Commvault partners with Pure Storage » Cisco Live, Melbourne, AU and Tinton Falls, NJ: Commvault has announced the integration of its Commv... OF FOOLS OF THE MIDDLE BELT, ONE NORTH AND PASTOR... » A treatise on pastoral jihadism, islamism, arabism and cultural imperialism in Nigeria (Ephesians ... Where was Aisha Buhari when idiot Kumapayi flagr... » "Clip-clip..clip-clip...Did you not hear when BABA DAURA say women's place is in the kitchen?" ... UKCloud launches Disaster Recovery to the Cloud se... » London: UKCloud has announced the launch of Disaster Recovery to the Cloud, a self-service replicati... ADG Holdings bolsters security protection with Tra... » SAN MATEO, CA : TrapX Security™ has announced that ADG Holdings, a provider of proprietary trading a... ExtraHop combines analytics and low-cost storage... » London, UK: ExtraHop has announced several major platform enhancements as part of version 6.2. These... DEFENCE MINISTER MEETS TEENAGERS TAKING PART ... » Defence Minister Earl Howe today met teenagers at the Army’s first ‘Supercamp’, a new initiative whi... SONG OF THE SEASON » Also, visit: www.scorpionnewscorp.com APC, SO-SO TALK-TALK, SO-SO MOTIONS-MOTIONS, NO ACTION ... EEMBC and prpl align to drive use of hypervisors t... » SANTA CLARA, CALIF: Recently the prpl Foundation and EEMBC announced a formal partnership to advance... Qognify helps Navi Mumbai in the making of a safe ... » Qognify has announced the successful implementation of its market-leading Safe City solution in Navi...

Our Guest Columnists

John Walker
Professor John Walker is the owner and MD of Secure-Bastion Ltd, a specialist Contracting/Consultancy in the arena of IT Security Research, Forensics, and Security Analytics. READ MORE >>


YORGEN EDHOLM
Yorgen Edholm is President and CEO of Accellion, a pioneer and leading provider of secure file transfer and collaboration solutions. READ MORE >>



Faitelson
Mr. Faitelson is responsible for leading the management, strategic direction and execution of the Varonis vision.
READ MORE >>

 


Mike Small

 

Mike Small has over 40 years experience in the IT industry. He is an honorary fellow analyst ....

READ MORE >>


Andy Cordial

Andy Cordial, managing director of secure storage systems specialist Origin Storage ...
READ MORE >>


Paul Steiner
Dr Paul Steiner joined Accellion in 2001 as Senior Vice President-Europe...
READ MORE >>


Durbin

Steve Durbin is Global Vice President of the Information Security Forum (ISF). He has served as an ...
READ MORE >>


David Gibson

David Gibson has been in the IT industry for more than fifteen years, with a breadth of experience in data governance, network management, network security, ..

READ MORE >>


Jane Grafton

Jane Grafton has more than twenty years experience in domestic and international sales, marketing and business development.

READ MORE >>


Mr Dimitriadis

Christos K. Dimitriadis, CISA, CISM, is the chief information security officer of INTRALOT S.A, a multinational supplier of integrated gaming and transaction processing systems based in Greece, ...

READ MORE >>


Philip Lieberman

Philip Lieberman, the founder and president of Lieberman Software, has more than 30 years of experience in the software industry.

READ MORE >>


Jon Mills

Jon Mills is the managing director and general manager of SEPATON for Europe, Middle East and Africa (EMEA).

READ MORE >>


Dr Rustom Kanga

Dr Rustom Kanga is co-founder and CEO of iOmniscient, one of the pioneers in the field of Video Analysis.

READ MORE >>

CLICK HERE TO

SOCIAL BOOKMARK

With summer in full swing, employees across the country are heading out on vacation; likely topping their list of items to pack, mobile devices such as iPads, iPhones, Androids and BlackBerries.

Mobile devices are changing how people do business by providing access to information from anywhere, anytime, even while on vacation. Yet as these devices grow more sophisticated and penetrate the workplace in increasing numbers, enterprises are faced with the challenge of how to ensure intellectual property and other confidential information remains secure and compliance mandates are met. As regulations become increasingly strict and the penalty for non-compliance steeper than ever, enterprises cannot afford to turn a blind eye to mobile devices.

With 75 percent of US employees expected to be mobile by 2012[1][1], it is no longer enough for an organization to simply provision their employees for when they’re sitting at their desks. Enterprises must proactively address the issue of how employees share confidential information and collaborate via mobile devices. Otherwise, they are putting their organization at risk for a data breach or non-compliance when employees turn to easily accessible free or low cost cloud-based collaboration solutions that IT has no control over to solve their mobile file sharing needs.

Fortunately, significant advancements have been made in enterprise collaboration technology that enables employees to share information via mobile devices in a manner that is highly secure and auditable. Of course, not all collaboration tools are equal. There is a vast difference between those developed for consumers and those developed specifically for enterprise organizations. To help you demonstrate compliance and ensure the confidentiality of data being shared via mobile devices, consider the following:

Don’t be limited by the Cloud

Corporations and government agencies require more than just a freemium, public multi-tenant cloud solution. Meeting the needs of enterprises requires choice of where to store data, particularly sensitive information. For instance organizations in EMEA do not want data stored in the US.

Enterprise solutions should support a variety of deployment options for virtual environments including VMware, Citrix XENserver, Microsoft HyperV, public, private and hybrid cloud environments, FIPS 140-2 certified deployment and also on-premise physical installation. The solution should allow you to mix and match different deployment modes and integrate as one solution.

Demand Control

Allowing employees to sign-up for individual file sharing accounts exposes organizations to significant data security and compliance risks. Because IT has no visibility or control over the information being accessed or shared, it is impossible to know just how exposed an organization is to a data breach.

Enterprise-level solutions provide IT administrators with the necessary visibility and control to monitor and manage what information is being accessed, by who and when so the enterprise can comply with industry regulations such as SOX and HIPAA that require monitoring and reporting systems to be in place. Utilizing security controls, IT administrators and business users can set policies to prevent files from being forwarded to unauthorized users.

When looking for a solution, make sure you have the ability to set automated security policies to validate recipients, set workspace and file expiration dates as well as multi-tier access and permissions to workspaces and files. With file access monitored and logged, demonstrating compliance will no longer be an issue.

Make it Easy for Users

Mobile apps should have an intuitive interface and be available for common mobile platforms, such as Android, Apple iOS, and BlackBerry. When security solutions are easy-to-use, employees use them, rather than looking for work-arounds that might put confidential data at risk.

When considering your options, do not overlook file sizes. If the solution you select does not accommodate the sharing of large files, you risk users turning to non-secure, unmanaged applications.

Rely on server-based security

Server-based security, as compared to client-based security, will help you avoid the daunting task of having to configure an ever-changing collection of hundreds or even thousands of mobile devices. Server-based security also enables administrators to enforce changes to security policies immediately. For example, to disable mobile access for an ex-employee, the person’s mobile phone is not required. With server-based security, IT can simply turn off access through an administrative dashboard.

Support Internal and External Users

Employees need to collaborate not only with colleagues but also with external users, such as business consultants, ad agencies, industrial design firms, legal counsel, and other types of business partners. Therefore it is important the solution you select supports cross-boundary collaboration, so mobile users can work with all members of a team, including external users.

Don’t Recreate the Wheel

Integration with your existing IT infrastructure, including LDAP directories, active directory services, archiving systems, and data loss prevention (DLP) systems is essential. The ability to integrate you’re your existing directories ensures access controls are consistently enforced across all IT services, while integration with archiving and DLP systems enables collaboration services to be part of broader data security initiatives and practices.

Experience Counts

The collaboration and file transfer space is quickly growing as established enterprise veterans, start-ups and consumer-focused providers look to answer the growing need for mobile file sharing solutions. When conducting your search, it is important to remember, experience counts. Identifying vendors with a proven track record of selling, marketing, and most importantly supporting IT organizations is essential.

As data breaches continue to top headlines and penalties for non-compliance continue to climb, summertime is not the time to ignore security vulnerabilities. With an enterprise-level collaboration and file sharing solution in place for mobile devices, the temptation for users to use free dropbox-type applications is eliminated. IT administrators can manage and audit file sharing, ensuring that users are complying with security policies; and IT managers and compliance officers can be confident that compliance mandates are being met.

ABOUT YORGEN EDHOLM

Yorgen Edholm Yorgen Edholm is President and CEO of Accellion, a pioneer and leading provider of secure file transfer and collaboration solutions. A Silicon Valley veteran, Yorgen has more than 25 years of Enterprise Software expertise. Yorgen co-founded Brio Technology and during 12 years as CEO, took the company public and grew it to $150 million in revenues with over 700 employees and a customer base of over 5,000 organizations. He can be reached at This e-mail address is being protected from spambots. You need JavaScript enabled to view it

 


Who can be our Guest Columnist?