SlideShare a Scribd company logo
1 of 51
3 Principles for
Simple, Secure Sharing

1
We do business in a mobile, cloud-based, connected
environment – and it’s not slowing down.

2
We do business in a mobile, cloud-based, connected
environment – and it’s not
slowing down.
The projected world wide shipments of smartphones
and tablets in 2014 is expected
to reach 2.2 billion. (Gartner)

3
Not only are we
buying more
smartphones and
tablets – we’re using
them for work.

4
Not only are we
buying more
smartphones and
tablets – we’re using
them for work.

81% of Americans use their
personal mobile devices for work.
(Gartner)

5
Not only are we
buying more
smartphones and
tablets – we’re using
them for work.
By 2017, half of employers will
require employees to supply their
own device for work purposes.
(Gartner)

81% of Americans use their
personal mobile devices for work.
(Gartner)

6
The BYOD (bring your own device) movement has
fueled the growth of mobility in businesses of all
sizes – from enterprises to SMBs.

7
The BYOD (bring your own device) movement has
fueled the growth of mobility in businesses of all
sizes – from enterprises to SMBs.
The BYOD and enterprise mobility market is expected
to grow at the rate of 15% annually –
up to $181 billion by 2017. (Computer World)

8
But for all of the convenience and cost savings that
mobile devices can bring to the workplace –
there’s one big problem…

9
But for all of the convenience and cost savings that
mobile devices can bring to the workplace –
there’s one big problem…

SECURITY

10
There is a pressing
need for secure
sharing…

11
There is a pressing
need for secure
sharing…

Whether you’re sharing between computers,

12
There is a pressing
need for secure
sharing…

Whether you’re sharing between computers,
between mobile devices,

13
There is a pressing
need for secure
sharing…

Whether you’re sharing between computers,
between mobile devices,
Or anywhere across the cloud.

14
The risks of insecure sharing are rampant
no matter which platform you’re using.

15
The risks of insecure sharing are rampant
no matter which platform you’re using.

According to the Leaking Vault, over 1.29 billion
records were disclosed internationally between 2005
and 2011.

16
The risks of insecure sharing are rampant
no matter which platform you’re using.

17
Deliberate theft and stealing.

18
Deliberate theft and stealing.

Employee error or carelessness.

19
Deliberate theft and stealing.

Employee error or carelessness.

Lost or stolen devices.

20
Deliberate theft and stealing.

Employee error or carelessness.

Lost or stolen devices.

Insecure channels of sharing.

21
Sharing information across the cloud
is essential - but risky.

In order to keep information secure, organizations
need to adopt security practices that offer protection at
the document level.

22
Why at the document level?

23
Why at the document level?
BYOD devices may not have sufficient security to
protect important data.

24
Why at the document level?
BYOD devices may not have sufficient security to
protect important data.
Password protected devices can be lost or stolen, and
then cracked.

25
Why at the document level?
BYOD devices may not have sufficient security to
protect important data.
Password protected devices can be lost or stolen, and
then cracked.
Forwarded or shared documents could be accessed
by third parties without your authorization.

26
By following three principles for simple, secure
sharing, an organization can stay mobile and
connected – without risking a security breach.

27
If content security measures are too difficult,
they simply won’t be used.

28
If content security measures are too difficult,
they simply won’t be used.

47% of employees using personal mobile devices at
work do not believe they are “in compliance” with their
company’s mobile device policy.

29
Employees engage in risky behavior with mobile
devices and content despite knowing better.

30
Employees engage in risky behavior with mobile
devices and content despite knowing better.
36% click on unverified links from social media.

31
Employees engage in risky behavior with mobile
devices and content despite knowing better.
36% click on unverified links from social media.
11% use cloud services to send/share work
documents without IT permission.

32
Employees engage in risky behavior with mobile
devices and content despite knowing better.
36% click on unverified links from social media.
11% use cloud services to send/share work
documents without IT permission.
12% store work passwords on their devices.

33
Principle
#1

A content security solution has to be easy
to use.

34
Principle
#1

A content security solution has to be easy
to use.

Integrated into the preferred sharing platform
(web, email or mobile).

35
Principle
#1

A content security solution has to be easy
to use.

Integrated into the preferred sharing platform
(web, email or mobile).
No complicated infrastructure requirements.

36
Principle
#1

A content security solution has to be easy
to use.

Integrated into the preferred sharing platform
(web, email or mobile).
No complicated infrastructure requirements.

No extra burden on the IT department.

37
Principle
#2

Secure, simple sharing also means
sharing across multiple device types.

38
Principle
#2

Secure, simple sharing also means
sharing across multiple device types.

Embracing BYOD means handling the security needs
for multiple device types.

39
Principle
#2

Secure, simple sharing also means
sharing across multiple device types.

Embracing BYOD means handling the security needs
for multiple device types.
In a recent survey from IDC, IT managers
underestimated the number of consumer
Devices n their networks by 50%.

40
Principle
#3

Simple, secure sharing solutions need
to address multiple file types.

41
Principle
#3

Simple, secure sharing solutions need
to address multiple file types.

We live in a multimedia environment. We share:

42
Principle
#3

Simple, secure sharing solutions need
to address multiple file types.

We live in a multimedia environment. We share:
Documents

43
Principle
#3

Simple, secure sharing solutions need
to address multiple file types.

We live in a multimedia environment. We share:
Documents

Videos

44
Principle
#3

Simple, secure sharing solutions need
to address multiple file types.

We live in a multimedia environment. We share:
Documents

Videos

PDFs

45
Principle
#3

Simple, secure sharing solutions need
to address multiple file types.

We live in a multimedia environment. We share:
Documents

Videos

PDFs

Images

46
Principle
#3

Simple, secure sharing solutions need
to address multiple file types.

We live in a multimedia environment. We share:
Documents

Videos

PDFs

Images

And more

47
Principle
#3

Simple, secure sharing solutions need
to address multiple file types.

A simple, secure sharing solution has to work with
multiple file types to support the real world business
environment.

48
Simple, secure sharing is possible – across mobile
devices, the cloud or through an API.

49
Content Raven provides:
Simple, one-click encryption for multiple file types.
Actionable analytics to track and control
content sharing.
API integration.
And more!
Sign up for free at: www.contentraven.com

More Related Content

What's hot

SmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTSmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoT
Shiven Chawla
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
ijcsit
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 

What's hot (20)

Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon
 
SmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTSmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoT
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
 
188
188188
188
 
Security economics
Security economicsSecurity economics
Security economics
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 

Viewers also liked

11 hund mashin mehanizmiin ashiglaltiin tehnikch
11 hund mashin mehanizmiin ashiglaltiin tehnikch11 hund mashin mehanizmiin ashiglaltiin tehnikch
11 hund mashin mehanizmiin ashiglaltiin tehnikch
mergejil
 
29 tsetserlegt hureelengiin tsetserlegch
29 tsetserlegt hureelengiin tsetserlegch29 tsetserlegt hureelengiin tsetserlegch
29 tsetserlegt hureelengiin tsetserlegch
mergejil
 

Viewers also liked (14)

Sam’s club’s vp sees need for industry sourcing standards
Sam’s club’s vp sees need for industry sourcing standardsSam’s club’s vp sees need for industry sourcing standards
Sam’s club’s vp sees need for industry sourcing standards
 
Indonesia Digital Publishing Landscape
Indonesia Digital Publishing LandscapeIndonesia Digital Publishing Landscape
Indonesia Digital Publishing Landscape
 
Mktg2023 assessment lit review
Mktg2023 assessment lit reviewMktg2023 assessment lit review
Mktg2023 assessment lit review
 
Report companies law committee 2016
Report companies law committee 2016 Report companies law committee 2016
Report companies law committee 2016
 
11 hund mashin mehanizmiin ashiglaltiin tehnikch
11 hund mashin mehanizmiin ashiglaltiin tehnikch11 hund mashin mehanizmiin ashiglaltiin tehnikch
11 hund mashin mehanizmiin ashiglaltiin tehnikch
 
29 tsetserlegt hureelengiin tsetserlegch
29 tsetserlegt hureelengiin tsetserlegch29 tsetserlegt hureelengiin tsetserlegch
29 tsetserlegt hureelengiin tsetserlegch
 
INTRODUCTION LETTER REVISED
INTRODUCTION LETTER REVISEDINTRODUCTION LETTER REVISED
INTRODUCTION LETTER REVISED
 
vanderbilt_degree
vanderbilt_degreevanderbilt_degree
vanderbilt_degree
 
Mktg2023 assessment exam
Mktg2023 assessment examMktg2023 assessment exam
Mktg2023 assessment exam
 
Veno strong presentation
Veno strong presentationVeno strong presentation
Veno strong presentation
 
A narrative conceptualization map
A narrative conceptualization mapA narrative conceptualization map
A narrative conceptualization map
 
Consignas
ConsignasConsignas
Consignas
 
Microbiologia Geral - Crescimento Microbiano
Microbiologia Geral - Crescimento MicrobianoMicrobiologia Geral - Crescimento Microbiano
Microbiologia Geral - Crescimento Microbiano
 
Therapeutic journalling
Therapeutic journallingTherapeutic journalling
Therapeutic journalling
 

Similar to Three Principals for Simple, Secure Content Sharing

kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
Onwubiko Emmanuel
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
jeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
odiliagilby
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
AIRCC Publishing Corporation
 

Similar to Three Principals for Simple, Secure Content Sharing (20)

Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
sample assignment
sample assignmentsample assignment
sample assignment
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 

More from Content Raven

More from Content Raven (8)

3 Common Sales Enablement Flaws & How to Fix Them
3 Common Sales Enablement Flaws & How to Fix Them3 Common Sales Enablement Flaws & How to Fix Them
3 Common Sales Enablement Flaws & How to Fix Them
 
Case Study - Cost Savings and Secure Digital Content Distribution
Case Study - Cost Savings and Secure Digital Content DistributionCase Study - Cost Savings and Secure Digital Content Distribution
Case Study - Cost Savings and Secure Digital Content Distribution
 
Case Study - Customer Training
Case Study - Customer TrainingCase Study - Customer Training
Case Study - Customer Training
 
Case Study - Global Sales Training
Case Study - Global Sales TrainingCase Study - Global Sales Training
Case Study - Global Sales Training
 
Video+
Video+Video+
Video+
 
Sales Enablement Infographic
Sales Enablement InfographicSales Enablement Infographic
Sales Enablement Infographic
 
Training infographic
Training infographicTraining infographic
Training infographic
 
Self Paced Labs
Self Paced LabsSelf Paced Labs
Self Paced Labs
 

Recently uploaded

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 

Recently uploaded (20)

Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 

Three Principals for Simple, Secure Content Sharing

  • 1. 3 Principles for Simple, Secure Sharing 1
  • 2. We do business in a mobile, cloud-based, connected environment – and it’s not slowing down. 2
  • 3. We do business in a mobile, cloud-based, connected environment – and it’s not slowing down. The projected world wide shipments of smartphones and tablets in 2014 is expected to reach 2.2 billion. (Gartner) 3
  • 4. Not only are we buying more smartphones and tablets – we’re using them for work. 4
  • 5. Not only are we buying more smartphones and tablets – we’re using them for work. 81% of Americans use their personal mobile devices for work. (Gartner) 5
  • 6. Not only are we buying more smartphones and tablets – we’re using them for work. By 2017, half of employers will require employees to supply their own device for work purposes. (Gartner) 81% of Americans use their personal mobile devices for work. (Gartner) 6
  • 7. The BYOD (bring your own device) movement has fueled the growth of mobility in businesses of all sizes – from enterprises to SMBs. 7
  • 8. The BYOD (bring your own device) movement has fueled the growth of mobility in businesses of all sizes – from enterprises to SMBs. The BYOD and enterprise mobility market is expected to grow at the rate of 15% annually – up to $181 billion by 2017. (Computer World) 8
  • 9. But for all of the convenience and cost savings that mobile devices can bring to the workplace – there’s one big problem… 9
  • 10. But for all of the convenience and cost savings that mobile devices can bring to the workplace – there’s one big problem… SECURITY 10
  • 11. There is a pressing need for secure sharing… 11
  • 12. There is a pressing need for secure sharing… Whether you’re sharing between computers, 12
  • 13. There is a pressing need for secure sharing… Whether you’re sharing between computers, between mobile devices, 13
  • 14. There is a pressing need for secure sharing… Whether you’re sharing between computers, between mobile devices, Or anywhere across the cloud. 14
  • 15. The risks of insecure sharing are rampant no matter which platform you’re using. 15
  • 16. The risks of insecure sharing are rampant no matter which platform you’re using. According to the Leaking Vault, over 1.29 billion records were disclosed internationally between 2005 and 2011. 16
  • 17. The risks of insecure sharing are rampant no matter which platform you’re using. 17
  • 18. Deliberate theft and stealing. 18
  • 19. Deliberate theft and stealing. Employee error or carelessness. 19
  • 20. Deliberate theft and stealing. Employee error or carelessness. Lost or stolen devices. 20
  • 21. Deliberate theft and stealing. Employee error or carelessness. Lost or stolen devices. Insecure channels of sharing. 21
  • 22. Sharing information across the cloud is essential - but risky. In order to keep information secure, organizations need to adopt security practices that offer protection at the document level. 22
  • 23. Why at the document level? 23
  • 24. Why at the document level? BYOD devices may not have sufficient security to protect important data. 24
  • 25. Why at the document level? BYOD devices may not have sufficient security to protect important data. Password protected devices can be lost or stolen, and then cracked. 25
  • 26. Why at the document level? BYOD devices may not have sufficient security to protect important data. Password protected devices can be lost or stolen, and then cracked. Forwarded or shared documents could be accessed by third parties without your authorization. 26
  • 27. By following three principles for simple, secure sharing, an organization can stay mobile and connected – without risking a security breach. 27
  • 28. If content security measures are too difficult, they simply won’t be used. 28
  • 29. If content security measures are too difficult, they simply won’t be used. 47% of employees using personal mobile devices at work do not believe they are “in compliance” with their company’s mobile device policy. 29
  • 30. Employees engage in risky behavior with mobile devices and content despite knowing better. 30
  • 31. Employees engage in risky behavior with mobile devices and content despite knowing better. 36% click on unverified links from social media. 31
  • 32. Employees engage in risky behavior with mobile devices and content despite knowing better. 36% click on unverified links from social media. 11% use cloud services to send/share work documents without IT permission. 32
  • 33. Employees engage in risky behavior with mobile devices and content despite knowing better. 36% click on unverified links from social media. 11% use cloud services to send/share work documents without IT permission. 12% store work passwords on their devices. 33
  • 34. Principle #1 A content security solution has to be easy to use. 34
  • 35. Principle #1 A content security solution has to be easy to use. Integrated into the preferred sharing platform (web, email or mobile). 35
  • 36. Principle #1 A content security solution has to be easy to use. Integrated into the preferred sharing platform (web, email or mobile). No complicated infrastructure requirements. 36
  • 37. Principle #1 A content security solution has to be easy to use. Integrated into the preferred sharing platform (web, email or mobile). No complicated infrastructure requirements. No extra burden on the IT department. 37
  • 38. Principle #2 Secure, simple sharing also means sharing across multiple device types. 38
  • 39. Principle #2 Secure, simple sharing also means sharing across multiple device types. Embracing BYOD means handling the security needs for multiple device types. 39
  • 40. Principle #2 Secure, simple sharing also means sharing across multiple device types. Embracing BYOD means handling the security needs for multiple device types. In a recent survey from IDC, IT managers underestimated the number of consumer Devices n their networks by 50%. 40
  • 41. Principle #3 Simple, secure sharing solutions need to address multiple file types. 41
  • 42. Principle #3 Simple, secure sharing solutions need to address multiple file types. We live in a multimedia environment. We share: 42
  • 43. Principle #3 Simple, secure sharing solutions need to address multiple file types. We live in a multimedia environment. We share: Documents 43
  • 44. Principle #3 Simple, secure sharing solutions need to address multiple file types. We live in a multimedia environment. We share: Documents Videos 44
  • 45. Principle #3 Simple, secure sharing solutions need to address multiple file types. We live in a multimedia environment. We share: Documents Videos PDFs 45
  • 46. Principle #3 Simple, secure sharing solutions need to address multiple file types. We live in a multimedia environment. We share: Documents Videos PDFs Images 46
  • 47. Principle #3 Simple, secure sharing solutions need to address multiple file types. We live in a multimedia environment. We share: Documents Videos PDFs Images And more 47
  • 48. Principle #3 Simple, secure sharing solutions need to address multiple file types. A simple, secure sharing solution has to work with multiple file types to support the real world business environment. 48
  • 49. Simple, secure sharing is possible – across mobile devices, the cloud or through an API. 49
  • 50. Content Raven provides: Simple, one-click encryption for multiple file types. Actionable analytics to track and control content sharing. API integration. And more!
  • 51. Sign up for free at: www.contentraven.com