securing the new digital enterprise: trackable, controlled, and authorized
TRANSCRIPT
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
David Monahan
Research Director
Enterprise Management Associates (EMA)
Kevin Froese
VP of Global Sales
Cirius
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Today’s Presenters
Slide 2 © 2016 Enterprise Management Associates, Inc.
David Monahan – Research Director, Risk and Security
David is a senior information security executive with several years of experience.
He has organized and managed both physical and information security
programs, including security and network operations (SOCs and NOCs) for
organizations ranging from Fortune 100 companies to local government and
small public and private companies.
Kevin Froese, VP of Global Sales
Kevin has been a leader in high-growth technology companies for over 20 years.
He is responsible for strategy, revenue delivery and business development. In
his role he regularly consults with technology and privacy stakeholders in global
companies to develop and deliver highly-secure cloud communication solutions.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Logistics for Today’s Webinar
Slide 3 © 2016 Enterprise Management Associates, Inc.
Questions
• An archived version of the event recording
will be available at
www.enterprisemanagement.com
• Log questions in the Q&A panel located on the
lower right corner of your screen
• Questions will be addressed during the Q&A
session of the event
Event recording
Event presentation
• A PDF of the PowerPoint presentation will be
emailed to you as part of the follow-up email.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
David Monahan
Research Director
Enterprise Management Associates (EMA)
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
The Digital Enterprise
• What is it?
• Paperless?- How about just less paper
• Using technology for a business advantage
• Both internal and external facing digitization
• What are its benefits?
• Time/Efficiency
• Money
• Customer Satisfaction
Slide 5 © 2016 Enterprise Management Associates, Inc.
photo by Louie Psihoyos
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
The Digital Enterprise (continued)
• Expanding use cases
• Business to Consumer-
Reliance on the digital infrastructure health care,
government, finance and others (electronic only
processes)
Loan approvals
Health and care status updates, prescriptions
• Internal approvals
Vacation requests
Click to agree on emails
Slide 6 © 2014 Enterprise Management Associates, Inc.
photo by Louie Psihoyos
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Unsecured Communications Increase Data Loss Risks!
Slide 7 © 2016 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Top Methods of Data Loss or Leakage
Slide 8 © 2016 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTINGSlide 9 © 2016 Enterprise Management Associates, Inc.
Where We Are Today
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTINGSlide 10 © 2016 Enterprise Management Associates, Inc.
Inhibitors for Data/Document Security
What is stopping better security?
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
E-Signatures Provide Data Security and Process Acceleration
Slide 11 © 2016 Enterprise Management Associates, Inc.
* Ombud e-signature research
*
*
*
Securing the New
Digital Enterprise:
Trackable, Controlled,
and Authorized
Kevin Froese,
Global VP of Sales Cirius
• New e-signature drivers:
• Reducing transaction cost
• Convenience and time
• Need to reduce approval friction
• Emergence of “Click to acknowledge.”
• Acceptance-based approvals
• Ordered acceptance
• Trackable
• Leading adoption wave:
• Client agreements, acknowledgements, and consents
• Sales agreements
• Human resources agreements
• Document approvals
E-Signature Evolution: From Agreements to Acceptance
Key E-Signature Risk Factors:
Unencrypted Documents and Links,Authority, and Document Residency
• Document / data leakage
• Theft of personally Identifiable Information
• Risk of regulatory non-compliance
• Agreement and acceptance integrity
• Possible unauthorized approvals
Consequences of Unchecked E-Signature Risk
Expensive and complex security overlays reduce adoption
Digital Enterprise Needs
Digital Enterprise Needs
Security
Digital Enterprise Needs
Security Authority
Digital Enterprise Needs
Security Authority Visibility Control
Digital Enterprise Needs
Security Authority Visibility Control
Usability/Ease of Use for Both Sender and Receiver
Secure E-Signature Case Study: Medical Device Manufacturer
Challenge: Cost Effective FDA-Regulated Notifications and Recalls
• Product recalls done via FedEx and fax
• Slow process (average 257 days from awareness to recall notification
• Expensive postage, tracking, follow up
• High risk of unknown recipient acceptance
• Needs:
• Secure way to send, receive and track two-way product, patient
information & product recall sign-off
• Integration with existing SSO federation service
Alternative Solutions
• Old school encryption solutions are too complicated
and not tracked
• Out of box E-signature solutions create HIPAA risk
(requires complicated PKI)
• E-Signature solutions do not support Enterprise branding nor
SSO out of the box
• Application to send secure bulk messages, files, and e-signature documents
• Tracking and reporting on every recipient action
• Non-repudiated e-signature without expensive PKI
• Supports SSO (SAML and OAUTH)
• Supports compliance for FDA and HIPPA at low cost
• Replaced planned e-signature solution and encryption solution
• Fully hosted; third-party audited
Solution: Cirius Secure Messaging and ‘Click to Acknowledge’ E-Signatures
• Secure e-signatures
• Desktop, web and mobile
• Integrated into the email
workflow
• API integration
• Optional dedicated cloud service
• Tracking and control via
the Delivery Slip
Cirius Secure E-Signatures
Key integrations include: Mobile App Support:
The Delivery Slip
Message tracking Know the moment a
message has been
received, read, replied,
forwarded, printed or
deleted by all receivers.
Message securityUsers have the ability to stop
replies and forwards of their
secure messages and require
the receiver provide a
password.
Message controlTrue message recall allows
users to revoke a message even
after it has been read.
Large File TransferUsers can rapidly send and
receive file attachments of up to
5GB without overloading their
inboxes.
Secure E-SignaturesEasily include documents for
quick ‘Click to Acknowledge’ e-
signatures that are secure and
authenticated
Contact us and receive:
15 minute
demo
30 day
free trial
5 minute
activation
Kevin Froese