • Population of 22,100 • Divided into 18 wards • 8,500 employees
  • 11. Confidential 11 Strategic IT plan set in 2012 1. Service integration & multi agency 2. Agile Working 3. Right First Time 4. Improving Customer Access and Tackling Digital Exclusion 5. Tacking Inequality Through Better Data and Customer Insight 6. Better, Faster, Reliable Infrastructure
  • 12. Confidential 12 Financial pressures • £12-13m of potential demand for IT in 2012 • Available capital budget of £7m • Make additional savings from existing IT spend • Reduce resources spent on smaller projects with more focus on transformational projects i.e. agile working • Ensure discretionary IT spend provides best ROI • Actively manage overall portfolio of projects
  • 13. Confidential 13 Strategic IT plan set in 2012 • 2. Agile Working • Paperless Office • Anytime, Anywhere Working • Secure Any Device, Any Platform Access • Networking our Staff • Modernise Core Technologies
  • 14. Confidential 14 Implementing a Mobility/BYOD Policy • Important part of the council’s strategic plan • Cost savings • Accommodation • Storage and admin for paper • Device refresh • Productivity & creativity • Team collaboration • Work anywhere
  • 15. Confidential 15 Mobile platform requirements • Productivity: • Integrate with SharePoint and File Shares with no VPN • Support seamless workflows • Enabled team/3rd party collaboration • Secure editing of office documents
  • 16. Confidential 16 Mobile platform requirements • Security: • Supported government regulated Impact Levels (ILs) • Saved audit trails for compliance • Secured data with multilayered authentication • User authentication • Application blocking • LDAP/AD integration • Encryption of data in transit and at rest • Had multiple deployment options • IOS & Android • Private cloud/cloud
  • 17. Confidential 17 Starting the search • Talk to trusted advisors • We asked our own customers how they share files • Prioritize deployment type • Private cloud, public, hybrid, hosted, etc. • Consider future scenarios • Number of users, mobile devices, types of files • Determine must-haves and nice-to-haves
  • 18. Confidential 18 LBoC – BYOD solution Private Cloud File Sharing Enterprise Content Office clients MDM 3rd parties Devices
  • 20. Confidential 20 Real time access to all enterprise content, including access to: • SharePoint • Windows File Shares • Secure workspaces
  • 24. Confidential 24 Open-In Policies Open-In policies are determined by the Administrator Open-in Enabled Open-in Disabled
  • 25. Confidential 25 DLP Policies (Cut-Copy-Paste) Cut, Copy and Paste policies are controlled via MobileIron VSP Dashboard No DLP Policy Paste Disabled Cut-Copy- paste policies are determined by the Adminstrator
  • 26. Confidential 26 "Accellion acts as the single platform for users to access, review and collaborate on content from mobile devices of their choosing,”
  • 27. Confidential 27 Benefits of Accellion in LBoC • Productivity gains • Cost savings through reduced accommodation requirements • Happier employees through council-wide support for mobile file-sharing • Extend existing ECM investments + improve adoption • Track and report on all file sharing activities • A quick win – made IT look good!
  • 30. Confidential 30 White Papers • 5 Best Practices for Secure Enterprise Content Mobility • BYOD File Sharing – Go Private Cloud to Mitigate Data Risks • Mobilize SharePoint Securely: Top 5 Enterprise Requirements • 10 Mobile Security Requirements for BYOD • + more
  • 31. Confidential 31 Summary • Support multiple mobile platforms • Block consumer-class services • Extend Security to every file and device • Integrate Secure Productivity capabilities • Select Private Cloud for maximum data security • Connect to enterprise content management systems
  • 32. Confidential 32 Thank you www.accellion.com @accellion www.linkedin.com/company/accellion www.facebook.com/Accellion jes.breslaw@accellion.com @jesbreslaw “Now we have a solution that’s integrated with our MDM solution and SharePoint, allowing us to securely mobilise our most important content and make BYOD a reality.” Ian Lawrence - IT Manager London Borough of Camden

Notas do Editor

  1. This is a need that is cross industry Access, create & share information anywhere Challenge is iPad disrupted ‘how’ we use information = dropbox problem = data leakage also skydrive, icloud and other free tools
  2. This is the problem, 1.3bn mobile workers = in YOUR organisation Why are we excited? Productivity gains,
  3. INTEL - 23,500 BYOD, employees saving on average 57 mins (5 million hours in 2012) Federal agencies - 76% believe mobile devices increased productivity = 1 h 48 min per day (2013 Digital Dilemma, Telework Exchange) Mobile data access can help police officers save 30 minutes every day. (Deloitte: Gov. on the Go: Boosting Public-Sector Productivity by Going Mobile) Tablet users gain 66mins extra productivity CDW Tablet Poll Dec 2012
  4. Duplication of data in file sharing apps Users want to create and edit documents People want to collaborate outside of your firewall
  5. Paperless Office: Drive out 30 KM of paper through the Council wide adoption of electronic records and document management •Anytime, Anywhere Working: Enable staff to access Council IT systems from any internet connected location •Secure Any Device, Any Platform Access: Enable staff to bring their own devices and access the Council’s network (including personal computers and telephones) •Networking Our Staff, Socialising our Knowledge: transform collaboration through social media, video conferencing, messaging and shared working & new intranet •Modernise Core Technologies: Deploy modern versions of Microsoft Office, Internet Explorer and e-mail so staff have access to the latest features that help everyone to work more productively
  6. Paperless Office: Drive out 30 KM of paper through the Council wide adoption of electronic records and document management •Anytime, Anywhere Working: Enable staff to access Council IT systems from any internet connected location •Secure Any Device, Any Platform Access: Enable staff to bring their own devices and access the Council’s network (including personal computers and telephones) •Networking Our Staff, Socialising our Knowledge: transform collaboration through social media, video conferencing, messaging and shared working & new intranet •Modernise Core Technologies: Deploy modern versions of Microsoft Office, Internet Explorer and e-mail so staff have access to the latest features that help everyone to work more productively
  7. Paperless Office: Drive out 30 KM of paper through the Council wide adoption of electronic records and document management •Anytime, Anywhere Working: Enable staff to access Council IT systems from any internet connected location •Secure Any Device, Any Platform Access: Enable staff to bring their own devices and access the Council’s network (including personal computers and telephones) •Networking Our Staff, Socialising our Knowledge: transform collaboration through social media, video conferencing, messaging and shared working & new intranet •Modernise Core Technologies: Deploy modern versions of Microsoft Office, Internet Explorer and e-mail so staff have access to the latest features that help everyone to work more productively
  8. The London Borough of Camden needed to find a mobile file sharing solution that provided: Internal controls: The Borough needed ultimate authority about where and how its corporate data was stored, accessed and transferred. Impact levels: Government regulations mandate different levels of security and access dependent on the type of data, such as personal identification. The organization needed a solution that could support varying impact levels (ILs), which are outlined by government standards, to differentiate access availability. Multiple deployment options: While the organization required that data be stored on-premise, it wanted the flexibility to move to a public cloud or hybrid environment in the future, if desired. SharePoint integration: The organization invested in SharePoint as its primary content repository and so needed to ensure that mobile users could continue to access SharePoint as needed, from anywhere, eliminating the need to turn to consumer-based file sharing workarounds, such as Dropbox, which was banned from use by the Borough. Seamless workflows: The solution of choice had to be intuitive, allowing both employees and external third parties to quickly locate and securely share desired documents, edit as needed and upload current versions. True collaboration: While sharing files was key, employees also needed to be able to share ideas – providing comments and input about works in progress via a shared workspace. Audit trail: To maintain compliance with BYOD guidelines from the Information Commission Office (ICO) and prevent potentially large fines, the Borough required a solution that automatically tracked all data changes and mobile file sharing activities. Multi-layered authentication: Mobile data access was required to be authenticated via LDAP, as well as via an assigned user pin number.
  9. The London Borough of Camden needed to find a mobile file sharing solution that provided: Internal controls: The Borough needed ultimate authority about where and how its corporate data was stored, accessed and transferred. Impact levels: Government regulations mandate different levels of security and access dependent on the type of data, such as personal identification. The organization needed a solution that could support varying impact levels (ILs), which are outlined by government standards, to differentiate access availability. Multiple deployment options: While the organization required that data be stored on-premise, it wanted the flexibility to move to a public cloud or hybrid environment in the future, if desired. SharePoint integration: The organization invested in SharePoint as its primary content repository and so needed to ensure that mobile users could continue to access SharePoint as needed, from anywhere, eliminating the need to turn to consumer-based file sharing workarounds, such as Dropbox, which was banned from use by the Borough. Seamless workflows: The solution of choice had to be intuitive, allowing both employees and external third parties to quickly locate and securely share desired documents, edit as needed and upload current versions. True collaboration: While sharing files was key, employees also needed to be able to share ideas – providing comments and input about works in progress via a shared workspace. Audit trail: To maintain compliance with BYOD guidelines from the Information Commission Office (ICO) and prevent potentially large fines, the Borough required a solution that automatically tracked all data changes and mobile file sharing activities. Multi-layered authentication: Mobile data access was required to be authenticated via LDAP, as well as via an assigned user pin number.
  10. Paperless Office: Drive out 30 KM of paper through the Council wide adoption of electronic records and document management •Anytime, Anywhere Working: Enable staff to access Council IT systems from any internet connected location •Secure Any Device, Any Platform Access: Enable staff to bring their own devices and access the Council’s network (including personal computers and telephones) •Networking Our Staff, Socialising our Knowledge: transform collaboration through social media, video conferencing, messaging and shared working & new intranet •Modernise Core Technologies: Deploy modern versions of Microsoft Office, Internet Explorer and e-mail so staff have access to the latest features that help everyone to work more productively
  11. The Accellion system is built around the Secure File Transfer core. This robust system has been successfully rolled out to thousands of customers; in industries ranging from Advertising and Pharmaceuticals. Document expiration, other access restrictions Secure collaboration is built around SFT, providing incremental features to support realtime collaboration with co-workers, business partners and customers while maintaining high levels of security, access control and auditabiity to address corporate and IT concerns.