Are your employees gambling with the public cloud ?

A recent article on ComputerWorld by Yorgen Edholm highlighted the growing issue that is affecting companies whereby employees “bring their own cloud” to work ie. they use their private personal accounts to interact with people at work using corporate data.

Yorgen does a good job at highlighting why this is an issue:

“How would you feel if a competitor picked up your product specs? An investor got a copy of your quarterly financials before earnings?”

“Every IT team knows that busy employees don’t always clean up after themselves.”

“From my perspective, the public cloud is not the problem but rather the unsupervised use of the public cloud by employees that make the public cloud problematic for storing and sharing files.”

As Yorgen rightly points out:

“In the end it comes down to control. How much control do you need over your data, who has access and where is information being stored?”

The issue is one of control. The problem that most companies have in the first instance that they have no policy with regards to use of private or public clouds and no way to enforce it. Almost all of the Enterprise File Share and Sync Solutions that exist today suffer from a lack of control. This lack of such controls is highlighted by recent research by the Osterman Research Group.

The way Storage Made Easy handles this is:

– Companies can continue to allow employees to use private or personal clouds.There is a governance option regarding this in which administrators of the SME system can grant employees the ability to add personal clouds.

– Once added any meta information can be audited. This is information such as a file title, date, if the file was shared etc. This works if the file is used from the SME system or if the file is sent direct from a Cloud Provider, such as DropBox. Alerts can be set to inform an Administrator for a certain file and event.

This helps to have visibility of data used with private employee clouds and provides some reactive control but it does not solve companies having pro-active control of their data and not just private consumer cloud data but all data that can be shared from within a company.

To aid with proactive management of data SME provides governance controls across all data cloud that are mapped to the SME service and Apps and App Integrations to enable companies to mandate or promote the use of these within their company. An example of this is Microsoft Outlook in which the SME PlugIn enables files to be shared across all public / private but promotes the use of secure file sharing with password and expiry options (and which is inclusive of auditing).

The auditing feature enables a complete file event history of any corporate file store that can be exposed as a .csv or excel, or that can be simply checked online through the service. As well as auditing the events,remote access to the file is also monitored and IP addresses logged.

Another aspect of control is security and where the cloud is being used particularly the security of files being stored remotely and the trust that you put in the remote provider to protect unauthorized access to data. As Yorgen pointed out in his original article:

“Take the recent NSA PRISM situation as an example. Users were not aware that their service providers were cooperating with the NSA to gather personal information from the public cloud – putting the spotlight on how little control organizations have over government access to their hosted data. While use of IT managed storage doesn’t mean that the government can’t demand access to data, it does mean that your organization would know what data they were gathering, rather than reading about it in the newspapers later.”

The SME system puts the security control back in the hand of companies by enabling companies to securely encrypt data using a private key that is stored on a remote cloud service that can be done on a per file basis or for all files.

Yurgen ends his article by quoting a source:

“One CIO friend told me that, for her, using a public cloud means losing peace of mind.”

Storage Made Easy aim is to provide an agnostic cloud data control solution that gives company this peace of mind.

Facebooktwitterredditpinterestlinkedinmailby feather

The Top 5 things to Consider for Business File Sharing

20130309-165632.jpgFile Sharing is a key part of a companies ability to collaborate and share corporate data, which increasingly can be stored in many disparate services. The purpose of this post is to offer suggestion businesses should consider for their corporate file sharing strategy:

Many business just let employees share files with no control and no checks. This needs a policy. This is the businesses core asset and it needs to be protected and secure. Also, compliance and legislation of data is increasingly becoming important. The business needs to ensure it does not get caught in a compliance trap.

Point 1: Implement a control mechanism for your users. For example Storage Made Easy enables users to share files using links that can be password protected and in which the link can be set to expire. This protects against the user forwarding file. The file link can be set to expire on first download for example or set to download after 24 hours (or any other specified time period). If the file is password protected, even if the file is forwarded by the recipient then the file cannot be accessed unless the password is provided. A control mechanism promotes best practice security management of files and reduces operational risk.

Point 2: Point Solution or not ? Consider whether your strategy should be a point solution or whether it works with your existing data sets. Many vendors may purport to promote managed secure file sharing but often you find you have to move your data to their Cloud to have the solution work for you. Storage Made Easy works with private on-premise data, public cloud data such as DropBox, SkyDrive, Box etc and also with SaaS services such as BaseCamp. This promotes a ‘joined up’ strategy for company file sharing.

Point 3: Integrates with what you have ? Consider whether the solution works how you work so that it does not get in the way of business or productivity. For example Storage Made Easy integrates directly in the desktop as a network drive with simple right click options to share files. This behaviour supports Windows, Mac and Linux.  Also integration has been done with other core business productivity tools such as Microsoft Outlook and Mac Mail to promote easy secure file sharing using links directly from the corporate mail client. Similar integrations exists for core productivity tools such as Microsoft Office and Open Office or Libre Office.

Point 4: Compliance, Compliance Compliance – Compliance is fast catching up with all verticals when it comes to storing and accessing corporate files off site. There is specific industry legislation related to this, such as HIPPA in healthcare and FERPA in education, but  there are various legislation proposals being processed at various levels in the USA and EU and it is a safe bet that  the ability to track historic file events will become more of a requirement not less of a one. Also for companies, the ability to search against historic file sharing or data access should be just part of an overall joined up corporate security policy.

Point 5: On-Premise, Hybrid or Cloud ? The last point is to do with implementation. You should be able to decide how you manage data or metadata associated with storing files and sharing files. This can be behind the corporate firewall, totally on Cloud., or some combination of both. The key word here is choice.

Facebooktwitterredditpinterestlinkedinmailby feather

Outlook email file sharing InfoGraphic

We recently did a survey with regards to Outlook file sharing. You can find out more about this and the results of our survey in the press release.

We also created two distinct InfoGraphics to enable us to disseminate the information visually. You can see these below:

You can view the graphic on Pinterest here and also obtain an embed code from there.

Another take on the same information is the concept of file shares multiplying like rabbits when shared in an unsecured way:

You can find the original graphic on Pinterest here form which you can also get an embed code.

Facebooktwitterredditpinterestlinkedinmailby feather

10 things to consider when implementing a company BYOD / MDM Strategy

More and more companies are embracing Bring Your Own Device (BYOD) as part of a Mobile Device Management Strategy (MDM) primarily as a means to save money. The cost savings can be potentially huge but what steps should you consider with regards to implementing an MDM / BYOD Policy ?

We highlight 10 things you should think about below:

1. Do a cost benefit analysis of current company owned devices. Remember to include insurance and accessories. Work out your real savings.

2. Bring Your Own Device does not mean you have to embrace every device ! Set some guidelines. Perhaps you want to limit it to iOS and BlackBerry or iOS and Android or indeed maybe you wish to embrace the top 4. Embracing MDM / BYOD does not mean anarchy rules, set a policy.  Storage Made Easy Cloud Appliance supports MDM/BYOD for BlackBerry, Android, iOS and Windows Phone.

3. As part of your move to an effective MDM /BYOD policy, understand how your employees prefer to work. Are many of your employees mobile ? Field agents ? Sales Reps ? On the move ? Is most of their work conducted in this manner ?

4. Are all your data points accessible over mobile devices ? Are they joined up ?  Is application access supported across all devices ?  Part of what the Storage Made Easy Cloud Appliance does is to unify data sources so they are accessible from one application on a mobile device. This can support data services that perhaps don’t even have access from the chosen mobile device. It also makes it easier to work with data from a single dashboard rather than having to install ‘n’ number of Apps.

5.  Have a secure file sharing policy.  You do not want employees using their devices and sharing data that cannot be audited. Not only does this promote data leak, but for regulated industries it can break compliance laws. The Storage Made Easy Cloud Appliance promotes easy data sharing but it keeps audit logs of all links shared, from the person who shared them to the remote IP address that downloaded the data. It also enables password protections and time expiry on links.

6. Ensure you have control of user access into corporate data. You may not own the user device but you still want to have some measures of protections about how users get access to corporate applications and corporate data. You need to be able to turn access off without compromising the users device. Storage Made Easy addresses this by unifying data access and letting administrators  control access for any user either by device, IP Address or GEO Location.

7.  As part of your MDM User policy mandate  Apps  that promote security, such as anti-virus / malware Apps and App such as Divide which promote the creation of separate identities and user areas for business and personal data. Don’t be shy in having a strict policy. Even though you are implementing an MDM/ BYOD policy you may still need a small selection of devices for users that will not or cannot sign up to the policy.

8. Decide whether you are going to have ‘device wipe’ as part of your policy. This is one of the most contentious areas of MDM /BYOD and if you implement it you will need to include it as part of your policy that users sign up to and ensure they understand the consequences. Note that all devices enable remote wipe. For more information on this please see the ‘remote wipe’ section on the   SME Wiki.

9. Consider your policy for un-authorised Apps being used with corporate data. We have all heard of how DropBox has infiltrated enterprise IT by the back-door and is actually in use in department within companies but without official sanction by IT. Storage Made Easy handles this by enabling DropBox (or other un-sanctioned cloud storage uses) to be audited just as other corporate data, even if the user uses the DropBox service direct.

10. Policy is key. Staff need to fully understand and sign up to the MDM policy being introduced. It should be easy to understand, and easy for the staff to get access to the resources that they need from their Apps. On the company side understandin costs savings, investment needed, and security implications is key. Implementing an MDM / BYOD policy may look attractive but  it requires thought and planning to be successful.

Want to know more on controlling cloud sprawl ? Read our whitepaper.

For more on BYOD, visit the BYOD section on our Wiki.

Facebooktwitterredditpinterestlinkedinmailby feather

Web File Manager Updates: Shared file link management improved

We have today updated the way in which shared links are managed for all Cloud Files mapped to an account from the web Cloud File Manager. It is now possible to have multiple links for a single file and to easily manage them. These file share links can be either a direct private share, a time expired share or a secure share. Please see the below video for a detailed overview.

Facebooktwitterredditpinterestlinkedinmailby feather