Eliminating Email Attachments And Addressing Your Document Security Requirements - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

Eliminating Email Attachments And Addressing Your Document Security Requirements

Description:

Top security concerns among customers and partners. Zoom into some important details ... Versus fixed organization and processes. Outside the organization ... – PowerPoint PPT presentation

Number of Views:19
Avg rating:3.0/5.0
Slides: 19
Provided by: Tom3267
Category:

less

Transcript and Presenter's Notes

Title: Eliminating Email Attachments And Addressing Your Document Security Requirements


1
Eliminating Email Attachments And Addressing
Your Document Security Requirements
  • Tom Grant
  • Vice President, Product Management
  • April 2007

2
AGENDA
  • Review the security landscape
  • Top security concerns among customers and
    partners
  • Zoom into some important details
  • Case studies
  • Plan where to go next
  • Targets of opportunity

3
The Age of Security
  • Security still a top priority
  • Many projects focused on security
  • Security shapes every IT project
  • New technologies new security challenges
  • More sophisticated attackers
  • Reason for concern, not alarm
  • Threats are real, but identifiable and separable
  • Responses exist

4
CIO magazine survey, 2007
  • Top IT management priorities
  • Aligning IT and business goals
  • IT-enabled process improvement
  • Business continuity/risk management
  • Top technology priorities
  • Integrating/enhancing systems and processes
  • Ensuring data security and integrity
  • New business services/products

5
Infoworld 2007 survey crisis of confidence
6
Top security concerns (what we hear)
  • E-mail
  • Infrastructure (SOA)
  • Collaboration
  • Disaster recovery
  • Compliance, discovery

7
THREATDOWN E-mail
  • Why e-mail is good
  • Familiarity
  • Ease
  • Ubiquity
  • Why e-mail is bad
  • Overused in many business processes
  • Too much high-value content
  • Too many threats focused on it

8
Indiana State University
  • Distributed standardized laptops
  • 8.500 undergraduates
  • 523 faculty
  • Configured to point users to the Xythos server
  • Opened the door to solving several problems
    simultaneously
  • Encourage better e-mail habits (tougher quota)
  • Reduce risk from stolen or compromised laptops
  • Encourage thinking about information lifecycle
    (store, secure, update, archive, delete)
  • Ultimately, the best place for filesfor the
    individual and the campuswas on the Xythos
    server
  • The wrong places e-mail server, laptop

9
RESOLUTION E-mail
  • Moral of the story
  • Make e-mail better
  • Carrots, not just sticks
  • Top features (general)
  • Tickets/Intellilink
  • Intellittach
  • Server-based collaboration features
  • Subscriptions, versioning, locking, etc.
  • Mass configuration, Xythos Drive

10
THREATDOWN Security in SOA
  • SOA is a strategy
  • Service mindset
  • Compartmentalized software
  • Flexible deployment architecture
  • No single technology, but the technologies need
    to be standard
  • Security shapes the SOA strategy
  • Expand SSO
  • Harden potential points of vulnerability
  • Keep up with security patches, fixes, upgrades
  • Choose the right devices, networks, other moving
    parts

11
University of San Francisco
  • Desktop file-sharing creates concern
  • Necessary, both on and off campus
  • Dangerous, given the sensitivity of information,
    fears about security breaches on other campuses
  • Important criteria
  • Work within portal (including LDAP)
  • Support Mac users
  • Secure without interfering with easy usage
  • Xythos adoption
  • Piloted to test group of faculty and students
  • Later rolled out to 10,000 users
  • Included planned upgrades
  • Used to address an expanding number of business
    problems

12
RESOLUTION Security in SOA
  • Moral of the story
  • Choose technology than can evolve and adapt
  • Standards support is vital
  • Follow your users lead
  • Top features/capabilities (general)
  • LDAP integration
  • WebDAV
  • Portal deployment
  • SSO

13
THREATDOWN Collaboration
  • Inside the organization
  • Security should protect but not smother
    collaboration
  • EX Remember VPN?
  • The file plan and the tools must fit your
    organization
  • Versus fixed organization and processes
  • Outside the organization
  • Collaboration will continue, like it or not
  • Better to provide secure, appealing tools than to
    curse the darkness

14
RESOLUTION Collaboration
  • Moral of the story
  • Centralization is good for everyone
  • Users want better practices
  • When protected but not blocked, collaboration is
    the vehicle for ongoing innovation
  • Top features
  • Tickets
  • ACL-based security
  • Secure web access and desktop access
  • Collaboration features on the server
  • Search

15
Chubb Insurance
  • Collaboration in a large organization
    underwriters
  • Geographically dispersed
  • Many underwriters
  • Too much paper content
  • Regularly work with outsiders (other insurance
    firms, customers, etc.)
  • Extremely large document repository (Xythos)
  • Millions of documents, many TB of storage
  • Very large daily throughput
  • Scanned and first generation electronic content
  • Access control, auditing mechanisms ensure
    security
  • Fast adoption (24 X 7 access, simple or familiar
    interfaces)
  • Highly searchable
  • Helped streamline re-insurance

16
Security-related case studies (samples)
  • Assist Micro (partner)
  • Brigham and Womens
  • General Dynamics
  • GNI
  • Johns Hopkins
  • Nevada Joint Union High School District
  • New York City Health and Hospital
  • SAS (partner)
  • Stone and Youngberg
  • University of Calgary
  • US Air Force AOC
  • US Joint Forces Command

17
Top security features
  • Tickets/Intellilink
  • ACL-based security
  • Secure web access and desktop access
  • LDAP integration
  • WebDAV
  • Portal deployment
  • SSO
  • Intellittach
  • Mass configuration, Xythos Drive
  • Server-based collaboration features
  • Subscriptions, versioning, locking, search, etc.

18
CONCLUSION
  • Security may be everywhere, but it doesnt have
    to consume everything
  • For more information
  • http//www.xythos.com
  • http//developer.xythos.com
  • http//xythosondemand.com
  • feedback_at_xythos.com
Write a Comment
User Comments (0)
About PowerShow.com