ChalkTalk Video: File Sharing and Collaboration – What You Need to Know
Back by popular demand, this ChalkTalk video by Ankur Shah, Sr. Director of Products, covers “What you need to know about file sharing and collaboration”. Watch this 3 minute video to learn:
- What classes of applications must enterprises look to protect?
- Why is it important to protect these applications (with real enterprise customer use cases explained)?
- How best to protect these applications
Hello, everyone. My name is Ankur Shah. I’m Head of Products at CipherCloud. In today’s ChalkTalk, we’re going to talk about three things… We’re going to talk about what classes of applications you must protect in an enterprise. We’re going to talk about why it’s important to protect those applications. And I’ll have real world enterprise use cases that we’ve seen over the years. And finally, we’ll talk about how best to protect them.
So let’s get into what type of applications you must protect. As we talk to a lot of large enterprises, typically they have different ranges of application that start from CRM, file storage and collaboration, IT service management, HR and the list goes on. As you think about these classes of application, each of them have different sets of compliance, data residency, and data protection requirements.
Now let’s talk about why it’s important to secure these cloud applications, and we’ll talk about that for some of the use cases that we have come to understand from our enterprise customers. The use cases can be divided into two big buckets, visibility and protection. In terms of visibility, customers are interested in finding out both the bad actors as well as the data. They want to understand what the users are doing when they’re accessing the cloud applications, from where, and which location and which devices.
More importantly, what they want to find out is some sort of suspicious activity that’s happening in the cloud application. In this particular example, I’ve got a user who is trying to access two sets of different cloud apps from two different locations within a span of few minutes. We call this GEO anomaly or a time travel scenario. In this particular case, it’s not possible for the user to be in two different places.
Customers are also worried about data. They want to make sure that only the right individuals have access to the correct amount of information. For example, one of our largest healthcare customers wants to make sure that only healthcare professionals have access to critical patient record. And they want that data encrypted so that nobody else can have access to it. We have yet another financial services company that have put in place ethical firewall rules so that individual groups are only allowed to collaborate among themselves, and that the data cannot leave outside of that.
We have yet another customer who are just interested in quarantining the data whenever there is suspicious activity on a data that goes through the cloud application. Net of it is that what you want is to gain a lot of visibility both in terms of the user and the data. And you want a comprehensive set of remediation steps that allows the customers to encrypt, quarantine, have advanced sharing controls to make sure that customers can act on the data, depending on the data classification.
In summary, today we learned how an enterprise must tackle different classes of applications, and how each of those applications had unique sets of security challenges. We also learned that we need to gain both visibility and have proper data protection in place to secure these cloud applications. In subsequent sessions, we’ll talk about how best to protect those applications and talk about some of the architectural trade-offs.
Thank you for watching.