1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.

Slides:



Advertisements
Similar presentations
The System Center Family Microsoft. Mobile Device Manager 2008.
Advertisements

BalaBit Shell Control Box
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Unified Logs and Reporting for Hybrid Centralized Management
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
With the Help of the Microsoft Azure Platform, Devbridge Group Provides Powerful, Flexible, and Scalable Responsive Web Solutions MICROSOFT AZURE ISV PROFILE:
Microsoft Dynamics. Introducing Al-Futtaim Technologies  One of the region’s leading System Integrators  Strong partnerships with leading global ICT.
Robin Daniels Sr. Manager, Product Marketing Running Your Business in the Cloud.
100 % UPTIME SLAs 27 | 8 DATA CLOUD CENTERSPODS SSAE-16, SOC 2 TYPE II, PCI-DSS, HIPAA, HITECH AT101, NIST , SAFE HARBOR COMPLIANT POWER INFRASTRUCTURE.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The powerful capabilities of JBoss Middleware as cloud based services on OpenShift. Build applications. Integrate with other systems Orchestrate using.
Dell Connected Security Solutions Simplify & unify.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Protect Your Business-Critical Data in the Cloud with SoftNAS, a Full-Featured, Highly Available Solution for the Agile Microsoft Azure Platform MICROSOFT.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
The Changing World of Endpoint Protection
IBM Mobile Security solutions 1IBM and Business Partner Sellers Only Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Identity Assurance Emory University Security Conference March 26, 2008.
© Intapp, Inc. 1 Cloud Strategies for Law Firms: Enabling Lawyer Productivity, Maintaining Firm Control.
Building a Fully Trusted Authentication Environment
Power LogOn® Adds Card-Based, Multi- Factor Authentication to Microsoft Azure Logon, Plus Password Management for All Other Logons MICROSOFT AZURE ISV.
+ Logentries Is a Real-Time Log Analytics Service for Aggregating, Analyzing, and Alerting on Log Data from Microsoft Azure Apps and Systems MICROSOFT.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Microsoft Azure and DataStax: Start Anywhere and Scale to Any Size in the Cloud, On- Premises, or Both with a Leading Distributed Database MICROSOFT AZURE.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Citrix ShareFile. Instant file access from any device Sharing and collaboration—with anyone Easy & Familiar (love Dropbox) USERS DEMAND Security Control.
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
Accelerate Mobile App Delivery with Kinvey on vCloud Air.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Blue Coat Cloud Continuum
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
OFFICE 365 APP BUILDER PROFILE: Druva
Do you know who your employees are sharing their credentials with
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Hybrid Management and Security
Journey to Microsoft Secure Cloud
Partner Logo Veropath Offers a Next-Gen Expense Management SaaS Technology Solution, Built Specifically to Harness Big Data Analytics Capabilities in Azure.
Azure Information Protection Strategy and Roadmap
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Virtualization & Security real solutions
The Microsoft 365 Powered Device
Accelerate your compliance journey Key customer concerns Product value
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
Auth0 Is Identity Made Simple for Developers, Built by Developers and Supported by the High Availability and Performance of Microsoft Azure MICROSOFT AZURE.
Azure Availability, Reliability, and Performance
Data Security for Microsoft Azure
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
AIMS for BizTalk, Built on the Microsoft Azure Platform, Empowers Enterprises to Automate Insight and Analytics and Boost Value Creation MICROSOFT AZURE.
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Contract Management Software from ContraxAware Simplify Your Contract Management Process.
Presentation transcript:

1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel

2 2 Definition of Accountability In the context of corporate data governance: “Accountability is the obligation to act as a responsible steward of the personal information of others, to take responsibility for the protection and appropriate use of that information beyond mere legal requirements, and to be accountable for any misuse of that information.” (Galway Project)

3 3 We’re focused on serving the complex needs of enterprises of all sizes. Box is a leader in the enterprise content collaboration space.

4 4 Box Architecture Design Principles Secure: Control, visibility and integration Enterprise-grade: Scale, reliability and speed Sustainable: Rapid innovation, quality and simplicity User Focus: Elegant and user-friendly

5 5 Users IT Superior Solution for Users and IT

6 6 Box Investment in the Enterprise * Upcoming 2007– – – employees 1K+ employees 10K+ employees 100K+ employees Admin Console Identity Integration Full-text Search Activity Reporting Admin Files Trusted Access Advanced Reports Box Accelerator Two-Factor Login Device Pinning Collaboration Controls Content Policies * Metadata Content Workflow eDiscovery *

7 7 Intelligence (visibility, monitor, report, search – all across the platform) Users (identity mgmt.; who has access to what content?) Devices (secure physical and virtual endpoints) Apps (secure physical and virtual endpoints) Content Redefining Cloud Content Security

8 8 End to End Security User and group controls Powerful Admin control tools Reporting API Advanced search BI platform integrations Alerting and notifications Audit trail logging Hardened datacenters Active threat detection 24x7x365 NOC monitoring Most secure cloud platform Broad compliance footprint Stringent vendor/supplier security requirements SecurityAdminsPlatform 256-bit AES encryption FIPS Module (NIST std.) SSAE16 Type II datacenters SSO, AD, and authentication Deep sharing permissions ISO vendor/supplier baseline

9 9 Users: Centralize Identity and Access Permissions and Smart Links Identity Management: AD, SSO and 2FA Trusted Access Management

10 Native Two-step Auth Expanding choice for all For admins: –Require for all users –Or, permit opt in For end users: –Opt-in for their account –Secures web, mobile, partner apps Broad SSO partnerships Users: Access Control Choices

11 Advanced search By user, content type, date, size and context Quick, powerful targeted queries Reporting, Audit, & SIEM Full audit trail logging Fast reporting BI and real-time alerts Strong partnerships Intelligence: Monitor, Search, Audit

12 Comprehensive, global compliance program SSAE16 Type II, SOC1 and SOC2 Fully tested and verified by 3 rd party Safe Harbor, EU and Swiss International data privacy controls and enforcement HIPAA and HITECH Trusted platform for PHI, PHRs and medical research ISO Global information security and systems controls

13 Don’t forget: Disaster Recovery and Business Continuity Planning Disaster Recovery (DR) – Technology and plans to get the Site “back up and running” with minimum disruption to customers Business Continuity Plan (BCP) – Box has a roadmap plan for continuing operations under adverse conditions such as a regional catastrophe or criminal attack.