Page 9 - index
P. 9
considering you’re on the hook to meet regulatory requirements whether the information is
stored within your company or with a third-party provider. A report by SkyHigh Networks – a
company that tracks the use of cloud services for corporate customers – found that
organizations used an average of 759 cloud services in Q1 2014 – a 21% increase over the
previous quarter. The same report revealed that of the total amount of cloud services used in
Q1 – 3,571 – only 7% were “enterprise-ready”, meeting stringent requirements for data
protection, identify verification, services security and legal protection. Make sure to do proper
due diligence before selecting a cloud vendor to find out exactly where you data will reside, who
has access and what controls are in place to keep breaches at bay.
4) Stop the quarterback sneak: When there’s no easy way for employees to get to the
documents they need, when they need them, they’ll figure it out on their own. Short on time,
employees will turn to the first public cloud file sharing service they can find, particularly if the
solution is easier to use than what is available from their employer. This opens up huge security
risks, particularly when IT isn’t aware of the situation or intentionally turns a blind eye. It’s
important to endorse one file sharing solution and collaboration solution for use enterprise-wide.
If you don’t, employees will likely turn to consumer-class solutions and you lose control over
how files are distributed and who has access.
5) Promote teamwork: You want to enable employees to easily access data without resorting to
the file sharing workarounds discussed above. Therefore, it’s critical to provide ubiquitous
mobile access to data regardless of where it resides – in SharePoint, on shared drives, or ECM
systems. You also want to provide integration with LDAP and Active Directory, as well as single
sign-on services, DLP services and mobile device management (MDM) systems, for the peace
of mind that security controls are consistent across all employees’ communications.
6) Don’t forget that you’re the coach: Keeping pace with employees’ mobile accessibility
requirements doesn’t mean you have to give up fine-grained control. You require around-the-
clock visibility into file and data activity, including logging and audit trails to support compliance
requirements. Remember that you call the shots and need to enforce your organization’s own
security, compliance and mobile access policies behind-the-scenes while keeping mobile
workers productive.
7) Prepare for the fumble: Every 3.5 seconds someone in the U.S. loses a cell phone.
Therefore, you need to make sure you have remote monitoring, logging and wiping capabilities
to provide much-needed visibility and control should a device be lost or stolen.
You want to securely mobilize enterprise content and reap the rewards of cloud computing while
keeping your company’s data safe from unwanted eyes. The key is to find a winning strategy
that builds upon your organization’s existing security controls, provides secure access to any
content from any devices from anywhere and enables employees to be as productive as
possible.
I25B /1B>9>7C &171J9>5 M +5@D5=25B 49D9?>
?@IB978D K I25B 565>C5 &171J9>5 << B978DC B5C5BF54 G?B<4G945