If you ve been living under a rock

Similar documents
Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.

INTRODUCTION TO CLOUD STORAGE

Learn how to get started with Dropbox: Take your stuff anywhere. Send large files. Keep your files safe. Work on files together. Welcome to Dropbox!

The Dropbox Problem: It s Worse than You Think

Managing Devices and Corporate Data on ios

Manual Sync Contacts On My Iphone To Gmail Account Without Itunes

Box Competitive Sheet January 2014

Secure communications simplified

Synchronizing Your PC

Media-Ready Network Transcript

Synchronizing Your PC

Top. Reasons Legal Teams Select kiteworks by Accellion

How to Backup Your Computer. Adele Berenstein Jan 17, 2018

FilesAnywhere Features List

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

Single Sign-On. Introduction

AUDIENCE PARTICIPATION PORTION OF PROGRAM

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Storing your Data in the Cloud

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Enterprise Mobile Management (EMM) Policies

CipherPost Pro. Secure communications simplified. Feature Sheet

Cirius Secure Messaging Single Sign-On

Remote Desktop Access for the Mobile Workforce

Admin console design changes

Accessing CharityMaster data from another location

How to Access Protected Health Information from Anywhere and Stay Compliant

Single Sign-On. Introduction. Feature Sheet

2015 Cloud Collaboration and Mobility Guide

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

Introduction to

BlackBerry Mobile Voice System

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.

News and Updates June 1, 2017

Google Identity Services for work

Maximize your move to Microsoft in the cloud

Original Article Written at by Ashish Technospot.net

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE

AirWatch for Android Devices for AirWatch InBox

SECURITY AND DATA REDUNDANCY. A White Paper

Six steps to control the uncontrollable

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA)

CAMPUSPRESS TECHNICAL & SECURITY GUIDE

Going Mobile at Northwestern

Password & Tutorials Packet

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple

IT SECURITY FOR LIBRARIES PART 1: SECURING YOUR LIBRARY BRIAN PICHMAN EVOLVE PROJECT

The First Six Steps to Securing Remote Locations 1

CommTech White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync

Cloud-enable your NetApp Storage with EgnytePlus File Sharing Infrastructure

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Security Specification

How to Really Use Your ipad for Business. Presented by: Christopher Breen Senior editor, Macworld

icloud History & Services Dr. Leon Chapman

OWASP Thailand. Proxy Caches and Web Application Security. OWASP AppSec Asia October 21, Using the Recent Google Docs 0-Day as an Example

Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory

Adding a POP/IMAP

The Essential Guide to VIRTUAL TEAM. Building Tools

How Do I Sync My Iphone To Another Computer Without Losing Everything

What s Over-The-Top (OTT) voice and SMS?

SAS and F5 integration at F5 Networks. Updates for Version 11.6

Anchor Competitive Sheet May 2015

Office 365 Adoption eguide

Compliance in 5 Steps

A company built on security

itunes What Is It Good For? 2018 Becky Diamond 1

OpenIAM Identity and Access Manager Technical Architecture Overview

Workshare imanage Integration File Sharing & DMS Mobility. Getting Started Guide

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

Encrypted containers for secure file transport

Adobe Spark. Schools and Educators. A Guide for. spark.adobe.com

LeakDAS Version 4 The Complete Guide

Enterprise file sync and share using Citrix ShareFile and IBM Storwize V7000 Unified system

Outlook 2010 Anywhere Setup

Cloud FastPath: Highly Secure Data Transfer

Virtru Microsoft Protection

How should I grade projects? WEB 2.0 TOOLS TO ENHANCE THE CLASSROOM MAY What are Web 2.0 Tools? Todays Sites:

APPS & MOBILE DEVICES

2017 NMUG CLASSES MANAGING THE IPHONE AND IPAD IN IOS 10

Control Do Not Spy in Win 10 Courtesy of Jim Palfini

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

Mastering Your iphone Session 1

Storing Data and Pictures in the Cloud for Free

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

Table of Contents... ii. Go Ahead Bring Your Own Device to Work... 1 Requirements... 1

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

Welcome to Secure Wi-Fi. Your company enrolled you in this service to ensure the business and personal data on your device remains secure.

Go Ahead Bring Your Own Device to Work... 1 Requirements... 1

Adobe Spark. Schools and Educators. A Guide for. spark.adobe.com

Pulseway Security White Paper

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

WordPress Security Implementation Guideline

1. Type in your account and password. If you have Windows, Mac, iphone, or Android, you can download corresponding applications here

SURFdrive AN OWNCLOUD SYNC & SHARE SERVICE. TF-storage Rogier Spoor SURFnet 22 SEPT 2014

Automile User Guide. Last updated May 2017

Transcription:

What is Dropbox? If you ve been living under a rock

What is Dropbox? Your life s work, wherever you are

The Good

The Good A System Administration marvel 300 million files saved per day as of 5/23/2011 That s 1 million files every 5 minutes! Must handle backup/versioning for all these files Smart idea: a lot of the computationally expensive work is done locally (hashing, comparing, indexing) A local DB caches what it knows about server to save time Using hashes, only save each file once with millions of users each with a Lady Gaga mp3, this obviously helps GZIP compression LAN Sync

The Good A useful tool for a sysadmin s personal use Store your documentation, access anywhere Automatic versioning Collaboration with other system admins

The Good Can outsource backup and synchronization with it As a System Admin, telling your users to use Dropbox for their work files; no need to make your own backup or sync solution then Works for small organizations without strict policies. A high school comes to mind, where a teacher can store their lesson plans and even personal data in their Dropbox the school s IT department doesn t need to worry about this challenging issue of backup/sync.

The Good Symbolic links can give Dropbox super powers Want to sync something, but can t move it to your Dropbox because a program depends on it staying where it is? Just make a symlink! Game saves Application settings Windows supports it (mklink), and obviously so does Unix-based systems including OSX (ln). Similarly, sync programs like SyncToy (Windows) or Conduit (Gnome) help similar use cases

The Good/Cool Random cool things you can do Dropbox as a CDN for a Wordpress site, similar performance to S3 and Google CDN http://www.labnol.org/software/dropbox-cdn-forwordpress/18266/ Save automatic home video captures to your Dropbox to monitor from anywhere; no need to setup video server Have torrent client monitor a folder inside your Dropbox for new.torrent files, to automatically start torrent downloads at home from work/school http://lifehacker.com/5175362/start-bittorrent-downloads-athome-from-any-computer-with-dropbox Set Windows 7 desktop to be a slideshow of a shared Dropbox folder; your friends can add photos and you ll automatically start seeing them

The Good/Cool More random cool things you can do Store your itunes Library in your Dropbox works seamlessly, and can stream the music (albeit without playlists) from anywhere via website or mobile apps MailDrop monitors IMAP e-mail folder for attachments, automatically puts them in Dropbox http://www.getmaildrop.com Synchronize your passwords by putting a portable password manager like KeePass in your Dropbox

The Bad

The Bad User s personal files going through your network Even with all the tricks Dropbox uses to minimize network traffic, if a user has their itunes Library synced, there is going to be some serious bandwidth usage. Who knows what kind of files they have synced, which are now traveling into your network viruses, illegal music, etc.

The Bad Doesn t scale for organizational use clearly meant for individual use and very specific sharing use cases No Role-Based Access Control to files No sense of hierarchy to sharing No central administration no way to know how much data is improperly shared

The Bad Users demand synchronization At the very least, they expect their work e-mail on their smart phones we already heard a story in class about how badly this can expose a company With the many devices everyone has, they will find some way of sharing files, whether you want them to or not

The Ugly

The Ugly Compliance What if a doctor transmits a patient s health care record? What if a broker transmits a stock recommendation? These are against federal law and regulations, not to mention data leak issues.

The Ugly Company leaks Save a confidential document in your Dropbox at work. Gets synchronized to your iphone while at a Wi-Fi hotspot. SSL to the rescue you hope. Data leakage internally, or externally, can lead to: loss of competitive advantage, regulatory violations, and fraud.

The Ugly Security concerns Not encrypted correctly To enable disk space savings, Dropbox hashes your unencrypted data and stores it in a way so that their servers can access the unencrypted data. https://www.dropbox.com/help/27 https://www.dropbox.com/help/28 This is a huge personal privacy concern, as well as an issue for corporations with confidential data. Not to mention, the 4 hours when anyone could access anyone s Dropbox files. http://www.wired.com/threatlevel/2011/06 /dropbox/

Solutions?

In Many Cases, Blocked Many System Administrators respond very simply, by blocking access to Dropbox altogether. At two Fortune 100 companies I worked at, employees were physically unable to install their own software due to security constraints. In one case, even the Dropbox.com website was blocked. As a System Admin, we can block the sites and the programs, but that s not a real solution.

Try to create your own solution: DIY Secure workspaces to storing, syncing, sharing files. Require 24/7 protection, password authentication, encryption, role-based access control Central administrative oversight: monitoring, revocation, auditing, reporting Integrate with existing authentication (SSO, LDAP, etc.) Add in versioning, redundancy, and ubiquity (mobile/web/crossplatform) Still want to block Dropbox/etc. to force usage of DIY solution This is a HUGE engineering undertaking only large enterprises with tons of resources can pull this off. You d still be hard-pressed to design a system where human stupidity cannot compromise your data

Recommendation: Middle Ground A personal-focused off-the-shelf solution (Dropbox) lacks controls a mediumsized company needs. A DIY solution is beyond the scope of what most IT departments can handle. Middle ground: Off-the-shelf enterprise-focused solution. An example: Virtual, hosted desktops (e.g. VMWare View). Your company-wide SSO can log you into your desktop session on any company-owned computer, globally. Has all your files/email/etc. Allow login from home via secure VPN, but only to access the virtual desktop never to use your own personal system to access a company network. This accomplishes synchronization/ubiquity, and the hosted systems can be made redundant and highly available with usual techniques. The virtual sessions can be easily monitored and audited. Does not address: data sharing, versioning.

VMWare View Video If have time: http://www.vmware.com/products/view/overview.html

The End