Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools



Similar documents
The Dangers of Consumer Grade File Sharing in a Compliance Driven World

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Key Considerations in Enterprise File Sharing Gurinder Dhillon, Sr. Director Product Management Ankur Shah, Sr. Product Manager

The Challenge of Securing and Managing Data While Meeting Compliance

EMBRACING SECURE BYOD

The Essential Security Checklist. for Enterprise Endpoint Backup

Security Architecture Whitepaper

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

WHITE PAPER Thru for Enterprise File Sync and Sharing

For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today!

Mobile Device Management for CFAES

THE BLUENOSE SECURITY FRAMEWORK

A BUYER S CHECKLIST ENDPOINT DATA PROTECTION:

Comparing Alternatives for Business-Grade File Sharing. intermedia.net CALL US US ON THE WEB

Powered by. FSS Buyer s Guide Why a File Sync & Sharing Solution is Critical for Your Business

CONTENTS. Windows To Go: Empower And Secure The Mobile Workforce

activecho Driving Secure Enterprise File Sharing and Syncing

Whitepaper. Simple and secure. Business requirements for Enterprise File Sync and Share solutions.

Simple Strategies for More Effective Business Collaboration: File Sharing

DOBUS And SBL Cloud Services Brochure

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

'Namgis Information Technology Policies

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.

Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA

How to Turn the Promise of the Cloud into an Operational Reality

Policy Outsourcing and Cloud Based File Sharing

How To Manage A Mobile Device Management (Mdm) Solution

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Making Data Security The Foundation Of Your Virtualization Infrastructure

EasiShare Whitepaper - Empowering Your Mobile Workforce

National Cyber Security Month 2015: Daily Security Awareness Tips

Internet threats: steps to security for your small business

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Internet Exchange Between IT and Business Requirements

Business and enterprise cloud sync, backup and sharing solutions

BENEFITS OF MOBILE DEVICE MANAGEMENT

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

The Maximum Security Marriage:

Symantec Mobile Management Suite

Codeproof Mobile Security & SaaS MDM Platform

MTP. MTP AirWatch Integration Guide. Release 1.0

ForeScout MDM Enterprise

The ForeScout Difference

What We Do: Simplify Enterprise Mobility

Moving to the Cloud: What Every CIO Should Know

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

How To Protect Your Mobile Devices From Security Threats

HIPAA Compliance for the Wireless LAN

FileCloud Security FAQ

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Data Storage That Looks at Business the Way You Do. Up. cloud

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

Bring Your Own Device (BYOD) and Mobile Device Management

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

INCIDENT RESPONSE CHECKLIST

WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

Secure Your Mobile Device Access with Cisco BYOD Solutions

CrashPlan PRO Enterprise Backup

File Sharing & LiveBox WHITE PAPER.

Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P:

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES

The CIO s Guide to HIPAA Compliant Text Messaging

Drawbacks to Traditional Approaches When Securing Cloud Environments

RFI Template for Enterprise MDM Solutions

Meeting the Challenges of Remote Data Protection: Requirements and Best Practices

How To Secure Your Mobile Devices

Anchor End-User Guide

White. Paper. Evaluating Sync and Share Solutions. Balancing Security, Control, and Productivity. September, 2014

Securing Health Data in a BYOD World

How to reduce the cost and complexity of two factor authentication

Symantec Mobile Management for Configuration Manager 7.2

owncloud Architecture Overview

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

Access All Your Files on All Your Devices

IT Resource Management vs. User Empowerment

Symantec Mobile Management 7.2

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

PULSE SECURE FOR GOOGLE ANDROID

EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, Published May An Osterman Research Executive Brief

Google Identity Services for work

What is OneDrive for Business?

Is Cloud Accounting Right for Your Business? An Educational Report

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

SecureAge SecureDs Data Breach Prevention Solution

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

ANY DEVICE ANY STORAGE ONE PLATFORM SECURE ENTERPRISE MOBILITY CONTENT PLATFORM

Secure Data Sharing in the Enterprise

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION

owncloud Architecture Overview

Five Best Practices for Secure Enterprise Content Mobility

Host/Platform Security. Module 11

FilesAnywhere Feature List

IT Peace of Mind. Powered by: Secure Backup and Collaboration for Enterprises

Transcription:

White Paper Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools Introduction The modern workforce is on the hunt for tools that help them get stuff done. When the technology provided by the organization fails to deliver the tools they need, it s pretty easy for workers to find an app that will. Productive employees turn to cloud-based, drag and drop box tools that seem ideal for delivering content to the right people on any device. There is, however, a problem with these convenient (but rogue) tools. Although they do a great job of fulfilling the immediate need, they expose the enterprise to the possibility of data breaches, leakage, and viruses. Data stored in consumer-grade file sharing clouds is typically unencrypted. Some solutions allow users to encrypt files before uploading to public clouds, but many fail to take this extra step. In addition, compared with a secure corporate network, file-sharing solutions like Dropbox represent a comparatively soft target from a security standpoint. Security concerns common to free file-sharing services include:» Password thefts from the service itself» Security loopholes that allow public access to files for hours at a time» Theft of login credentials from a mobile device» Spread of files containing viruses or malware Loss or exposure of proprietary information can have devastating consequences for a business. But how does an enterprise protect itself when the culture of the mobile workforce is to resist top-down, policy-driven security practices? Employees will continue to use those rogue file-sharing apps unless they have a better tool. To remove this security threat while allowing mobile workers to be as productive as possible, IT needs to provide a better file-sharing solution.

Enterprise-Grade File Sync and Share Why is there an online file-sharing problem in the first place? Because, in the everydaybusiness workflow where file sharing is essential ease-of-use trumps security every time. With EFSS, you can have both. Enterprise File Sync and Share (EFSS) technology provides the best usability features inside a secure file-transfer environment. Essential features of a true EFSS solution include:» Highly Secure. EFSS solutions have built-in enterprise-grade security features such as end-to-end encryption and role-based access to files.» Fast and Easy. EFSS solutions are so easy to use on any mobile device that employees find them an attractive alternative to consumer-grade file-sharing applications.» Always Available. EFSS solutions can be cloud-based solutions for extreme reliability and accessibility from any mobile device at any time. EFSS is a solution that will satisfy employees and the IT department. However, not all EFSS solutions are truly enterprise grade. What features are critical to successful adoption of file sync and share in the enterprise? EFSS Security for the Mobile Enterprise Any vendor can call its product enterprise grade; here, we ll examine what it takes to earn that designation. Before purchasing a product, make sure it meets the requirements of the C-suite and business users. In addition to ensuring that the product fits into your employees workflow patterns, it must meet (or even exceed) security requirements. Otherwise, your company will be right back where it started with the drop box problem. Similarly, overall manageability is essential for controlling the file-sharing environment across the enterprise. Let s take a closer look at each of these critical areas of functionality. Enterprise-Grade Security is a Must An enterprise file-sharing solution closes a window of vulnerability. The following capabilities, when taken together, provide the means to safely share files under a wide range of operational scenarios:» True End-to-End Encryption. Employees will certainly share files over non-secure wireless networks regardless of security policies; for this reason true end-to-end encryption is required. All shared files should be encrypted on the server, during transmission, and on the device. ziffdavis.com 2 of 5

» Flexible Cloud Deployment Options. Choosing an EFSS solution that allows files to remain on premises for speed and security or off site for easy access and disaster recovery gives IT management the greatest latitude in configuring a solution architecture that best suits business and operational needs.» Private Encryption Keys. Maintaining onsite ownership of your encryption keys is essential for data governance in regulated industries where industry certifications or compliance with government regulations is required.» Robust Identity Management and User Authentication. The EFSS solution must support password-protected content access and the ability for content owners to provide guest or temporary accounts with individual passwords.» Role-Based Access Control. The EFSS must allow content owners to grant varied access to documents or portions of documents (such as the ability to download or the ability to download and edit). In this way, employees can easily regulate how they share with vendors, partners, and customers.» Simple Ways to Securely Share Data Outside the Network. Employees often need to share files with people outside the company. To limit their access, the EFFS should support creating limited access accounts as well as expiration parameters on both the account and file-sharing links.» Remote Data Wipe. In order to protect company assets following employee termination, the EFSS should provide administrative ability to remotely delete shared files and wipe them from any mobile devices with access to files. User Acceptance is Essential An enterprise-grade EFSS solution must provide these user benefits:» Usability and Administration. The EFSS you select must be as easy or easier to use than the one employees are already using. It also needs to be simple for IT to administer and manage.» Device Agnostic. The diversity of devices and operating systems makes a cross-platform solution an absolute necessity. A viable EFSS must transfer files to any device type or OS.» Availability and Reliability. EFSS has to work anytime and every time, from any place. If employees cannot count on the solution every time, they will abandon it in lieu of a more reliable (but often less secure) technology.» Any file. Any size. The EFSS app must effortlessly handle unlimited file sizes, including large documents, presentations, videos, image files, and graphics. ziffdavis.com 3 of 5

» Everybody in the Business Ecosystem. The EFSS must enable simple, user-managed access to files so that content can be securely shared with colleagues, partners, customers, suppliers, and anyone else who needs it, even if they don t have access to the corporate network.» Continuous File Syncing. The EFSS should keep all shared files current with primary source files with NO effort or input from users. In this way, teams are simply and always in sync. Get Simple Enterprise-Wide Management Capabilities In addition to being acceptable to users and offering strong security controls, an EFSS solution must give IT managers smart management capabilities. Here are essential management capabilities for a true enterprise-grade EFSS:» Single Management Console for the Entire Enterprise. The most effective way to ensure good IT management and control over corporate data is a single management console that provides visibility into file-sharing activities and resources across the enterprise. Because IT employees are not always working at their desks, it s essential that the management console work on mobile devices as well.» Audit Trails, Real-Time Reporting and Remote Wipe. These features are valuable in identifying unusual file-sharing activities, logging file-sharing history and taking action to secure files in the event of hardware loss.» Application Programming Interface (API) for Integration with Other Enterprise Apps. A true enterprise-grade EFSS solution will also provide an open API that makes it possible to use the EFSS app as an integral part of other enterprise applications, such as e mail, reporting tools, and endpoint backup* programs. *Note: An EFSS app is not a substitute for endpoint backup. Each is a separate solution that solves different problems. Enterprises should use both tools simultaneously. Endpoint backups protect all data on the network, including deleted files and multiple versions. The backup allows files to be easily restored in case of server failure, disaster or deletion. In contrast, EFSS solutions allow a subset of your data to be synced across devices or be shared internally and externally. ziffdavis.com 4 of 5

Roll Out a Better EFSS to Support and Secure Files on the Move The fact that employees often adopt online file-sharing apps before the enterprise implements them illustrates the need for a practical solution to a real problem. More security mandates will not change the culture of a mobile workforce and shouldn t. Employees want to do their jobs well. They aren t maliciously ignoring mandates when using rogue file sharing solutions. Rather they seek and use the tools that work for their work regardless of the danger to the enterprise. An EFSS solution that is easy to use, highly secure, and manageable ensures that employees, partners, and customers can work efficiently and in a way that protects the organization s proprietary information. A true enterprise-grade EFSS solution should be an essential part of any business mobility strategy. About Ziff Davis B2B Ziff Davis B2B is a leading provider of research to technology buyers and high-quality leads to IT vendors. As part of the Ziff Davis family, Ziff Davis B2B has access to over 50 million in-market technology buyers every month and supports the company s core mission of enabling technology buyers to make more informed business decisions. Copyright 2014 Ziff Davis B2B. All rights reserved. Contact Ziff Davis B2B 100 California Street, Suite 650 San Francisco, CA 94111 Tel: 415.318.7200 Fax: 415.318.7219 Email: marty_fettig@ziffdavis.com www.ziffdavis.com