WHITE PAPER Thru for Enterprise File Sync and Sharing

Similar documents
EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

Cloud Backup and Recovery for Endpoint Devices

The Challenge of Securing and Managing Data While Meeting Compliance

Access All Your Files on All Your Devices

Powered by. FSS Buyer s Guide Why a File Sync & Sharing Solution is Critical for Your Business

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

ShareFile for enterprises

Secure Data Sharing in the Enterprise

EasiShare Whitepaper - Empowering Your Mobile Workforce

Cortado Corporate Server

5 Things You Need to Know About ipad in the Enterprise

Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile

Imperva Skyfence Secures Office 365 Access for Mobile Employees at Metro Bank

A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise

Citrix ShareFile Enterprise technical overview

Encryption Buyers Guide

Storgrid EFS Access all of your business information securely from any device

Solve the Dropbox Problem with Enterprise Content Connectors. Whitepaper Solve the Dropbox Problem with Enterprise Content Connectors

Oracle Documents Cloud Service. Secure Collaboration for the Digital Workplace

Microsoft Office 365 from Vodafone. Do business virtually anywhere

What We Do: Simplify Enterprise Mobility

APRIL Must-Have Features for Endpoint Backup

Webroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers

Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst

Powering real-time mobile access to critical information with ShareFile

Providing an Enterprise File Share and Sync Solution for

activecho Driving Secure Enterprise File Sharing and Syncing

Citrix ShareFile Enterprise: a technical overview citrix.com

Web Protection for Your Business, Customers and Data

owncloud Architecture Overview

Document Sharing on Mobile Devices. Securing Productivity on the Go!

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Mobilize SharePoint Securely: Top 5 Enterprise Requirements

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

owncloud Architecture Overview

Symantec Mobile Management 7.2

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Enterprise Content Sharing: A Data Security Checklist. Whitepaper Enterprise Content Sharing: A Data Security Checklist

ShareFile Enterprise technical overview

BlackBerry Enterprise Server Express

Doing Business Faster with Secure File Sharing. A File Sharing Solution Buyer s Guide for Corporate IT

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

cbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL

The Security Impact of Mobile Device Use by Employees

Cisco Mobile Collaboration Management Service

28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets

Safeguard Protected Health Information With Citrix ShareFile

When enterprise mobility strategies are discussed, security is usually one of the first topics

Egnyte Cloud File Server. White Paper

Kaspersky Security for Mobile

CHECK POINT THE MYTHS OF MOBILE SECURITY

PULSE SECURE FOR GOOGLE ANDROID

What is NAS? Why NAS? Brief Introduction to Synology NAS

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Arvind uses Vaultize Enterprise platform for File Sharing with Endpoint Data Protection to Secure and Control Business Critical Data

APP DEV. We build your ideas into web and mobile applications. steicho. Technological Solutions

ForeScout MDM Enterprise

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

The ForeScout Difference

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

Managing BitLocker With SafeGuard Enterprise

Five Truths. About Enterprise Data Protection THE BEST WAY TO SECURE YOUR DATA AND YOUR BUSINESS DEFENDING THE DATA CMYK

The Maximum Security Marriage:

Protecting Your Data On The Network, Cloud And Virtual Servers

What is OneDrive for Business?

Security and Privacy Considerations for BYOD

IT Resource Management vs. User Empowerment

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Transcription:

WHITE PAPER Thru for Enterprise File Sync and Sharing 701-4035-7304 www.thruinc.com 2014 Thru, Inc. All rights reserved

Table of Contents Introduction...3 Challenges of Mobile Business...4 The Enterprise-Liable Approach...4 The BYOD Approach...4 Security Management...4 Data Breaches...4 BYOD and Enterprise File Sync and Sharing...5 The Thru Enterprise Mobility Solution...6 Mobile Security...6 Auditing and Reporting...6 Improved Business Processes...7 Conclusion...8 Contact Thru...9 Thru for Enterprise File Sync and Sharing www.thruinc.com 2014 Thru, Inc. All rights reserved Page 2

Introduction Mobile devices have changed the landscape of business. Consumer technology advances including laptop computers, mobile phones, and tablets have changed the way people interact with data. Why wait to get to a computer to check for important email or view or modify documents when you can easily use a tablet or smart phone? Most people carry a mobile device with them everywhere. Furthermore, tablets are increasingly used not just as viewing devices, but also content creation devices, thanks to keyboard covers and improved productivity software. This increase in connectivity now allows mobile-users access to the internet from any location capture business content, such as photos and videos, making mobile devices extremely useful. Consumers rapidly and enthusiastically adopted these new mobile devices for personal use. They were awed with the new ability to rapidly access their personal email accounts, listen to music, bank online, and perform an infinite number of other operations via third party applications. With such an enormous increase in efficiency in their personal lives, many business workers began to feel cheated on the job. It didn t make sense that tasks they would perform seamlessly at home using consumer technologies and applications would be so clumsy and time-consuming at work. In an effort to improve work performance, employees began to use their personal devices and applications on the job, whether approved by the organization or not. Though many organizations ignored the issue for a long time, companies eventually had to choose whether to outlaw all personal devices without providing a replacement, issue corporate mobile devices to employees, or allow employees to use their personal devices under a certain set of policies. Thru for Enterprise File Sync and Sharing www.thruinc.com 2014 Thru, Inc. All rights reserved Page 3

Challenges of Mobile Business When faced with a quickly changing mobile landscape, companies must consider the how to provide functionality and maintain a competitive edge with efficient business practices. The Enterprise-Liable Approach When considering issuing corporate owned devices to employees (the enterprise-liable approach), cost was a great factor. Mobile devices can become expensive, especially when considering the rapid advancements in technology. A new phone or tablet may be considered ancient in a year or two, and employees will want new devices that take advantage of new technologies. If corporations do not issue new devices, consumers will simply take their newer and updated personal devices and resume using them, which puts the company back where they started. Though many companies have taken this approach at least for a time, this was not the most accepted choice. The BYOD Approach Some of the more advanced organizations began to develop Bring Your Own Device (BYOD) policies, governing standards, procedures, and restrictions for employees to use these devices with enterprise data. A BYOD policy adds possible endpoint data protection issues and data backup functionality to IT complexity. Security Management Security is an important when considering a BYOD approach. As BYOD policies have become more prolific, use of third-party file sync and sharing offerings have also grown. These are sometimes endorsed and managed by IT, but more often are not. Many free consumer solutions can improve productivity but lack basic security features that are necessary to conduct business, such as virus protection, administrative features, and other security functionality. According to Osterman Research, the absence of IT security in BYOD is having a negative impact: between 12% and 33% of organizations (depending on the number of employees) report that the use of smartphones is impeded because IT cannot manage them to the extent they would like; 20% to 42% of organizations report the same for tablets. Data Breaches Another challenge of mobile enterprise is the threat of potentially comprised files when users open files in thirdparty applications. Unregulated use of corporate intellectual property is unacceptable from a security standpoint, and before long, IT departments have to take notice of these personal devices. Additionally, if an employee loses a personal mobile device, without some kind of IT control, there is no way to remotely wipe sensitive content or prevent the disclosure of confidential information. This increases the risk of data breach and loss of intellectual property greatly. Organizations must take a stand about how they want to deal with possible data breaches. Thru for Enterprise File Sync and Sharing www.thruinc.com 2014 Thru, Inc. All rights reserved Page 4

BYOD and Enterprise File Sync and Sharing As BYOD programs have grown in popularity, so has the adoption of enterprise file sync and sharing (EFSS) applications. Unsanctioned adoption of third-party consumer cloud applications has driven investments in EFSS. IT organizations demand EFSS features to improve employee productivity while also limiting security risks and compliance issues. EFSS applications let employees access corporate files via their mobile devices or store documents in the provider s cloud, on premises, or a combination of cloud-based and data repository storage. EFSS maintains both IT control and enhances user experience and productivity through mobile collaboration capabilities. Organizations considering a BYOD program should implement EFSS with their mobile device management (MDM) solutions to let IT contain potential risks while also improving collaboration and productivity. EFSS allows employees to: Sync and store documents, photos, videos, or files from multiple endpoints Share files among multiple endpoints Share data among applications on a single device Share data with colleagues and customers Access files securely from a mobile device Thru for Enterprise File Sync and Sharing www.thruinc.com 2014 Thru, Inc. All rights reserved Page 5

The Thru Enterprise Mobility Solution Thru s Managed File Transfer services have enhanced business productivity for over 10 years without a single security breach, and Thru s mobile applications assume the same security approach. Rather than offering applications that require third-party security, Thru Enterprise Mobility has built-in security features to improve and streamline business practices while also functioning as a viable mobile application. Mobile Security Security is a key concern in managed file transfer, especially with the rise of BYOD. Thru Enterprise Mobility provides granular control to regulate access by role, group, and access control, and also according to device and application. This feature is particularly useful if a mobile device is lost or stolen. Administrators can enable or disable access for: Unique MAC addresses Using MAC filtering on a network permits or denies access to specific devices based on unique MAC addresses for each user to secure a network from unwanted devices and disconnect lost or stolen mobile devices. Web application from mobile Disabling internet-enabled apps ensures access is limited to users with the Thru Enterprise Mobility application. Open in functionality Disabling open in functionality limits users to opening files in the Thru Enterprise Mobility application itself and prevents transferring files to unsecure third-party applications. Thru Enterprise Mobility files and folders are not stored locally on each mobile device. Instead, files are retrieved from Thru cloud servers upon user request and held in a secure cache, which is routinely cleared. This approach is practical because mobile internet access is available now from pretty much any location. Auditing and Reporting Every action taken on any file in the Thru system is recorded and stored in a database for auditing purposes. Multiple data fields retain the following data: Who performed the operation Type of operation The mobile device used Thru for Enterprise File Sync and Sharing www.thruinc.com 2014 Thru, Inc. All rights reserved Page 6

Improved Business Processes Employees want to complete tasks efficiently and without a change in normal workflow, and Thru s mobile application embraces this concept. Users access the application from different locations, networks, and devices to download, upload, or view a wide variety of documents and files, including Word, Excel, and PowerPoint documents and PDF, JPEG, and PNG file types. With Thru Enterprise Mobility, users can complete tasks more efficiently by: Browsing, viewing, editing, sending, and sharing files Saving files to a mobile device for offline use Uploading files from the device to a secure workspace Sharing links to files or folders with internal and external users Subscribing to notifications to learn when users add files Thru for Enterprise File Sync and Sharing www.thruinc.com 2014 Thru, Inc. All rights reserved Page 7

Conclusion Today s mobile workforce needs to securely access enterprise content from mobile devices, including smartphones and tablets. However, when organizations implement a BYOD approach using popular consumer cloud-based storage applications, companies are exposed to risks such as data breaches and security and compliance issues. Thru Enterprise Mobility combines the improved efficiency, business process, and user experience of mobile access with advanced security and administrative controls. Thru for Enterprise File Sync and Sharing www.thruinc.com 2014 Thru, Inc. All rights reserved Page 8

Contact Thru To learn more about how Thru can enable your software customer support or other file transfer needs, please contact us. Speak to Sales www.thruinc.com/sales/ Schedule a Demo www.thruinc.com/demo/ Corporate Headquarters 909 Lake Carolyn Parkway Irving, TX 75039 United States Telephone: 214-496-0100 Toll Free 800-871-9316 (US/Canada) info@thruinc.com California 919 Alameda San Jose, CA 95126 United States Telephone: 408-332-5085 Europe Level 17, Dashwood House 69 Old Broad Street London EC2M 1QS United Kingdom Telephone: + 44 (0) 207-562-8317 Asia Pacific Level 26, 44 Market Street Sydney, NSW 2000 Australia Telephone: + 61 02 9089 8839 2014 Thru, Inc. All rights reserved. The Thru name, products, and logo are all trademarks of Thru, Inc. All other company and product names, brands or service names are trademarks of their respective owners. Thru for Enterprise File Sync and Sharing www.thruinc.com 2014 Thru, Inc. All rights reserved Page 9