three principals for simple, secure content sharing

Post on 13-Nov-2014

299 Views

Category:

Business

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

The risks of insecure content sharing are rampant no matter which platform you’re using. By following three principles for simple, secure sharing, an organization can stay mobile and connected – without risking a security breach.

TRANSCRIPT

3 Principles for

Simple, Secure Sharing

1

2

We do business in a mobile, cloud-based, connected

environment – and it’s not slowing down.

3

We do business in a mobile, cloud-based, connected

environment – and it’s not

slowing down.

The projected world wide shipments of smartphones

and tablets in 2014 is expected

to reach 2.2 billion. (Gartner)

4

Not only are we

buying more

smartphones and

tablets – we’re using

them for work.

5

Not only are we

buying more

smartphones and

tablets – we’re using

them for work.

81% of Americans use their

personal mobile devices for work.

(Gartner)

6

Not only are we

buying more

smartphones and

tablets – we’re using

them for work.

81% of Americans use their

personal mobile devices for work.

(Gartner)

By 2017, half of employers will

require employees to supply their

own device for work purposes.

(Gartner)

7

The BYOD (bring your own device) movement has

fueled the growth of mobility in businesses of all

sizes – from enterprises to SMBs.

8

The BYOD (bring your own device) movement has

fueled the growth of mobility in businesses of all

sizes – from enterprises to SMBs.

The BYOD and enterprise mobility market is expected

to grow at the rate of 15% annually –

up to $181 billion by 2017. (Computer World)

9

But for all of the convenience and cost savings that

mobile devices can bring to the workplace –

there’s one big problem…

10

But for all of the convenience and cost savings that

mobile devices can bring to the workplace –

there’s one big problem…

SECURITY

11

There is a pressing

need for secure

sharing…

12

Whether you’re sharing between computers,

There is a pressing

need for secure

sharing…

13

Whether you’re sharing between computers,

between mobile devices,

There is a pressing

need for secure

sharing…

14

Whether you’re sharing between computers,

between mobile devices,

Or anywhere across the cloud.

There is a pressing

need for secure

sharing…

15

The risks of insecure sharing are rampant

no matter which platform you’re using.

16

The risks of insecure sharing are rampant

no matter which platform you’re using.

According to the Leaking Vault, over 1.29 billion

records were disclosed internationally between 2005

and 2011.

17

The risks of insecure sharing are rampant

no matter which platform you’re using.

18

Deliberate theft and stealing.

19

Deliberate theft and stealing.

Employee error or carelessness.

20

Deliberate theft and stealing.

Employee error or carelessness.

Lost or stolen devices.

21

Deliberate theft and stealing.

Employee error or carelessness.

Lost or stolen devices.

Insecure channels of sharing.

22

Sharing information across the cloud

is essential - but risky.

In order to keep information secure, organizations need

to adopt security practices that offer protection at the

document level.

23

Why at the document level?

24

Why at the document level?

BYOD devices may not have sufficient security to

protect important data.

25

Why at the document level?

BYOD devices may not have sufficient security to

protect important data.

Password protected devices can be lost or stolen, and

then cracked.

26

Why at the document level?

BYOD devices may not have sufficient security to

protect important data.

Password protected devices can be lost or stolen, and

then cracked.

Forwarded or shared documents could be accessed by

third parties without your authorization.

27

By following three principles for simple, secure sharing,

an organization can stay mobile and connected –

without risking a security breach.

28

If content security measures are too difficult,

they simply won’t be used.

29

If content security measures are too difficult,

they simply won’t be used.

47% of employees using personal mobile devices at

work do not believe they are “in compliance” with their

company’s mobile device policy.

30

Employees engage in risky behavior with mobile

devices and content despite knowing better.

31

Employees engage in risky behavior with mobile

devices and content despite knowing better.

36% click on unverified links from social media.

32

Employees engage in risky behavior with mobile

devices and content despite knowing better.

36% click on unverified links from social media.

11% use cloud services to send/share work documents

without IT permission.

33

Employees engage in risky behavior with mobile

devices and content despite knowing better.

36% click on unverified links from social media.

11% use cloud services to send/share work documents

without IT permission.

12% store work passwords on their devices.

34

A content security solution has to be easy

to use.

Principle#1

35

A content security solution has to be easy

to use.

Integrated into the preferred sharing platform

(web, email or mobile).

Principle#1

36

A content security solution has to be easy

to use.

Integrated into the preferred sharing platform

(web, email or mobile).

No complicated infrastructure requirements.

Principle#1

37

A content security solution has to be easy

to use.

Integrated into the preferred sharing platform

(web, email or mobile).

No complicated infrastructure requirements.

No extra burden on the IT department.

Principle#1

38

Secure, simple sharing also means sharing

across multiple device types.

Principle#2

39

Secure, simple sharing also means sharing

across multiple device types.

Embracing BYOD means handling the security needs

for multiple device types.

Principle#2

40

Secure, simple sharing also means sharing

across multiple device types.

Embracing BYOD means handling the security needs

for multiple device types.

In a recent survey from IDC, IT managers

underestimated the number of consumer

Devices n their networks by 50%.

Principle#2

41

Simple, secure sharing solutions need

to address multiple file types.

Principle#3

42

Simple, secure sharing solutions need

to address multiple file types.

We live in a multimedia environment. We share:

Principle#3

43

Simple, secure sharing solutions need

to address multiple file types.

We live in a multimedia environment. We share:

Documents

Principle#3

44

Simple, secure sharing solutions need

to address multiple file types.

We live in a multimedia environment. We share:

Documents Videos

Principle#3

45

Simple, secure sharing solutions need

to address multiple file types.

We live in a multimedia environment. We share:

Documents Videos

PDFs

Principle#3

46

Simple, secure sharing solutions need

to address multiple file types.

We live in a multimedia environment. We share:

Documents Videos

PDFs Images

Principle#3

47

Simple, secure sharing solutions need

to address multiple file types.

We live in a multimedia environment. We share:

Documents Videos

PDFs Images

And more

Principle#3

48

Simple, secure sharing solutions need

to address multiple file types.

A simple, secure sharing solution has to work with

multiple file types to support the real world business

environment.

Principle#3

49

Simple, secure sharing is possible – across mobile

devices, the cloud or through an API.

Content Raven provides:

Simple, one-click encryption for multiple file types.

Actionable analytics to track and control

content sharing.

API integration.

And more!

Sign up for free at: www.contentraven.com

top related