THIS MESSAGE WILL SELF-DESTRUCT: THE POWER OF COLLABORATION WITH AN EXPIRATION DATE



Similar documents
SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK

WatchDox for Windows. User Guide. Version 3.9.5

Whitepaper. Simple and secure. Business requirements for Enterprise File Sync and Share solutions.

Secure Data Sharing in the Enterprise

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Using Entrust certificates with Microsoft Office and Windows

Kony Mobile Application Management (MAM)

Secure Document Sharing & Online Workspaces for Financial Institutions

Storgrid EFS Access all of your business information securely from any device

How To Encrypt Documents In Sharepoint

WatchDox for Windows User Guide. Version 3.9.0

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

The Challenge of Securing and Managing Data While Meeting Compliance

WatchDox Administrator's Guide. Application Version 3.7.5

May 14 th, 2015 INTRODUCING WATCHDOX. And The ABC s Of Secure File Sharing. Jeff Holleran VP Corporate Strategy BlackBerry

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

Administration Guide. WatchDox Server. Version 4.8.0

Exchange 2010 ActiveSync: Connection

Enterprise Mobility Management: A Data Security Checklist. Whitepaper Enterprise Mobility Management: A Checklist for Securing Content

Ensuring Document Security Across Any Device with the WatchDox Platform

BYOD BEST PRACTICES GUIDE

ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators.

A Ready Business takes their office wherever they go

Mobile Data Leakage Prevention

USER MANUAL. v Windows Client January

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

How to install and use the File Sharing Outlook Plugin

SHARESYNC INTEGRATION DETAILS:

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Guide for Securing With WISeKey CertifyID Personal Digital Certificate (Personal eid)

User Guide. Version 3.0 April 2006

2015 USER GROUP CONFERENCE

Hosted Desktop for Business

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.

BlackBerry Enterprise Server Express

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

Seclore FileSecure. Securing Information Wherever it Goes. Extending Information Security Beyond Your Border

Data Storage on Mobile Devices Introduction to Computer Security Final Project

Citrix ShareFile helps law firms of all sizes with secure file sharing and storage.

Secure any data, anywhere. The Vera security architecture

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Mimecast Large File Send

EasiShare Whitepaper - Empowering Your Mobile Workforce

Cloud Backup and Recovery for Endpoint Devices

Recalling A Sent Message in Outlook 2010

File Sync And Share And The Future Of Work

5 Magical Things. Why Nomadesk is the right product for you

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

Installing your Digital Certificate & Using on MS Out Look 2007.

BBM Protected Secure mobile

Business Virtualization

Cloud Computing for Education Workshop

management solutions

imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2

Security Architecture Whitepaper

Citrix Enterprise Mobility Management Solutions

IBM United States Software Announcement , dated February 3, 2015

Business Case for Voltage Secur Mobile Edition

GREEN HOUSE DATA. Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

Welcome to Websense Archive Quick Start Guide

DJIGZO ENCRYPTION. Djigzo white paper

9 REASONS WHY ENTERPRISES CHOOSE VAULTIZE FOR ENDPOINT DATA PROTECTION

Receiving Secure from Citi For External Customers and Business Partners

Safeguard Protected Health Information With Citrix ShareFile

Webfusion Hosted Exchange 2010

Liquid Machines Document Control Client Version 7. Helpdesk Run Book and Troubleshooting Guide

Fus - Exchange ControlPanel Admin Guide Feb V1.0. Exchange ControlPanel Administration Guide

Whitepaper. Securing Data in Google Drive The Enterprise Guide to keeping corporate data safe in Google Drive. Introduction.

The CIO s Guide to HIPAA Compliant Text Messaging

What are the compliance challenges of Microsoft Office 365?

ANY TIME ANY PLACE ANY WHERE. JOEL SWEENEY and SHAUN BENNETTS XPERTEX

White Paper. The risks of authenticating with digital certificates exposed

Access All Your Files on All Your Devices

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Configure Outlook 2013 to connect to Hosted Exchange

CIPHERMAIL ENCRYPTION. CipherMail white paper

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

How to Send an Encrypted via KDADS' Outlook Client or Outlook Web Application

7 Risks Dropbox Poses to Your Corporate Data

AUT OneDrive for Business. Instructions for Using OneDrive on Windows Platform

Djigzo encryption. Djigzo white paper

Transcription:

THIS MESSAGE WILL SELF-DESTRUCT: THE POWER OF COLLABORATION WITH AN EXPIRATION DATE White Paper

2 This Message Will Self-Destruct: The Power of Collaboration with an Expiration Date Introduction There is a lot of technology that is occasionally ineffective, but hardly anything rivals the impotence of the Recall Message feature in Microsoft Outlook. Not only is its effectiveness spotty when you send a message to a colleague in your own organization, it is completely useless when you mistakenly send a message to an external recipient that you would dearly love to take back. Users of email have long lived with the fact that once a message is sent, it cannot practically be unsent. After all, the inspiration for email was snail mail, in which a message or file sent to someone took physical form, and taking it back would involve going to their home or office and physically grabbing it. A similar situation applies to shared files. The vast majority of shared files, even sensitive ones, have no practical means to be taken back or revoked from someone who has received them. Even the United States National Security Agency (NSA) resorted to the notion of originator control, or OrCon in NSA-speak, to try and control the dissemination of sensitive files. The problem with OrCon was that it operated entirely according to the honor system. Those curious about its effectiveness need only look at the trove of documents leaked by Edward Snowden, most of which were fruitlessly stamped OrCon by those who wished to maintain control over how they were shared and dearly wished they could have taken them back from Snowden and the journalists with whom he shared them.

3 The Basic Power of Ephemerality The Value of Revocable File Sharing In the digital world, it does not have to be that way. For a highly publicized example, one need not look further than the astounding growth of Snapchat, which as of this writing had more than 50 million users, and to a lesser extent similar apps like Wickr and Silent Circle. Snapchat s users seized on the fact that messages, or snaps, were not designed to be permanently shared, like posts on a Facebook wall or status updates. Rather, they were in the moment social interactions, and were better off disappearing. The benefits of the ephemerality of these interactions were clear unless consciously saved (and the sender would be alerted if the recipient took a screen capture), the messages went away, having served their purpose and incapable of haunting the sender again. The same should be true of most filebased collaborations, although likely they should last longer than the brief lifespans of most of Snapchat s users snaps. The average enterprise user creates between 3-5 gigabytes of files, up to 80% of which are not accessed for multiple years after they are saved to storage or a local hard drive. Much of that information is attached to emails and sent externally; sensitive files sent externally using common mechanisms like email and file sharing tools like Dropbox essentially will not disappear unless the recipients delete them. It s worthwhile to consider what file collaboration would be like if files did expire after a short period by default, unless they were required to be retained for a regulatory or business reason. e-discovery costs and data volumes The costs of keeping everything are also quite high. Security risks abound, as sensitive data is much harder to protect and keep track of if it does not expire in the hands of outside collaborators and is hoarded by internal users. That information hoarding can also have staggering costs if the organization becomes involved in legal proceedings the costs of ediscovery rise in line with data volumes, and keeping so many files for longer than necessary results in unnecessary legal risks (see chart below). Typical file volume per employee 3-5 GB Average pages per GB 10,000-75,000 ediscovery attorney cost $70 per hour Average reviewer productivity 55 documents per hour ediscovery estimated cost $380K per 1,000 employees 1 1 Baseline Magazine, Information Hoarding Wastes Money, by Anne Kershaw.

4 The Key to Expiration: Data-Centric Security The ability to revoke access to shared files has been around in its modern form since being implemented by Microsoft and Adobe a little over a decade ago and known as information or digital rights management, but only with the rise of online file sharing has it become so critical. Data-centric security embeds persistent controls in your files, so as they are shared with internal and external parties and across multiple devices they are always protected and tracked, including post-download. When they need to be revoked, they can disappear just like a Snap. The technical comparison is not exact; while Snapchat as a mobile only app has quite a bit of control over its data and was rumored to simply change a file s extension to make it inaccessible, data-centric security for files must take into account the desktop, mobile and web interfaces. Controls typically include restriction of document copy/paste, print, and sharing, and can add advanced features like dynamic watermarking and screen capture prevention. However, the key feature in this context is that it allows remote wipe of data, regardless of where a file has ended up. This is technically implemented by keeping files persistently encrypted and requiring users to authenticate to decrypt the file in memory to work with it. If a file has been made available offline, the decryption key is typically cached for a configurable period of time, after which it expires and the file recipient must re-authenticate online to ensure their access has not been changed or revoked. If the file has been expired or revoked, it remains in its encrypted state and as inaccessible as an old Snapchat message.

5 Key Takeaways As more and more people move toward collaboration methods that incorporate revocation or expiration, the enterprise file sync and share (EFSS) space appears to be moving in that direction as well. In the most recent Gartner research on the topic, analyst Mario de Boer identified data-centric security as one of the eight fundamental elements to consider in evaluating an EFSS solution. As of this paper s publication, WatchDox by BlackBerry and IntraLinks were major EFSS platforms with revocation and rights management capabilities, and numerous other vendors had announced that they are building similar functionality. This capability is particularly critical to factor into an organization s evaluation of an EFSS solution. It impacts not only an organization s ability to protect its file, but also both the economics and risks associated with hoarding files unnecessarily, in the hands of both the file owners and their collaborators. In the final analysis, users choices speak volumes, and the movement of consumers to Snapchat clearly presages a similar move for enterprises to EFSS tools with real expiration built in. WatchDox by BlackBerry enables organizations to access, protect and control their critical documents wherever they go: on any tablet, smartphone or PC, even those beyond the IT department s control. With WatchDox technology, organizations can collaborate securely with partners, safely adopt bring-your-own-device (BYOD) initiatives, and destroy their documents remotely if a device goes missing. More than 100 of the Fortune 1000 including many of the world s leading financial institutions, manufacturers and government agencies depend on WatchDox secure file-sharing solutions. Learn more at www.blackberry.com/watchdox 2015 BlackBerry. Trademarks, including but not limited to BLACKBERRY, EMBLEM Design, WATCHDOX, WATCHDOX & Design and WATCHDOX & EMBLEM Design are the trademarks or registered trademarks of BlackBerry Limited, its subsidiaries and/or affiliates, the exclusive rights to which are expressly reserved. All other trademarks are the property of their respective owners.