Doing Business Faster with Secure File Sharing. A File Sharing Solution Buyer s Guide for Corporate IT



Similar documents
Powered by. FSS Buyer s Guide Why a File Sync & Sharing Solution is Critical for Your Business

Security Architecture Guide

Safeguard Protected Health Information With Citrix ShareFile

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Comparing Alternatives for Business-Grade File Sharing. intermedia.net CALL US US ON THE WEB

What We Do: Simplify Enterprise Mobility

The CIO s Guide to HIPAA Compliant Text Messaging

Security Overview Enterprise-Class Secure Mobile File Sharing

Choosing an MDM Platform

Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Security Considerations

5 Critical Considerations for. Enterprise Cloud Backup

ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators.

Comparing Dropbox and Egnyte. White Paper

Comparing Box and Egnyte. White Paper

Soonr Workplace Enterprise Plan Overview

Problem. Solution. Quatrix is professional, secure and easy to use file sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

FTP-Stream Data Sheet

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

efolder White Paper: Cloud-enabling the File Server for the Mobile Workforce

How To Use Egnyte

Why You Should Consider Cloud- Based Archiving. A whitepaper by The Radicati Group, Inc.

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

Secure Data Sharing in the Enterprise

Egnyte Cloud File Server. White Paper

The Essential Security Checklist. for Enterprise Endpoint Backup

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks

How to Go Paperless In Three Simple Steps: A Guide for Small Businesses

Protecting Your Data On The Network, Cloud And Virtual Servers

CHOOSING AN MDM PLATFORM

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

EasiShare Whitepaper - Empowering Your Mobile Workforce

Powering real-time mobile access to critical information with ShareFile

When enterprise mobility strategies are discussed, security is usually one of the first topics

Client Security Risk Assessment Questionnaire

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

ShareFile provides effective collaboration and file access wherever and whenever you need it. WHITE PAPER ShareFile by Citrix.

Citrix ShareFile Enterprise: a technical overview citrix.com

Egnyte Security Architecture

WHY YOU SHOULD CONSIDER CLOUD BASED ARCHIVING.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Citrix ShareFile Enterprise technical overview

Top Five Ways Any Business Can Benefit from Box

The Most Complete Data Protection Platform for MSPs

EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, Published May An Osterman Research Executive Brief

PCI DSS COMPLIANCE DATA

Move to the cloud without compromising security

Data Protection Act Bring your own device (BYOD)

Document control for sensitive company information and large complex projects.

Data Storage that Looks at Business the Way You Do. Up. cloud

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

WHITE PAPER Thru for Enterprise File Sync and Sharing

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

Enterprise Private Cloud Storage

SELLING CLOUD. RapidScale 101. Author. RapidScale s CloudIntelligence Team

ShareFile for enterprises

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

FileCloud Security FAQ

AVG AntiVirus. How does this benefit you?

ShareFile Enterprise for healthcare

Datto Compliance 101 1

The Hybrid Cloud Advantage White Paper

Technical Note. ForeScout MDM Data Security

10 Quick Tips to Mobile Security

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

Information Rights Management for Banking Seclore FileSecure Provides Intelligent Document & Data Protection that Extends Beyond Enterprise Borders

Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst

Speed the transition to an electronic environment. Comprehensive, Integrated Management of Physical and Electronic Documents

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Brainloop Cloud Security

How To Protect Your Data From Being Hacked

Cortado Corporate Server

EVault Endpoint Protection All the Details: Enterprise Management, Backup and Recovery, and Security

Transcription:

Doing Business Faster with Secure File Sharing A File Sharing Solution Buyer s Guide for Corporate IT

Introduction When it comes to file sharing, IT managers all have their nightmares about something going awry. It s a safe bet that the bad dream goes something like this: random end-users using unsecured file sharing services to access and share sensitive company documents, especially on unprotected networks while on-the-road. And the real possibility that these documents get into the wrong hands. In the business cloud environment some 1.3 Billion mobile workers by 2015 mobile sharing of sensitive files is increasingly commonplace. In fact, much to the chagrin of IT teams, mobile workers frequently use consumer file sharing solutions to meet their collaboration needs. But these consumer solutions can put corporate data at significant risk. In fact, in a recent study, 84% of IT professionals report security problems caused by consumer file sharing and sync services used for company business. Yet, without access to an IT-approved file sharing solution, employees will continue to turn to other sources to meet their sync and share requirements. Bottom line, file sharing solutions are here to stay. Today s workers will use them in whatever form they can to achieve their mobile productivity needs. Your best bet: give them what they need while also assuring the security, control and compliance that will protect your vital business information. In this buyer s guide we outline the top features you need to consider when selecting the secure, business-grade file sharing solution your business, and its users, requires.

Mobile Productivity Incidents such as the one depicted above have greater probability as mobile use increases and viral networks are so accessible. Also, at the same time your company s workers, clients and partners are all using multiple mobile devices, the sheer amount of digital information they want to access and share is growing dramatically estimated to grow by a factor of 300 between 2005 and 2020. Clearly, the complexity of maintaining this amount of data and file sharing securely is at an all-time level of demand, and stress!

Mobile Productivity Enterprise workers, whether mobile or onsite, now expect complete flexibility in which device they choose to use and a seamless transfer of documents between colleagues and partners, regardless of the device their external contacts may be using. IT needs complete control of those devices and how your users are using them to protect your corporate data from the risk of leakage. To help, select a file sharing solution that offers the following: Support for ubiquitous devices. It may sound obvious, but when you need to share content fast, you don t want to be constrained by the device type you can use. Select a solution that supports all the devices your employees use so that they are never restricted. Integrated document control on devices. Solutions that deliver the ability to edit, annotate and lock content on any device will deliver the most mobile productivity. Be sure that this can be accomplished without the need for third-party mobile applications that may involve additional complexities or create a potential for data leakage. Ideal are those solutions that enable integrated file editing on tablets and mobile phones. Smart sync capabilities. For full mobility, choose solutions that have the ability to replicate desktop file structures on a folder or sub-folder basis. This ensures access to all important documents while on the road. Furthermore, given different devices have varying on-device storage capacities, choose a solution that enables device aware sync in order to adapt to these limitations. On and offline access. Assure that sync d content is fully accessible when the device is out-ofnetwork or offline. This include being able to manipulate documents (e.g. edit, share, etc.) and not simply viewing them while offline. Secure sharing without forced registration. For the best flexibility, select a solution that doesn t force recipients to adopt the same file sharing service as the person sending the document. Content should still be secure and available, regardless of whether recipients are members of the file sharing service used. Scan-to-PDF for instant field image and document capture. When working in the field, workers should be able to easily capture document markups and photos into PDF files for direct mobile device sharing. Automated QR coding for document accuracy and access. For simplified document search and retrieval on the road, select a solution that provides automated quick response (QR) coding for each document. This will save time when searching for content later.

Content Privacy and Security Most employees, partners and vendors don t properly consider the risks of file sharing security. And can you blame them? They re focused on closing deals, getting contracts signed, trading insights on data, planning the next product. But, as you know, all of these aforementioned tasks are rife for security breaches. With a secure file sharing solution you can protect employees from risky behaviors without slowing their productivity.

Content Privacy and Security Consider these privacy and security features. Without just one of them, you may be putting your data at risk. Encryption in-session, in-transit, on-device. To protect your organization s data, select a file sharing solution that delivers 256-bit AES encryption for every point in your content s lifecycle when it s being accessed in-session, while in-transit, and while at rest, regardless of where it s being stored or what device it s on. Also be sure that unique and rotating encryption keys are used for each file. Dual-factor authentication. For secure document access, assure that dual-factor authentication protection is in place. It s important who you know and where they re coming from. Download/copy prevent; auto PDF. To protect document tampering, your file sharing service should have user definable download and copy prevention controls and the ability to auto-create view only PDFs when desired. Built-in remote wipe capabilities. Ideal for environments where remote workers or consultants are given content access, built-in remote wipe capabilities that will delete content from selected devices when desired can safeguard content from getting into the wrong hands. This is also ideal to minimize the risk of leakage due to device theft or loss. Policy-based control of content, users & devices. An enterprise-grade file sharing solution should deliver detailed yet easy to use policy controls where you specify settings for content, users and devices at the granularity you prefer. Password and time-to-live protection. Public links to all shared content including projects, folders and files should be controllable with password protection and time-to-live controls which can enable and disable content access at defined times. Inactivity session timers. Protect content from unwanted viewing with inactivity session timers for both mobile devices and computers. Non-persistent use of credentials. Protect unwanted access with non-persistent credential use.

Enterprise-Ready As an IT manager responsible for the smooth flow of data, you never want to hear networking glitches have resulted in costly downtime for your organization. The same holds true for file sharing: your solution of choice should ensure you that the employees and their external partners will not suffer the inefficiencies and inconvenience of downtime caused by service interruption, performance degradation or malware infections.

Enterprise-Ready To assure that your secure file sharing solution is enterprise-ready, use one that offers the following credentials: No-breach history. Look into the history of your file sharing provider. Ideally, it should have a history free of security breaches and downtime, or at a minimum has the proper safeguards to prevent them. Geo-redundant, regionally segmented data centers. To reduce any possibility of experiencing service interruption, performance degradation or malware infections, select an online file sharing service that owns and operates geo-redundant data centers. For increased data privacy and control, it s also important that data centers are geographically located to ensure that your data remains within certain countries and regions while in storage and in transit. Compliant and SSAE-16-audited. Look into your file sharing service s validation audits. The best have been validated by independent certified public accountants for SSAE 16 SOC2 Type 2 audit completion. This will assure that it offers exceptional operations in the areas of data protection, access controls, authentication mechanisms, audit trails, physical and logical security, software development, change control and other critical operational areas. Administrator-controlled access and reporting. Ensure that the file sharing solution you choose also has granular policy controls and reporting so that you can generate and export audit records on all account activity, including Projects, Groups and mobile access. You should also have the enterprise policy management that allows for the administration of passwords, sessions, IP address whitelisting, Public Links, remote access and mobile devices for your entire Team.

File Sharing that s Fully Mobile Ready and Secure Soonr Workplace How do you prepare your organization for a future in which data devices will continue to proliferate at the same time employees and external partners reject any boundaries on access, sharing and time limitations? One of the first must-have solutions to accommodate this new world order of data flow is putting in place the best secure file sharing features available Soonr Workplace.

Soonr Workplace Soonr Workplace is a complete, secure file sharing and collaboration solution that enables your team members to safely manage, organize and share files from any device, anywhere. It enables productivity by allowing teams to work on any type of business document or digital content from their device in real time, without fear of security breaches. Soonr Workplace also gives workers built-in security controls that can be set up based on need-to-share so your teams can focus on tasks and strategy that enhance business value. Get the flexibility your teams need with the business productivity executives demand, at the same time providing a wide range of security controls to prevent data breaches and costly downtime. Find out more about Soonr Workplace today at www.soonr.com.

About Soonr Founded in 2005, Soonr is headquartered in Silicon Valley, California with offices in the UK and Denmark. Our mission is to make organizations more productive and competitive by securely connecting office and mobile workers and their critical information. Our secure file sharing and collaboration services have been in commercial production since early 2007 without a single security breach or a data loss incident. Embraced by users and endorsed by IT, Soonr delivers its service to over 150,000 paying businesses worldwide in 134 countries, through a network of cloud service providers, VARs, MSPs and systems integrators. Built on a highly scalable and secure infrastructure that is Type 2 SOC (Service Organization Controls) audited against SSAE 16 standards as well as HIPAA and PCI DSS compliant, Soonr operates georedundant data centers in four jurisdictions including the US, Canada, EU and Australia. Customer data always resides and is redundantly mirrored in alternate sites within the same jurisdiction to comply with regional privacy and security concerns and regulations.