three principals for simple, secure content sharing
DESCRIPTION
The risks of insecure content sharing are rampant no matter which platform you’re using. By following three principles for simple, secure sharing, an organization can stay mobile and connected – without risking a security breach.TRANSCRIPT
3 Principles for
Simple, Secure Sharing
1
2
We do business in a mobile, cloud-based, connected
environment – and it’s not slowing down.
3
We do business in a mobile, cloud-based, connected
environment – and it’s not
slowing down.
The projected world wide shipments of smartphones
and tablets in 2014 is expected
to reach 2.2 billion. (Gartner)
4
Not only are we
buying more
smartphones and
tablets – we’re using
them for work.
5
Not only are we
buying more
smartphones and
tablets – we’re using
them for work.
81% of Americans use their
personal mobile devices for work.
(Gartner)
6
Not only are we
buying more
smartphones and
tablets – we’re using
them for work.
81% of Americans use their
personal mobile devices for work.
(Gartner)
By 2017, half of employers will
require employees to supply their
own device for work purposes.
(Gartner)
7
The BYOD (bring your own device) movement has
fueled the growth of mobility in businesses of all
sizes – from enterprises to SMBs.
8
The BYOD (bring your own device) movement has
fueled the growth of mobility in businesses of all
sizes – from enterprises to SMBs.
The BYOD and enterprise mobility market is expected
to grow at the rate of 15% annually –
up to $181 billion by 2017. (Computer World)
9
But for all of the convenience and cost savings that
mobile devices can bring to the workplace –
there’s one big problem…
10
But for all of the convenience and cost savings that
mobile devices can bring to the workplace –
there’s one big problem…
SECURITY
11
There is a pressing
need for secure
sharing…
12
Whether you’re sharing between computers,
There is a pressing
need for secure
sharing…
13
Whether you’re sharing between computers,
between mobile devices,
There is a pressing
need for secure
sharing…
14
Whether you’re sharing between computers,
between mobile devices,
Or anywhere across the cloud.
There is a pressing
need for secure
sharing…
15
The risks of insecure sharing are rampant
no matter which platform you’re using.
16
The risks of insecure sharing are rampant
no matter which platform you’re using.
According to the Leaking Vault, over 1.29 billion
records were disclosed internationally between 2005
and 2011.
17
The risks of insecure sharing are rampant
no matter which platform you’re using.
18
Deliberate theft and stealing.
19
Deliberate theft and stealing.
Employee error or carelessness.
20
Deliberate theft and stealing.
Employee error or carelessness.
Lost or stolen devices.
21
Deliberate theft and stealing.
Employee error or carelessness.
Lost or stolen devices.
Insecure channels of sharing.
22
Sharing information across the cloud
is essential - but risky.
In order to keep information secure, organizations need
to adopt security practices that offer protection at the
document level.
23
Why at the document level?
24
Why at the document level?
BYOD devices may not have sufficient security to
protect important data.
25
Why at the document level?
BYOD devices may not have sufficient security to
protect important data.
Password protected devices can be lost or stolen, and
then cracked.
26
Why at the document level?
BYOD devices may not have sufficient security to
protect important data.
Password protected devices can be lost or stolen, and
then cracked.
Forwarded or shared documents could be accessed by
third parties without your authorization.
27
By following three principles for simple, secure sharing,
an organization can stay mobile and connected –
without risking a security breach.
28
If content security measures are too difficult,
they simply won’t be used.
29
If content security measures are too difficult,
they simply won’t be used.
47% of employees using personal mobile devices at
work do not believe they are “in compliance” with their
company’s mobile device policy.
30
Employees engage in risky behavior with mobile
devices and content despite knowing better.
31
Employees engage in risky behavior with mobile
devices and content despite knowing better.
36% click on unverified links from social media.
32
Employees engage in risky behavior with mobile
devices and content despite knowing better.
36% click on unverified links from social media.
11% use cloud services to send/share work documents
without IT permission.
33
Employees engage in risky behavior with mobile
devices and content despite knowing better.
36% click on unverified links from social media.
11% use cloud services to send/share work documents
without IT permission.
12% store work passwords on their devices.
34
A content security solution has to be easy
to use.
Principle#1
35
A content security solution has to be easy
to use.
Integrated into the preferred sharing platform
(web, email or mobile).
Principle#1
36
A content security solution has to be easy
to use.
Integrated into the preferred sharing platform
(web, email or mobile).
No complicated infrastructure requirements.
Principle#1
37
A content security solution has to be easy
to use.
Integrated into the preferred sharing platform
(web, email or mobile).
No complicated infrastructure requirements.
No extra burden on the IT department.
Principle#1
38
Secure, simple sharing also means sharing
across multiple device types.
Principle#2
39
Secure, simple sharing also means sharing
across multiple device types.
Embracing BYOD means handling the security needs
for multiple device types.
Principle#2
40
Secure, simple sharing also means sharing
across multiple device types.
Embracing BYOD means handling the security needs
for multiple device types.
In a recent survey from IDC, IT managers
underestimated the number of consumer
Devices n their networks by 50%.
Principle#2
41
Simple, secure sharing solutions need
to address multiple file types.
Principle#3
42
Simple, secure sharing solutions need
to address multiple file types.
We live in a multimedia environment. We share:
Principle#3
43
Simple, secure sharing solutions need
to address multiple file types.
We live in a multimedia environment. We share:
Documents
Principle#3
44
Simple, secure sharing solutions need
to address multiple file types.
We live in a multimedia environment. We share:
Documents Videos
Principle#3
45
Simple, secure sharing solutions need
to address multiple file types.
We live in a multimedia environment. We share:
Documents Videos
PDFs
Principle#3
46
Simple, secure sharing solutions need
to address multiple file types.
We live in a multimedia environment. We share:
Documents Videos
PDFs Images
Principle#3
47
Simple, secure sharing solutions need
to address multiple file types.
We live in a multimedia environment. We share:
Documents Videos
PDFs Images
And more
Principle#3
48
Simple, secure sharing solutions need
to address multiple file types.
A simple, secure sharing solution has to work with
multiple file types to support the real world business
environment.
Principle#3
49
Simple, secure sharing is possible – across mobile
devices, the cloud or through an API.
Content Raven provides:
Simple, one-click encryption for multiple file types.
Actionable analytics to track and control
content sharing.
API integration.
And more!
Sign up for free at: www.contentraven.com