Taming the Mobile File Sharing Beast

Similar documents
An Enterprise Approach to Mobile File Access and Sharing

Novell. Mobility Solutions. Joe Marton Sales Engineer Novell North America

Enterprise Mobility Management

Backup Deal Breakers An 8-Step Guide to Finding the Perfect Backup Partner

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

Your World Is on the Move

Centrify for Dropbox Deployment Guide

Migrating Novell ZENworks 7 to Novell ZENworks 10 Configuration Management SP3

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

Five Reasons It s Time For Secure Single Sign-On

Best Practices in Securing a Multicloud World

TRANSPORTER PRIVATE CLOUD APPLIANCES

Design and deliver cloud-based apps and data for flexible, on-demand IT

STREAMLINING THE DELIVERY, PROTECTION AND MANAGEMENT OF VIRTUAL DESKTOPS. VMware Workstation and Fusion. A White Paper for IT Professionals

Streamline IT with Secure Remote Connection and Password Management

Perfect Balance of Public and Private Cloud

HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE

SECURITY THAT FOLLOWS YOUR FILES ANYWHERE

As Enterprise Mobility Usage Escalates, So Does Security Risk

White Paper Server. Five Reasons for Choosing SUSE Manager

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

G Suite: Enabling the connected workspace with a cloud communications system. Google

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Enterprise Guest Access

All the resources you need to get buy-in from your team and advocate for the tools you need.

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

WHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help

Novell Access Manager 3.1

Modernizing Servers and Software

Make security part of your client systems refresh

Simplifying Data Migration through Novell Storage Manager

7 Keys to Comparing Google Apps Premier Edition with Microsoft Exchange Server 2003/2007

Privileged Account Security: A Balanced Approach to Securing Unix Environments

McAfee Total Protection for Data Loss Prevention

THE ESSENTIAL GUIDE: SELECTING A CLOUD COMMUNICATIONS PROVIDER

SIEM: Five Requirements that Solve the Bigger Business Issues

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Evolved Backup and Recovery for the Enterprise

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

Go Cloud. VMware vcloud Datacenter Services by BIOS

ARCHIVE ESSENTIALS

The Road to a Secure, Compliant Cloud

Hybrid Cloud for Business Communications

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Maintain Data Control and Work Productivity

SecureDoc: Making BitLocker simple, smart and secure for you. Your guide to encryption success

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Why is Office 365 the right choice?

Adopting a Least Privilege Approach with Windows 8

Cloud Computing: Making the Right Choice for Your Organization

MOVE BEYOND GPO FOR NEXT-LEVEL PRIVILEGE MANAGEMENT

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

to know about Microsoft Teams

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

Frequently Asked Questions

ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER

Maximize your move to Microsoft in the cloud

Comprehensive Agentless Cloud Backup and Recovery for the Enterprise

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Micro Focus iprint Feature Tour

Cisco Start. IT solutions designed to propel your business

BACKUP TO THE FUTURE A SPICEWORKS SURVEY

Evolution of IT in the Finance Industry. Europe

Enterprise file sync and share using Citrix ShareFile and IBM Storwize V7000 Unified system

Code42 Defines its Critical Capabilities Methodology

We make hybrid cloud deliver the business outcomes you require

The Data Protection Rule and Hybrid Cloud Backup

Empower your teams with more video meeting options.

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.

Disk Encryption Buyers Guide

6 Critical Reasons for Office 365 Backup. The case for why organizations need to protect Office 365 data

Why Enterprises Need to Optimize Their Data Centers

Rethinking MDM in a BYOD World

Total Cost of Ownership: Benefits of the OpenText Cloud

2018 Edition. Security and Compliance for Office 365

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

The more intuitive way to work.

NFON Whitepaper: Integrating Microsoft Lync (Skype for Business) with Telephony

Skype for Business Users: 18 Things to Know about Microsoft Teams for 2018

Micro Focus Desktop Containers

THE ULTIMATE GUIDE TO VIDEO CONFERENCING TECHNOLOGY

Unified Communications. What are the Key Benefits of Replacing PBX with Cloud Based Solutions?

HIPAA Regulatory Compliance

Managing Security While Driving Digital Transformation

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

SOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Secure File Sharing and Real-Time Mobile Access to Business Data with Citrix ShareFile

SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD

Built to keep you moving

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON

Go mobile. Stay in control.

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

Securing Your Most Sensitive Data

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Availability and the Always-on Enterprise: Why Backup is Dead

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments

RHM Presentation. Maas 360 Mobile device management

Transcription:

White Paper File and Networking Services Taming the Mobile File Sharing Beast To Whom Should You Entrust the Enterprise Goods? Mobile file access and sharing is not only the rage, but it s fast becoming a workforce necessity. If you don t provide your users a more secure, viable option for getting and sharing files on the move, they ll take matters into their own hands. And you know how that generally ends: with enterprise data being stored in consumer-grade cloud services. If you re already a step ahead of that curve and looking at more enterprise-friendly mobile file access and sharing solutions be aware that many lack the security you need, stifle user productivity and create additional work for IT teams that are already stretched far too thinly.

File and Networking Services White Paper Taming the Mobile File Sharing Beast Assessing the Different Classes of Mobile File Access Offerings Mobile file access and sharing is not only the rage, but it s fast becoming a workforce necessity. If you don t provide your users a more secure, viable option for getting and sharing files on the move, you d better believe they ll take matters into their own hands. In fact, in a June 2012 study conducted by SkyDox, sixty-six percent of the 4,000 employees surveyed admitted to using free file-sharing platforms to share corporate documents 55 percent of them without the knowledge of their IT departments. The productivity gains and time savings they receive from anywhere, anytime file access are more than enough incentive for users to ignore the risks associated with putting enterprise data in consumer-oriented cloud offerings. But IT can t afford to ignore those risks. You may be deadly scared about what your mobile users are doing with those valuable digital assets. But as always, you have to strike the right balance between corporate governance and user needs. Maybe you re already looking at mobile file access and sharing solutions that seem to be more enterprise-friendly. If so, that s great. But be aware that among the different classes of solutions out there, many lack the security you need, stifle user productivity and create additional work for IT teams that are already stretched far too thinly. Consumer-grade Cloud Services Organizations that let users drive the mobile file access agenda discover that their users select consumer-grade cloud services like Dropbox, Google Drive, and SkyDrive. These services make it easy for users to sign up and start using the service right away. But the primary focus of these services is usability for the masses, not security for the enterprise, leading to headline news on security lapses and outages. Not only do these services lack the authen tication controls and enterprise-class security you ve established within your own infrastructure, but they leave you out of the governance loop. You have little control, if any, over what files users can store in and share from these services. And what happens to the corporate files in an individual s cloud storage account if the user quits or gets laid off? In all cases, consumergrade cloud storage services usurp your ability to protect your intellectual property and prevent data leakage. Your job in IT is to get ahead of the end user curve by providing a better alternative. 2

Enterprise-targeted Cloud Services In an attempt to fill the security void left by consumer-oriented cloud services, other cloud services have surfaced with a focus on meeting the needs of the enterprise. These services tout enterprise-class security and control, giving IT administrators the ability to manage access rights and authentication policies. This offer of enterprisegrade security and IT control has its appeal, especially when coupled with the promise that it will free you of the burden of hosting and managing that storage infrastructure. Perhaps it seems like the perfect solution to securely address your mobile users file access and sharing needs. Not so fast. So-called enterprise-grade cloud storage services have three main failings. Duplication of Management Effort The first failing of enterprise-targeted cloud services for mobile file access is duplication of management effort. You ve likely spent several years establishing and fine-tuning the security controls and access privileges for your enterprise data. These solutions invite you to tackle that arduous process all over again, but this time using their security tools instead of the ones you already know and trust. You also earn the ongoing opportunity to manage security for your existing in-house data infrastructure and this new hosted infrastructure separately. Empty Data Repositories The second, and perhaps the most important and often overlooked, failing of enterprise cloud services for mobile users relates to the challenge of migrating data from your enterprise infrastructure to the cloud. You need to take a realistic look at how many weeks and months of effort it will take to move all those files to your new cloud storage. Do you move all of them? Some of them? Is it a complete move or just a copy, leaving you with duplicate data? How will you know which files your users really need or want in the cloud? The reality is that IT usually leaves it to the users to decide. And, in a way, that makes sense. However, with the burden now on the user, you have no guarantee that they ll even take advantage of this new service you ve invested in. When the choice is between the consumer solution where they ve already stored their files or the new enterprise service that remains an empty repository until they get around to copying or moving content, the result usually doesn t favor policy and control. File Duplication and Version Control When you re copying files from your enterprise repository to a hosted cloud service, you re likely to end up with file duplication and version control issues. Users might not always remember or know which files have been moved to the cloud. One day they work on a version in the cloud, and then a week or two later they make changes to the version stored on the enterprise file server. This becomes even more likely and troublesome with shared files, where different users work on different versions stored in various repositories. Some socalled enterprise cloud services do include auditing tools to address version control problems, but they re only effective if you do a complete migration of your files. Hybrid Cloud/On-premise Solutions To address some of the deficiencies evident in enterprise-targeted cloud services, a few vendors have started offering a hybrid service for mobile file access and sharing. While their focus is to move most of your files to the cloud, these hybrid services allow organizations to store some of their files in the provider s cloud service and others in the organization s on-premise data centers. By empowering organizations to leverage their own data center infrastructure for mobile file access and sharing, these hybrid solutions definitely take a step in the right direction. On-premise storage, after all, not only gives organizations greater control and oversight over their data, it helps them meet regulatory and compliance requirements, as well. Unfor tunately, these hybrid solutions share many of the same failings of the enterprise-targeted cloud services. Allocation of New and Separate Storage Even though hybrid services allow organizations to leverage their on-premise data center and equipment, the organizations still have to allocate new and separate storage space for housing the mobile data. Obviously, the movement of data from an old on-premise data store to a new on-premise data store won t be as monumental as moving all those terabytes across the Internet. But you still have the questions related to what files get moved, who moves them, and how to deal with potential duplication of data. www.novell.com 3

File and Networking Services White Paper Taming the Mobile File Sharing Beast Lack of Real Integration with Existing File System The bigger problem is that even if your mobile data stays on-premise, your mobile file shares are not really integrated with your other existing file shares. Some hybrid solutions offer a level of integration with Active Directory, but you re still dealing with a new file system. Once again, you face the significant effort of recreating and reconfiguring all of your established file access controls for the data moved into that new system. Rather than managing a single file system infrastructure, you now have to manage two separate infrastructures. And, as with the enterprise cloud services, managing your hybrid solution will also require you to use a separate set of management utilities. Investment in Additional Data Management Processes These hybrid services add complexity to your environment. Since they re not really leveraging your existing file service, they re also not leveraging all the existing processes you have in place for managing your data. For example, how will you back up these new mobile repositories? How much effort will it require to rework your existing backup services to encompass the new data stores? Will you have to invest in and roll out new backup services? What other workflows and services will you have to reconfigure to accommodate a hybrid mobile file access and sharing solution? On-premise, File System-integrated Solutions In the attempt to create greater mobile productivity, all the services and solutions described thus far put organizations at greater risk, create more management complexity, fail to meet users needs or create a combination of all these problems. The best way to avoid these mobile file access and sharing gotchas is to leverage a solution that simply allows organizations to use the files and file systems they already have. Leverage Existing Files, File Systems, Processes and Controls Whether in the cloud or on-premise, users don t need yet another set of files or another repository for accessing data on the move. They just need to be able to access and share their existing files from where they re already stored. And IT doesn t need or want another file system to manage, let alone have to use completely new tools to manage it. They just need to mobilize their existing file systems in a way that utilizes the security infrastructure, file access controls and data management processes in which they ve already invested. Collaborative Sharing and More Even with an on-premise, file system-integrated offering, you still need to verify that it delivers all the functionality your users need. In addition to intuitive mobile file access, does it leverage your own security infrastructure? Do the controls for file sharing and mobile downloads provide the granularity needed to comply with your enterprise standards and policies? Does the solution enable mobile users to easily and quickly search across all their authorized file shares to find the content they need? Does it offer inherent collaborative capabilities for shared files, or do users still have to resort to email or other forms of communication to provide context for the files they ve shared? Only Novell Filr delivers on all those counts, giving you the on-premise, complete file system integration you need and the mobile file access and collaborative sharing your users demand. Mobile File Access and Sharing IT Can Embrace Novell Filr gives users easy, anywhere, any device access to corporate files, while keeping the process completely under IT control. It delivers the mobile file access and collaborative file sharing users want, but through an enterprise-ready design that leverages your existing infra structure and established controls. It eliminates the need to manage third-party services or create and manage hybrid file stores by allowing you to use your existing file servers, existing files and existing file system rights. Whether in the cloud or on-premise, other mobile file access vendors make plenty of promises, but they can t stack up to the properly balanced approach of Novell Filr, which delivers all of the following: 4

Use of and adherence to established user access controls and quotas, so the same group and user access rights that govern your organization s home and network folders also govern mobile access Seamless integration with users existing folders, including home directories and network shares, giving users secure mobile access to all of their enterprise content on day one Utilization of users real credentials for file access, ensuring authorized access and audit trail support Managed connections between existing file servers and your endpoints, including Windows, Mac, ios, Android and BlackBerry devices, as well as standard web browsers Non-intrusive and easy-to-install virtual machine with no need to deploy server agents, extend your schema, or invest in new data center hardware Support for multiple identity stores, including Microsoft Active Directory and NetIQ edirectory Native file system integration with Microsoft Windows Server and Novell Open Enterprise Server (CIFS and NCP) No file migration or duplication since files remain on existing enterprise file servers Easy-to-use, follow-me file synchronization Granular control over mobile file downloads Granular control over file sharing, including the ability to determine which files and folders users can share either internally or externally Keep IT in Control and Mobile Users Happy Unlike other mobile file access and collaborative file sharing solutions, Novell Filr has been designed with both the enterprise and the user in mind, resulting in less administration, better security and happier employees. It allows you to leverage your established security and data protection measures, while empowering users to enjoy the easy, anywhere, any device file access they demand. The bottom line is that users get what they want, while you stay in control of your organization s filebased intellectual property. To learn more about how your users can enjoy the productivity gains and time savings of mobile file access and collaborative sharing without compromising enterprise goals, visit www.novell.com/filr or contact Novell at 888 321 4272. www.novell.com 5

Contact your local Novell Solutions Provider, or call Novell at: 1 800 714 3400 U.S./Canada 1 801 861 1349 Worldwide Novell, Inc. 1800 South Novell Place Provo, UT 84606 USA www.novell.com 462-002191-003 04/13 2013 Novell, Inc. All rights reserved. NetIQ is a registered trademark and edirectory is a trademark of NetIQ Corporation in the United States and other countries. Novell and the Novell logo are registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.