Thinking outside the (Drop)box: PKWARE targets enterprise file-share encryption

Size: px
Start display at page:

Download "Thinking outside the (Drop)box: PKWARE targets enterprise file-share encryption"

Transcription

1 Thinking outside the (Drop)box: PKWARE targets enterprise file-share encryption Analyst: Garrett Bekker 6 Jun, 2014 Veteran encryption and file-compression vendor PKWARE entered the market for securing data on popular file-sharing services in 2012 with a consumer-oriented offering (Viivo) that, at the time, was focused mainly on Dropbox. Since we last wrote about the company, PKWARE has introduced a bulked-up version of Viivo that now includes support for enterprise file sync and share (FSS) offerings from Bitcasa, Box, Barracuda's Copy, Google Drive, Microsoft's OneDrive and SugarSync, as well as a variety of device types (Mac, Windows, ios and Android). Viivo 2.5 also includes the ability to search and preview protected files and discover unknown cloud file shares, all intended to help Viivo stand out among a growing crowd of competitors. The 451 Take Viivo has come a long way in the past year, with an enterprise version that includes a variety of new features and one of the broadest coverage models we know of. The recent product enhancements, along with PKWARE's enterprise pedigree, could help ease enterprise concerns regarding the adoption of cloud-based FSS services and the long-term viability of some its freshly minted peers not to mention an attractive cross-selling opportunity. However, while the 'Dropbox problem' remains a thorn in the side of many organizations struggling to come to grips with rogue employee use of cloud-based file-sharing services, enterprise adoption of cloud-based FSS platforms remains tepid, with many organizations clinging to a preference for behind-the-firewall file sharing. Still, Dropbox isn't going away anytime soon, and although Viivo does have the ability to help secure on-premises data, PKWARE is betting that enterprise resistance will gradually soften. Meanwhile, the market Copyright The 451 Group 1

2 remains in flux, and a hybrid product could ultimately emerge as the winning strategy. Context PKWARE has a full suite of file compression and encryption products that span a variety of devices and deployment models, including desktops, mobile devices, servers and mainframes. The company was founded in 1986 by the late Phil Katz, the inventor of PKZIP compression, and the 'PK' of 'PKWARE,' who passed away in 2000 at the age of 37. CEO Miller Newton joined PKWARE in 2009, after serving as CEO of applications and management software vendor Netkey, Lavastorm Analytics, and online jobsite Monster.com (now Monster Worldwide). The company is headquartered in Milwaukee, with offices in New York, London and Ohio, with approximately 70 employees. PKWARE claims to have more than 35,000 customers globally, including more than 200 government entities. Although the company doesn't disclose financial information, we estimate revenue comfortably in the eight-digit range. PKWARE has raised an undisclosed amount of private equity funding from Montreal-based Novacap and Chicago-based Maranon Capital. Products As we have noted in past reports, there is a growing list of companies looking to enable secure sharing, sync, and storage of files and data. The group can be roughly divided into two camps: vendors that are looking to provide a layer of encryption and security on top of public cloud FSS services, like Box and Dropbox, and those that offer a complete platform that is intended to serve as a secure alternative to existing FSS services. PKWARE falls in the former camp, launching its Viivo offering in 2012 as a 'freemium' product providing file encryption for Dropbox users, mainly consumers or 'prosumers.' Like most of its peers, Viivo's core technology is agent-based, and utilizes client-side encryption to encrypt files that are stored on Box, Dropbox, etc. Similar to other FSS encryption providers, Viivo uses a combination of symmetric RSA crypto to secure the files while using asymmetric PKI-based encryption to secure the symmetric keys. Once users have downloaded the software and created an ID and password, they simply place files in their Viivo folder, sync the folder with their FSS provider, and select users with whom to share files on the FSS provider's website each one receives its own unique key. Viivo takes a 'trust no one' approach neither Viivo's nor the FSS provider's servers have access to unencrypted files or keys, leaving customers with full control over their data and the ability to revoke access to files at any time, regardless of their location. Copyright The 451 Group 2

3 Since we last wrote about PKWARE, the company has launched an enterprise version of Viivo and expanded the coverage model beyond Dropbox to include support for Box, Google Drive, Barracuda's Copy, Microsoft's OneDrive, SugarSync and Bitcasa. New features include file name encryption, multi-factor authentication and encryption for ios (Android is expected soon). Other new features include deeper integration with Dropbox for automatic share detection, automatic key management and key exchange for Dropbox shares, as well as deeper integration with Box. Cross-platform support is also a big part of the PKWARE story. In addition to supporting a wide variety of FSS platforms, Viivo plans to support a variety of encryption methods, including PGP and X.509 certificates, and will potentially add the ability to retrieve security artifacts via LDAP or private key storage tools like SafeNet's Luna HSM. Another interesting feature is Viivo's ability to monitor data egress and discover files located in other FSS platforms that enterprise IT admins may have been unaware of. Once Viivo discovers unprotected files in other cloud environments, admins can receive alerts regarding where the data is going and whether it is protected. Viivo also includes dashboard and reporting capabilities that can help pinpoint potential areas of abuse. One of Viivo's interesting features is the ability to preserve the functionality of application features such as search and preview, without affecting existing application workflows, similar in principle to SaaS encryption vendors like CipherCloud, PerspecSys and Vaultive. While the latter utilizes a proxy-gateway approach, Viivo provides users with two folders an encrypted folder within the cloud service provider's environment and an unprotected folder on the local device, which maintains 'persistently decrypted' local copies. Users can perform search, sort and preview on the unprotected local files, which are automatically synced with the encrypted copies on the FSS provider's servers. Of course, this presumes that the local device is in safe hands. While this feature may be convenient, we suspect firms in more restrictive environments may have concerns about lost or stolen laptops, and may opt for additional security measures, such as strong authentication (Viivo has a partnership with Toopher) and MDM, or just disable this feature entirely. It's probably worth keeping in mind, however, that Viivo's primary raison d'être is keeping files safe from the prying eyes of Box, Dropbox, etc., not whole disk encryption PKWARE already has products for that (SecureZIP), and could look to combine some of that functionality with Viivo down the road. In the not uncommon event that a user forgets their password, Viivo utilizes a split-key feature that stores part of the user's private key on Viivo's servers, and a recovery code on any previously authenticated device. As long as the user has access to the original account and is attempting recovery from a previously authenticated physical device, the password that is used to encrypt the private key can be recovered. And of course, if users can't recover their password, the loss isn't necessarily catastrophic, since users have unencrypted copies on their local devices. Copyright The 451 Group 3

4 Strategy Although Viivo started out with a freemium version targeting the 'prosumer' market, the enterprise market has been a primary focus since the launch of the enterprise version in October The free version of Viivo is still available for personal files and for sharing files with non-viivo users, as well as on a 14-day trial basis for enterprise customers. The enterprise version of Viivo follows standard per-user-per-month pricing, starting at $9.99. Unlike most of its startup peers, PKWARE is already on the vendor list of its 35,000 enterprise customers across the usual industries of financial services, healthcare and government many of which are potentially ripe targets for cross-selling Viivo as a complement to their existing encryption and compression products. Ultimately, we could see the logic of combining Viivo with PKWARE's SecureZIP Desktop product for Windows file encryption. Competition The FSS market is very competitive, and the race to secure the various flavors of FSS offerings is running rapidly, with new startups entering the fray and existing vendors adding new features and support for a growing list of FSS platforms. As noted above, we segment the field of entrants into two camps: those like PKWARE that provide security layered on top of existing FSS services such as Box or Dropbox (Cloudfogger, Invenia AS [Ensafer], ncrypted Cloud, Sookasa and SafeMonk [SafeNet]), and vendors that are looking to provide a complete enterprise alternative to consumer-oriented FSS platforms with security and file storage combined (Accellion, Covata, Egnyte, Intralinks, WatchDox, onecloud, AdeptCloud [Hightail] and TeamDrive). In the former camp, vendors can be further grouped according to market focus (consumer/smb/enterprise) and coverage models (Box, Dropbox, Google Drive, Microsoft's OneDrive, Barracuda's Copy, Bitcasa, etc.). On the 'prosumer' side, Viivo claims it is most likely to encounter Boxcryptor (Secomba) and Cloudfogger, while it considers its primary enterprise rival to be Sookasa, given a somewhat similar architecture, as well as ncrypted Cloud and SafeMonk. Both ncrypted Cloud and SafeMonk provide encryption for files stored in Dropbox, although ncrypted Cloud recently added support for Google Drive and OneDrive. SafeMonk remains completely focused on Dropbox for the foreseeable future. Content Raven is taking a hybrid approach, with the ability to layer security on top of public FSS services, in addition to providing a complete FSS platform. Given its ability to discover cloud file shares, Viivo is also beginning to overlap somewhat with cloud Copyright The 451 Group 4

5 application control (CAC) vendors such as Adallom, Netskope and Skyhigh Networks, which have the ability to discover cloud applications, as well as SaaS encryption vendors such as CipherCloud and PerspecSys, which have recently announced a discovery component to their offerings in an effort to help enterprises get a better handle on exactly what their employees are doing. While members of the former group are likely to be less direct competitors with Viivo, there is the potential to compete for budget dollars. Logically, providers of cloud file-sharing services could also be viewed as potential competitors, given that the market is highly competitive and the perceived lack of adequate security controls could be a hurdle to greater enterprise adoption. To illustrate, Box has added security features of its own with the recent acquisition of security analytics vendor dloop, to provide granular info on what is happening with files stored within Box, while Dropbox has also beefed up its internal security team. SWOT Analysis Strengths Weaknesses PKWARE has a long history in compression and encryption, which could be a comfort for enterprise customers evaluating alternative providers that are barely out of stealth mode. With support for various FSS providers and encryption flavors, Viivo has one of the broader coverage models of its peer group. The ability to preserve key application features and to discover files in other cloud platforms could help Viivo stand out in a market that is already starting to look fairly homogenous. Opportunities Threats Until recently, the FSS market had been growing at a rapid clip, although the postponement of Box's planed IPO and recent S-1 filing have dampened market enthusiasm somewhat. The ability to cross-sell into PKWARE's customer base could be a key advantage over its less mature peers. The focus on cloud-based FSS platforms could scare some enterprise customers away, although Viivo does have the ability to support on-premises platforms like SharePoint. Like many of its peers, Viivo is agent-based, although many of PKWARE's existing enterprise customers already have PKWARE agents installed, which could help smooth adoption. FSS vendors like Box and Dropbox are bulking up their own security efforts, which could be good enough for some customers, and IT behemoths like Citrix, HP, IBM, Microsoft and Oracle are lurking. Copyright The 451 Group 5

6 Reproduced by permission of The 451 Group; This report was originally published within 451 Research's Market Insight Service. For additional information on 451 Research or to apply for trial access, go to: Copyright The 451 Group 6

ncrypted Cloud emerges from stealth mode with free data encryption offering

ncrypted Cloud emerges from stealth mode with free data encryption offering ncrypted Cloud emerges from stealth mode with free data encryption offering Analyst: Agatha Poon 12 Mar, 2013 Having emerged from stealth mode in early February, cloud storage security startup ncrypted

More information

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting

More information

Smartcrypt Encryption Key Management

Smartcrypt Encryption Key Management Smartcrypt Encryption Key Management Executive Summary Encryption key management is the cornerstone of any enterprise encryption solution. The National Institute of Standards and Technology (NIST) has

More information

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Introducing Databackup.com Cloud Backup File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Global Explosion of Data The demand for cloud storage is just getting started.

More information

SECURITY OF CLOUD STORAGE AND CLOUD COMPUTING

SECURITY OF CLOUD STORAGE AND CLOUD COMPUTING SECURITY OF CLOUD STORAGE AND CLOUD COMPUTING ECE 646 Final Presentation George Mason University GIRI PRANEETH KOMMALAPATI VENKAT RAMAN SRIPERUMBUDUR Introduction Save and access the files online. Data

More information

Accellion raises the bar in secure cloud-based file sharing

Accellion raises the bar in secure cloud-based file sharing Accellion raises the bar in secure cloud-based file sharing Analyst: Alan Pelz-Sharpe 4 Dec, 2012 Over the past couple of years, Accellion has been building out a highly secure enterprise collaboration

More information

Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15

Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15 Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15 Excerpt prepared for Egnyte, Inc. Publication Date: 28 Aug 2014 Product code: IT0021-000018 Richard Edwards Summary Catalyst

More information

Whitepaper. Simple and secure. Business requirements for Enterprise File Sync and Share solutions. www.brainloop.com

Whitepaper. Simple and secure. Business requirements for Enterprise File Sync and Share solutions. www.brainloop.com Whitepaper Simple and secure Business requirements for Enterprise File Sync and Share solutions www.brainloop.com Simplicity and security: business requirements for enterprise file sync and share solutions

More information

With $8.7m series A funding in the bag, Cirro looks to shore up its federation business

With $8.7m series A funding in the bag, Cirro looks to shore up its federation business With $8.7m series A funding in the bag, Cirro looks to shore up its federation business Analyst: Krishna Roy 11 Jun, 2014 Cirro is building a business in the integration sector, where it provides a federated

More information

EasiShare Whitepaper - Empowering Your Mobile Workforce

EasiShare Whitepaper - Empowering Your Mobile Workforce Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for

More information

Solve the Dropbox Problem with Enterprise Content Connectors. Whitepaper Solve the Dropbox Problem with Enterprise Content Connectors

Solve the Dropbox Problem with Enterprise Content Connectors. Whitepaper Solve the Dropbox Problem with Enterprise Content Connectors Solve the Dropbox Problem with Enterprise Content Connectors An Accellion Whitepaper Solve the Dropbox Problem with Enterprise Content Connectors Executive Summary Dropbox is one of the most popular services

More information

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Top. Reasons Federal Government Agencies Select kiteworks by Accellion Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government

More information

How To Secure Shareware Kiteworks By Accellion

How To Secure Shareware Kiteworks By Accellion Top 10 Reasons Universities Select kiteworks by Accellion Top 10 Reasons Universities Select kiteworks kiteworks by Accellion provides higher education institutions with secure wherever, whenever access

More information

Cloud Computing for Education Workshop

Cloud Computing for Education Workshop Cloud Computing for Education Workshop 2012 Copyright REZA CURTMOLA, NJIT Why Should You Learn This? Learn some useful software and services Backup and sync your materials for teaching Data reliability

More information

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1

More information

Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail

Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail Analyst: Javvad Malik 24 Sep, 2014 It's almost two years to the day since RSA acquired Web-fraud detection vendor

More information

Proposal. Deployment Guide. How to Use CloudBerry Drive with Oracle Storage Cloud Service WWW.CLOUDBERRYLAB.COM

Proposal. Deployment Guide. How to Use CloudBerry Drive with Oracle Storage Cloud Service WWW.CLOUDBERRYLAB.COM Proposal Deployment Guide How to Use CloudBerry Drive with Oracle Storage Cloud Service WWW.CLOUDBERRYLAB.COM Contents PRELIMINARY DETAILS... 3 LEGAL NOTICE... 3 INTRODUCTION... 4 HOW TO SIGN UP FOR ORACLE

More information

Elastica stretches to capture a wide range of SaaS security features with its CloudSOC

Elastica stretches to capture a wide range of SaaS security features with its CloudSOC Elastica stretches to capture a wide range of SaaS security features with its CloudSOC Analyst: Adrian Sanabria 31 Mar, 2015 Elastica is one of the more recent entries into the busy and popular cloud app

More information

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across

More information

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across

More information

Top. Reasons Legal Firms Select kiteworks by Accellion

Top. Reasons Legal Firms Select kiteworks by Accellion Top 10 Reasons Legal Firms Select kiteworks by Accellion Accellion Legal Customers Include: Top 10 Reasons Legal Firms Select kiteworks kiteworks by Accellion provides law firms with secure wherever, whenever

More information

Secure your data. Wherever it is, Wherever it goes, However it gets there...on all major platforms. For every user.

Secure your data. Wherever it is, Wherever it goes, However it gets there...on all major platforms. For every user. Secure your data. Wherever it is, Wherever it goes, However it gets there......on all major platforms. For every user. SecureZIP Product Family SecureZIP products are designed as enterprise-class, data-centric

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Information governance is old news at Nuix

Information governance is old news at Nuix Information governance is old news at Nuix Analyst: David Horrigan 18 Jul, 2014 Sydney-based software developer Nuix was one of the early tech proponents of information governance (IG), after being known

More information

Manual for Android 1.5

Manual for Android 1.5 Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor

More information

How To Manage A Privileged Account Management

How To Manage A Privileged Account Management Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least

More information

SOOKASA WHITEPAPER SECURITY SOOKASA.COM

SOOKASA WHITEPAPER SECURITY SOOKASA.COM SOOKASA WHITEPAPER SECURITY SOOKASA.COM Sookasa Overview Sookasa was founded in 2012 by a team of leading security experts. The company s patented file-level encryption enables enterprises to protect data

More information

Login Consultants touts lightweight automation tools for desktop and server deployments

Login Consultants touts lightweight automation tools for desktop and server deployments Login Consultants touts lightweight automation tools for desktop and server deployments Analyst: John Abbott 13 Jan, 2015 Login Consultants has been building new product businesses out of its custom development

More information

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

BYOD File Sharing Go Private Cloud to Mitigate Data Risks AN ACCELLION WHITE PAPER BYOD File Sharing Go Private Cloud to Mitigate Data Risks Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto, CA

More information

Mobile device and application management. Speaker Name Date

Mobile device and application management. Speaker Name Date Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more

More information

Protecting Data-at-Rest with SecureZIP for DLP

Protecting Data-at-Rest with SecureZIP for DLP Protecting Data-at-Rest with SecureZIP for DLP TABLE OF CONTENTS INTRODUCTION 3 PROTECTING DATA WITH DLP 3 FINDING INDIVIDUAL AND SHARED INFORMATION-AT-REST 4 METHODS FOR REMEDIATION 4 ENCRYPTING UNPROTECTED

More information

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks BYOD File Sharing - Go Private Cloud to Mitigate Data Risks An Accellion Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks Executive Summary The consumerization of IT and the popularity

More information

SecureAuth homes in on BYOD management and mobile app access

SecureAuth homes in on BYOD management and mobile app access SecureAuth homes in on BYOD management and mobile app access Analyst: Steve Coplan 16 Apr, 2012 Securing access to enterprise applications from smartphones and mobile tablets has percolated to the top

More information

www.egnyte.com The Hybrid Cloud Advantage White Paper

www.egnyte.com The Hybrid Cloud Advantage White Paper www.egnyte.com The Hybrid Cloud Advantage White Paper www.egnyte.com 2012 by Egnyte Inc. All rights reserved. Revised June 21, 2012 Why Hybrid is the Enterprise Cloud of Tomorrow All but the smallest of

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions [email protected] @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved

More information

Performance Analysis of Client Side Encryption Tools

Performance Analysis of Client Side Encryption Tools Performance Analysis of Client Side Encryption Tools Subrata Kumar Das 1, Md. Alam Hossain 2, Md. Arifuzzaman Sardar 3, Ramen Kumar Biswas 4, Prolath Dev Nath 5 Abstract Client side encryption tools are

More information

Internet File Management & HIPAA A Practical Approach towards Responding to the Privacy Regulation of the Act

Internet File Management & HIPAA A Practical Approach towards Responding to the Privacy Regulation of the Act White Paper Internet File Management & HIPAA A Practical Approach towards Responding to the Privacy Regulation of the Act The recent activation of the privacy requirement of the Health Insurance Portability

More information

Protecting Your Data On The Network, Cloud And Virtual Servers

Protecting Your Data On The Network, Cloud And Virtual Servers Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public

More information

Security and Privacy Considerations for BYOD

Security and Privacy Considerations for BYOD Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening

More information

Continuum courts MSPs with its backup and disaster-recovery service

Continuum courts MSPs with its backup and disaster-recovery service Continuum courts MSPs with its backup and disaster-recovery service Analyst: Dave Simpson 8 Apr, 2015 Continuum recently launched a backup and disaster-recovery service aimed at its traditional customer

More information

Market Trends: Secure File Sharing And Collaboration In The Enterprise, Q1 2014

Market Trends: Secure File Sharing And Collaboration In The Enterprise, Q1 2014 For: Security & Risk Professionals Market Trends: Secure File Sharing And Collaboration In The Enterprise, Q1 2014 by Heidi Shey, February 4, 2014 Key Takeaways Today s Workforce Needs And Key Business

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

11 Best Practices for Mobile Device Management (MDM)

11 Best Practices for Mobile Device Management (MDM) MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.

More information

The Challenge of Securing and Managing Data While Meeting Compliance

The Challenge of Securing and Managing Data While Meeting Compliance ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst

More information

Managing BitLocker With SafeGuard Enterprise

Managing BitLocker With SafeGuard Enterprise Managing BitLocker With SafeGuard Enterprise How Sophos provides one unified solution to manage device encryption, compliance and Microsoft BitLocker By Robert Zeh, Product Manager Full-disk encryption

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

Top. Enterprise Reasons to Select kiteworks by Accellion

Top. Enterprise Reasons to Select kiteworks by Accellion Top 10 Enterprise Reasons to Select kiteworks by Accellion Top 10 Enterprise Reasons to Select kiteworks Accellion enables enterprise organizations to enhance business productivity, while ensuring data

More information

EMA Radar for Workload Automation (WLA): Q2 2012

EMA Radar for Workload Automation (WLA): Q2 2012 EMA Radar for Workload Automation (WLA): Q2 2012 By Torsten Volk, Senior Analyst Enterprise Management Associates (EMA) June 2012 Introduction Founded in 2004, Network Automation focuses on automating

More information

Citrix announces 50% YoY revenue growth from cloud partners, Workspace Services

Citrix announces 50% YoY revenue growth from cloud partners, Workspace Services Citrix announces 50% YoY revenue growth from cloud partners, Workspace Services Analyst: Scott Ottaway Michael Coté 5 Jun, 2014 At Synergy, Citrix announced 50% YoY revenue growth via Citrix Service Providers,

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

On the Radar: CipherCloud

On the Radar: CipherCloud Cloud access security delivered on enterprise gateways Publication Date: 18 Feb 2015 Product code: IT0022-000305 Rik Turner Summary Catalyst CipherCloud develops cloud visibility and security technology

More information

Enterprise Content Sharing: A Data Security Checklist. Whitepaper Enterprise Content Sharing: A Data Security Checklist

Enterprise Content Sharing: A Data Security Checklist. Whitepaper Enterprise Content Sharing: A Data Security Checklist Enterprise Content Sharing: A Data Security Checklist Executive Summary Secure file sharing, syncing, and productivity solutions enable mobile workers secure whenever, wherever access to files from any

More information

Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure

Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Analyst: Chris Hazelton 24 Aug, 2015 The fact that mobile computing is now displacing a share of 'traditional computing'

More information

EMA Radar for Application Discovery and Dependency Mapping (ADDM): Q4 2013. AppEnsure Profile

EMA Radar for Application Discovery and Dependency Mapping (ADDM): Q4 2013. AppEnsure Profile EMA Radar for Application Discovery and Dependency Mapping (ADDM): Q4 2013 By Dennis Drogseth, VP of Research ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report December 2013 AppEnsure Introduction Santa

More information

Contingency Access to Enterprise Encrypted Data

Contingency Access to Enterprise Encrypted Data T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents No option to escrow Passphrase protection zseries example Incorporating contingency key in zseries Windows command line example Incorporating

More information

How To Protect Your Data From Harm

How To Protect Your Data From Harm Brochure: Comprehensive Agentless Backup and Recovery Software for the Enterprise Comprehensive Agentless Backup and Recovery Software for the Enterprise BROCHURE Your company s single most valuable asset

More information

Backing up your digital image collection provides it with essential protection.

Backing up your digital image collection provides it with essential protection. Backing up your digital image collection provides it with essential protection. In this chapter, you ll learn more about your options for creating a reliable backup of your entire digital image library.

More information

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this

More information

File Sharing: Risk or Remedy?

File Sharing: Risk or Remedy? File Sharing: Risk or Remedy? End users need the right tools for document collaboration, and in the era of consumerization, they ll find them with or without you! Published: July 2012 1 Effective file

More information

AppDynamics is making strides with its Mobile Real-User Monitoring offering

AppDynamics is making strides with its Mobile Real-User Monitoring offering AppDynamics is making strides with its Mobile Real-User Monitoring offering Analyst: Raúl Castañón-Martínez 19 Nov, 2014 Our survey data shows that 86% of IT decision-makers plan to allocate a high or

More information

Security Architecture Whitepaper

Security Architecture Whitepaper Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer

More information

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this

More information

Comparing Box and Egnyte. White Paper

Comparing Box and Egnyte. White Paper White Paper Revised July, 2013 Introduction File storage in the cloud has broad appeal for individuals as well as large businesses. At a macro level, there are two types of file storage/sharing solutions:

More information

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data

More information

Zoho weaves more of its own apps together, pulls in threads to third-party software

Zoho weaves more of its own apps together, pulls in threads to third-party software 19 August 2009 IMPACT REPORT Zoho weaves more of its own apps together, pulls in threads to third-party software Analysts: China Martens & Kathleen Reidy When we last met with Zoho, the on-demand productivity

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

End-to-End Enterprise Encryption:

End-to-End Enterprise Encryption: End-to-End Enterprise Encryption: A Look at SecureZIP Technology T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents SecureZIP Executive Summary SecureZIP: The Next Generation of ZIP PKZIP:

More information

How To Grow A Cloud Computing Company

How To Grow A Cloud Computing Company Citrix touts new software-defined strategy, hyperconverged hardware and Workspace Cloud Analyst: Scott Ottaway John Abbott 23 Jan, 2015 At its annual partner conference, with 4,000 in attendance, Citrix

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

SAP White Paper Enterprise Mobility

SAP White Paper Enterprise Mobility SAP White Paper Enterprise Mobility Mobile Content and Document Management Best Practices and Decision Checklist Enterprise-Grade Solutions Give IT Much-Needed Security and Control Over Company Content

More information

Synergic Partners: Spanish big-data pioneer

Synergic Partners: Spanish big-data pioneer Synergic Partners: Spanish big-data pioneer Analyst: Katy Ring 20 Mar, 2015 Synergic Partners offers a services portfolio around data engineering, big data and data science. The company focuses on business

More information

WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW

WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW INTRODUCTION As businesses adopt new technologies that touch or leverage critical company data, maintaining the highest level of security is their

More information

Mac OS X User Manual Version 2.0

Mac OS X User Manual Version 2.0 Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)

More information