ILTA Webinar: Secure Yet Pain Free Mobile Access to Confidential Documents and Collaboration Tools 3...

Preview:

Citation preview

ILTA Webinar: Secure Yet Pain Free Mobile Access to Confidential Documents and Collaboration Tools3 October 2013

Seth Hallem, Co-Founder and CEO, Mobile Helix

Matt Bancroft, Co-Founder, President and COO, Mobile Helix

2

Presenters

Matt BancroftMobile Helix co-founder, COO and President

Expert in the mobile data market and mobile data technologies.

matt@mobilehelix.com

Seth HallemMobile Helix CEO and co-founder

Subject matter expert in software development, testing and security.

seth@mobilehelix.com

3

A Case Study24 hours in the life of a busy legal team…

4©MOBILE HELIX INC. PROPRIETARY AND CONFIDENTIAL. ALL RIGHTS RESERVED. PATENT PENDING..

The Players…The Client

Acme Inc.

• Large multi-national corporation

• Listed on NYSE• 300,000 employees• 50 countries• $100 B in revenue• $300 B market cap

The Legal Team

International Prestigious Law, LLC

• Litigation• Corporate Attorneys• Finance and Banking• Intellectual Property

The Outsourcing Partner

International Outsourcing Inc.

• Based in China• HQ in Hong Kong

5

At Home

Must review critical confidential Acme Inc. deal documents on flight

Day trip; taking only tablet

Forwards docs to personal Gmail account

Saves docs to personal cloud storage to access from tablet

10:00 PMNew York, NY

6

FOLLOWING THE DOCUMENTS

• Personal Gmail account

• Personal Cloud Storage account

• Personal tablet

10:00 PM

SOURCES OF FRUSTRATION

• Cannot access files directly from tablet

• Worried files will get out of date

New York, NY

7

At JFK Airport

Reviews deal points with team verbally

Team cannot forward revised documents to Partner’s tablet

Will review old documents and call with comments

7:30 AMJFK Airport, NY

8

7:30 AMJFK Airport, NY FOLLOWING THE DOCUMENTS

• Personal Gmail account

• Personal Cloud Storage account

• Personal tablet

SOURCES OF FRUSTRATION

• Cannot access files directly from tablet

• Worried files will get out of date

• Cannot access latest documents

9

On Flight to Chicago

Reviews contract documents on tablet

Notices important point of Chinese law

Needs to contact Hong Kong office

10:30 AMNY to Chicago

10

10:30 AMNY to Chicago FOLLOWING THE DOCUMENTS

• Personal Gmail account

• Personal Cloud Storage account

• Personal tablet

SOURCES OF FRUSTRATION

• Cannot access files directly from tablet

• Worried files will get out of date

• Cannot access latest documents

• Cannot access Contact Database

11

Lands in Chicago

Reviews comments verbally with team

Gets HK Partner contact details

Forwards cloud storage link to deal documents HK Partner

Calls and wakes HK Partner at home (12:00 AM in HK)

12:00 PMO’Hare Airport, Chicago

12

12:00 PMO’Hare Airport, Chicago FOLLOWING THE DOCUMENTS

• Personal Gmail account

• Personal Cloud Storage account

• Personal tablet

• Cloud storage link via personal email

SOURCES OF FRUSTRATION

• Cannot access files directly from tablet

• Worried files will get out of date

• Cannot access latest documents

• Cannot access Contact Database

• Slow document review process

• Cannot share documents with HK

13

Hong Kong Partner – At Home

Has to use daughter’s personal Android tablet

Downloads documents from cloud storage to tablet

Summarizes comments in email sent via personal account

Calls US Partner, leaves voicemail

1:00 AMHong Kong, China

14

1:00 AMHong Kong, China

FOLLOWING THE DOCUMENTS

• Personal Gmail account

• Personal Cloud Storage account

• Personal tablet

• Cloud storage link via personal email

• Personal Android tablet

• HK Partner personal email

SOURCES OF FRUSTRATION

• Cannot access files directly from tablet

• Worried files will get out of date

• Cannot access latest documents

• Cannot access Contact Database

• Slow document review process

• Cannot share documents with HK

• Painful collaboration process

• First angry call to IT…

15

An Alternate Case Study24 hours in the life of a busy legal team…

16

At Home

Must review critical confidential Acme Inc. deal documents on flight

Day trip; taking only tablet

Selects documents in Filebox app and marks for offline access

Documents update automatically overnight

10:00 PMNew York, NY

17

FOLLOWING THE DOCUMENTS

• Secure Container

10:00 PM

SOURCES OF FRUSTRATION

• The alarm clock

New York, NY

18

At JFK Airport

Reviews key deal points with the team

Syncs the documents on his tablet to the latest version

Tells team he will review documents during the flight and will send comments when he lands

7:30 AMJFK Airport, NY

19

7:30 AMJFK Airport, NY FOLLOWING THE DOCUMENTS

• Secure container

SOURCES OF FRUSTRATION

• The alarm clock

• Crowded airport

20

On Flight to Chicago

Reviews documents on tablet

Adds comments to the documents

Notices important point of Chinese law

Opens Firm contact / expertise directory app that is available offline, finds contact details for HK partner

Drafts email to the Hong Kong partner, sends secure link to the deal documents in the Firm file share

10:30 AMNY to Chicago

21

10:30 AMNY to Chicago FOLLOWING THE DOCUMENTS

• Secure container

SOURCES OF FRUSTRATION

• The alarm clock

• Crowded airport

• Airline coffee

22

Lands in Chicago

Filebox app syncs automatically and sends documents with comments to the team

Email app sends email to HK partner

Calls deal team, explains comments

Calls and wakes HK Partner at home (12:00 AM in HK)

12:00 PMO’Hare Airport, Chicago

23

12:00 PMO’Hare Airport, Chicago

FOLLOWING THE DOCUMENTS

• Secure container

• Secure email

SOURCES OF FRUSTRATION

• The alarm clock

• Crowded airport

• Airline coffee

• Chicago weather

24

Hong Kong Partner – At Home

Must use daughter’s personal Android tablet

Downloads secure container app to the tablet, logs in to Firm’s network

Opens corporate email and reads message from NY Partner

Clicks on link in secure email and opens documents

Adds comments to the documents, syncs back to the Filebox

1:00 AMHong Kong, China

25

1:00 AMHong Kong, China

FOLLOWING THE DOCUMENTS

• Secure Container

• Secure Corporate email

• Another Secure Container

SOURCES OF FRUSTRATION

• The alarm clock

• Crowded airport

• Airline coffee

• Chicago weather

• Having to thank IT…

26©MOBILE HELIX INC. PROPRIETARY AND CONFIDENTIAL. ALL RIGHTS RESERVED. PATENT PENDING..

Enabling Technologies

Three enabling technologies are critical to effective and secure work on the deal:

Comprehensive Application Access

Offline Access

Secure Container

27

Enabling Technologies:Comprehensive Application Access

• Seamless mobile access to the full suite of productivity applications from any enabled device.

• Includes custom Intranet apps, SharePoint Document Libraries and Sites, document management tools, Corporate email, and new mobile apps.

DESCRIPTION

• Secure, encapsulated container for each operating system.

• Instant access to all applications and files on the corporate intranet.

• Integration with your existing security infrastructure, including single-sign-on and role-based authorization.

• Seamless user experience, including native device gestures (touch, swipe – not right-click, double-click), and responsive performance.

• Rich, simple, and standards-based app development environment for rapid and secure development and deployment of mobile-first app.

CRITICAL CAPABILITIES

28

Enabling Technologies:Comprehensive Application Access

• Acme deal unaffected by travel schedules and events.• Lawyers able to work without avoidable stress.

CASE STUDY EVENTS

• Removes the risk of sensitive data being lost or compromised. • IT to maintains full control over access to sensitive data and documents.• One common security model for fixed and mobile access.

SECURITY IMPLICATIONS

29

Enabling Technologies:Offline Access

• Lawyers continue to work and are productive when no network connection is available.

• Offline data remains secure even if device is lost or compromised.DESCRIPTION

• Separate strong encryption for online and offline data.

• Automatic synchronization of files marked for offline storage.

• Offline access to full suite of legal applications, documents, SharePoint sites and lists, including recently viewed documents and web pages.

• IT determines data and applications accessible by each user and by device, configurable automatic expiry date for offline data.

• App-specific data synchronization API to integrate offline storage with backend data sources.

CRITICAL CAPABILITIES

30

Enabling Technologies:Comprehensive Offline Access

• Download updated deal documents for review in flight, automatic sync when connected to update document versions.

• Access internal Contacts and Expertise directory in flight.

• Review and edit documents in flight.

• Access review and respond to emails and attachments while in flight.

CASE STUDY EVENTS

• More convenient to keep documents in the container than it is to use a personal cloud storage provider.

• Access productivity tools developed by IT anywhere enabling sensitive data to stay in the container without impacting productivity.

• IT is in full control of offline access to sensitive documents and data.

• Automatically delete saved documents with configurable expiration policy.

SECURITY IMPLICATIONS

31

Enabling Technologies:Secure Container

• Secure partitioned environment on mobile device for sensitive corporate apps and data.

• Completely separate from all personal data, content, apps.DESCRIPTION

• Container functionality and security completely independent of device OS, enabling a worry-free BYOD program.

• Strong authentication to access both online and offline data.

• Provisioned and managed by IT independent of rest of device.

• Selective wipe of container without impacting remainder of device.

• All configurations, app definitions, data fully encrypted.

• Auditable trail of all interactions between the container and corporate data.

CRITICAL CAPABILITIES

32

Enabling Technologies:Secure Container

• Access to internal apps and documents on any device.CASE STUDY

EVENTS

• Protect data from security threats resident on personal devices.

• Security remains in enterprise control, not dependent on 3rd parties.

• Implement comprehensive protection for your data and your network.

SECURITY IMPLICATIONS

33©MOBILE HELIX INC. PROPRIETARY AND CONFIDENTIAL. ALL RIGHTS RESERVED. PATENT PENDING..

CONCLUSION Mobility is happening. IT has the opportunity to lead. Effective secure mobility enables attorneys to access

critical documents and applications when and where they need to.

Though an important first step, effective secure mobility is about more than email, calendar and contacts.

The three critical enabling technologies required for effective secure mobility are: Comprehensive Application Access

Comprehensive Offline Access

Secure Container

34

Thank you for joining today.

Join us for a Link Product Briefing Webinar to learn more.

Q&A

Wed, Oct 23, Register now: http://www.mobilehelix.com/introducing-link-webinar/

Recommended