Ensuring Enterprise Data Security with Secure Mobile File Sharing.



Similar documents
Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview kiteworks

Top. Reasons Legal Firms Select kiteworks by Accellion

Accellion Security FAQ

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Top. Enterprise Reasons to Select kiteworks by Accellion

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

How To Secure Shareware Kiteworks By Accellion

Accellion Security FAQ

FileCloud Security FAQ

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

ShareFile Security Overview

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks

Enterprise Mobility Management: A Data Security Checklist. Whitepaper Enterprise Mobility Management: A Checklist for Securing Content

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Enterprise Content Sharing: A Data Security Checklist. Whitepaper Enterprise Content Sharing: A Data Security Checklist

The Essential Security Checklist. for Enterprise Endpoint Backup

ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators.

Google Identity Services for work

NCSU SSO. Case Study

Citrix ShareFile Enterprise: a technical overview citrix.com

Copyright 2013, 3CX Ltd.

WatchDox Administrator's Guide. Application Version 3.7.5

Egnyte Cloud File Server. White Paper

Dell World Software User Forum 2013

8 Critical Requirements for Secure, Mobile File Transfer and Collaboration

Ensuring the security of your mobile business intelligence

Mobile Device Management Version 8. Last updated:

Security Considerations

activecho Driving Secure Enterprise File Sharing and Syncing

Research Information Security Guideline

All your apps & data in the cloud, all in one place.

ShareFile Enterprise. Jaan Feldmann Sergei Sokolov

User Guide. Version R91. English

Citrix ShareFile Enterprise technical overview

Secure and control how your business shares files using Hightail

Enterprise Architecture Review Checklist

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

What We Do: Simplify Enterprise Mobility

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Famly ApS: Overview of Security Processes

Sophos Mobile Control SaaS startup guide. Product version: 6

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

Casper Suite. Security Overview

Interact Intranet Version 7. Technical Requirements. August Interact

Security Information & Policies

User-ID Configuration

Single Sign On for ShareFile with NetScaler. Deployment Guide

Syncplicity Security and Control Features

Copyright 2013 Trend Micro Incorporated. All rights reserved.

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Enterprise Mobility as a Service

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Security and Data Protection for Online Document Management Software

vcloud Director User's Guide

Securing Content: The Core Currency of Your Business. Brian Davis President, Net Generation

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

How To Plan A Desktop Workspace Infrastructure

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

Mobile Admin Security

insync Benefits & Comparison

White Paper. BD Assurity Linc Software Security. Overview

CBIO Security White Paper

App Orchestration 2.5

Safeguard Protected Health Information With Citrix ShareFile

Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst

Administration Guide. WatchDox Server. Version 4.8.0

Provisioning ShareFile on Microsoft Azure Storage

Server Software Installation Guide

Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World

Vendor Questionnaire

App Orchestration 2.0

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Hosted SharePoint: Questions every provider should answer

Microsoft Enterprise Mobility and Client Futures

How To Protect Your Mobile Devices From Security Threats

Dooblo SurveyToGo: Security Overview

Setting Up Resources in VMware Identity Manager

Introduction. PCI DSS Overview

BlackBerry 10.3 Work and Personal Corporate

Catapult PCI Compliance

Live Guide System Architecture and Security TECHNICAL ARTICLE

Windows Phone 8.1 Mobile Device Management Overview

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

PortWise Access Management Suite

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Five Best Practices for Secure Enterprise Content Mobility

Transcription:

A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto, CA 94303 info@accellion.com Accellion, Inc. All rights reserved. Security 0712

AN A C C E L L I O N S E C U R I T Y O V E R V I E W : Ensuring Enterprise Data Security Overview More than 1,500 Enterprise corporations and government agencies and 10 million enterprise users have chosen Accellion for securely sharing files and collaborating with colleagues, partners and vendors across organizational boundaries. Ensuring enterprise data security is a top priority for corporations and government agencies and is reflected throughout the Accellion secure mobile file sharing solution, in our processes, procedures and product design. This document provides an overview of the Accellion security features designed to ensure protection of your enterprise data. 2 Accellion, Inc.

A N A C C E L L I O N W H I T E P A P E R : Ensuring Enterprise Data Security End to End Security One of the best ways to understand the multiple levels of security of the Accellion secure mobile file sharing solution is to follow the path of a file from desktop, laptop, or mobile device through the Accellion system as users collaborate and share files. We have created a secure mobile file sharing system that allows organizations to protect their Enterprise content throughout the file sharing process. Account Access and Authentication Let s take a look at what happens when you start using Accellion for secure mobile file sharing. To get started, users have to log into an Accellion account. Log-in Security Features Robust and Flexible Password Policies Businesses can configure the password policies for their users: Password strength (number of characters, required number of numbers, special characters, restrictions from using email addresses) Password resets (a configurable time period) Password re-use restrictions Notifications after a configurable number of failed attempts Overall maximum session duration Single Sign-on Accellion offers Active Directory/multi-LDAP integration for Enterprise accounts. This gives Enterprise organizations centralized control and management over user accounts. Accellion supports single-on through SAML (Secure Assertion Markup Language) 2.0. SAML is an industry standard protocol for exchanging authentication and authorization information between different domains. Accellion supports multi-factor authentication through these single sign-on providers. For information on Accellion single sign-on integrations, contact support@accellion.com. Accellion, Inc. 3

AN A C C E L L I O N S E C U R I T Y O V E R V I E W : Ensuring Enterprise Data Security File Sharing Security Features After logging into the Accellion solution, users can quickly create secure workspaces, upload files, share files, add comments, subscribe to notifications and send files to stakeholders internal and external to the organization. Data is encrypted with 128-bit or 256-bit SSL encryption on transfer depending on the web browser. All files on an Accellion system are encrypted in transit and at rest. Flexible and Robust Secure Workspace Permissions Accellion enables you to control access to your Enterprise content across your organization. File Tracking Workspace managers can view activity logs to see who has accessed the workspace, downloaded, uploaded, and deleted files, and who has added comments, etc. Notifications Managers and contributors in a secure workspace can subscribe to notifications to receive emails when workspace members add files or make comments to files in their workspace. Workspace IT admins can set workspace and file expiration dates for their organization. Workspace managers can also set workspace and file expirations within the parameters set by IT. Secure Links Users can easily share files by sending stakeholders a secure link to a file in their Accellion Secure Workspace. Users can decide if the file can be downloaded by only the recipient of the email, if the recipient can forward the file to others, or if all authenticated users can download the file. They can set file link expiration dates. Users automatically get return receipts when files are downloaded. Collaboration - Secure workspaces are designed to be shared with internal and external stakeholders. Workspace managers can manage users in their workspace and assign them with specified user roles depending on the business requirements. 4 Accellion, Inc.

A N A C C E L L I O N W H I T E P A P E R : Ensuring Enterprise Data Security Mobile Access Security Features Mobile users can securely access their Accellion accounts through mobile browsers or the Accellion Mobile Apps for ipad, iphone, Android and BlackBerry. Accellion Mobile Apps support authentication through LDAP ensuring that only authorized users gain access to secure workspaces. Files saved on the mobile device are stored in a secure container with 256-bit AES encryption until they are opened using a supported editor application such as QuickOffice. Files shared with others via email are sent via the SSL protocol. Files downloaded to the device are password protected and encrypted while at rest. Users can choose a passphrase to access encrypted files downloaded to the mobile device using Accellion Mobile Apps. With Accellion, IT admins can centrally manage and control mobile devices accessing corporate resources. IT admins can enable or disable mobile access for users. They can select Edit or View access for users depending on the security requirements of their organization. IT administrators have access to workspace activity logs ensuring data security and compliance. Accellion provides server based 256-bit AES encryption to enforce security policies from a central administrative dashboard. If a phone is lost or stolen, administrators can immediately disable access to Accellion. Admins can also disable accounts for mobile access if required and set expiration dates of files accessed through mobile devices. In conjunction with MDM solutions such as MobileIron, BoxTone and Good IT can also ensure that only authorized apps are downloaded, users have the latest software updates, and users are not using excessive bandwidth. Lastly, if phones are lost or stolen, they can be remotely wiped to protect corporate data from getting into the wrong hands. Accellion, Inc. 5

AN A C C E L L I O N S E C U R I T Y O V E R V I E W : Ensuring Enterprise Data Security Storage Files uploaded to your Accellion solution are stored either in the Accellion public cloud (Amazon EC2), or a private cloud (on premise using VMware, Citrix - XenServer, or Microsoft Hyper-V), or in a hybrid cloud depending on the deployment option you choose for your organization. Public Cloud Accellion provides single and multi-tenant storage in Amazon EC2 public cloud. Amazon security details are available in a later section of this document. Private Cloud Accellion supports private cloud on-premise deployment in VMware, Citrix XenServer, or Microsoft Hyper-V environments. Private clouds help organizations ensure the availability, integrity and confidentiality of their information. Located inside a company s firewall, private clouds are owned and controlled by IT allowing information to be solely managed by enterprises rather than delegated to third party cloud providers. Encryption Files are stored within the Accellion system on an encrypted partition using AES 128-bit encryption. Additionally, each file can be encrypted with a unique key. The file encryption key is also not stored on the server, so even if the server is compromised, the decryption keys for stored files cannot be obtained on the server itself. Data is also encrypted in transit using SSL/HTTPS. Accellion s security mechanisms guard against malicious access: o o o o File names are de-referenced when stored on Accellion to ensure that files are inaccessible. Files may be stored encrypted for added security. Data can be accessed only through the file URL embedded in the email. Each URL call is authenticated individually. Administrators do not have access to files once they are uploaded to the Accellion system. However, they can view the list of files and delete, replicate and set life cycle rules on these files. Administrators can also view reports and logs in relation to file access events. 6 Accellion, Inc.

A N A C C E L L I O N W H I T E P A P E R : Ensuring Enterprise Data Security Audit Trail As an Enterprise-class mobile file sharing solution, Accellion automatically logs all file and user activities in the application. The audit log provides administrator s insight into what is being done in the system, which users are accessing files and, what files are being uploaded, and how the system is working overall. Audit trails and comprehensive file tracking help enterprise organizations demonstrate compliance with industry and government regulations. Audit logs are date/time stamped, and tracked by user, email address, IP address, and action taken. IT admins can sort by these attributes and also export the audit log either as a CSV file or to a Syslog server. IT Admins set how long logs are stored on the Accellion system. Global Settings Accellion Mobile File Sharing is designed for enterprise organizations and is deployed and centrally managed by IT. IT administrators have the ability to centrally manage users across the globe through an Admin Console. They can set restrictions globally on user accounts, including: Who can create workspaces or upload files How long files are retained in the system Who can use Accellion Mobile Apps and whether users have View or Edit permission How many versions of a file are retained How long after files are deleted or expired can files be recovered Whether users can delete files Data Retention IT admins can set file and workspace life cycle rules and as well as select how long deleted and expired files are retained in the Accellion system. Organizations can have files stay in the trash from 1 to 180 days. Accellion, Inc. 7

AN A C C E L L I O N S E C U R I T Y O V E R V I E W : Ensuring Enterprise Data Security FIPS 140-2 Level 1 Accellion offers FIPS 140-2 Level 1 certified file sharing solutions for both on-premise and offpremise, virtual, cloud and hosted deployments. Accellion Public Cloud Amazon EC2 The Accellion Hosted Cloud Service extends Accellion mobile file sharing into the cloud. The service enables organizations to rapidly implement mobile file sharing to quickly scale resources and teams and manage peaks in usage. Accellion offers both single and multi-tenant public cloud deployment options through Amazon EC2 Reports and Certifications Amazon Web Services (AWS) has completed multiple SAS70 Type II audits, and now publishes a Service Organization Controls 1 (SOC 1) report, published under both the SSAE 16 and the ISAE 3402 professional standards. AWS has also achieved ISO 27001 certification, and has been successfully validated as a Level 1 service provider under the Payment Card Industry (PCI) Data Security Standard (DSS). (Amazon, 2011) Physical Security AWS datacenters are housed in nondescript facilities. Authorized staff must pass two-factor authentication a minimum of two times to access datacenter floors. (Amazon, 2011) Data Privacy AWS enables users to encrypt their personal or business data within the AWS cloud and publishes backup and redundancy procedures for services so that customers can gain greater understanding of how their data flows throughout AWS. (Amazon, 2012) 8 Accellion, Inc.