Consumerization Is Revolutionizing “File Sync And Share” Services

Consumerization Is Revolutionizing “File Sync And Share” Services

Consumerization is revolutionizing “file sync and share” services for the highly regulated asset management industry.

The Bring Your Own Device (BYOD) movement has gained significant popularity in the corporate world and is rapidly changing how enterprises share information. Consumerization of devices in asset management – the migration of features, feel and functionality of mainstream consumer products to specialist financial services firms – is changing this industry as well. CIOs and CTOs are realizing the need to bulletproof their consumer-grade services with industrial-strength file sync and share services in order to provide secure, easy access to data and documents, anywhere, from any device.

While the BYOD model encourages innovative thinking, reduces costs and drives employee satisfaction, it also increases IT/risk considerations. According to a June 2013 study by Ponemon Institute, the greatest potential risks to regulated data within organizations are mobile devices. Employees are now storing ever-larger amounts of data on unregulated consumer devices as tablets and mobile devices increasingly replace computers.

In a Gravitas poll conducted during this past summer, 58% of CTOs and COOs said they consider information leakage, storage, regulatory compliance and control of information flow to be major concerns. The same poll revealed that 80% of the companies surveyed allow employees to use their own devices for work. This leads to major online storage security considerations which include network availability, device security, data durability, privacy and confidentiality, control and compliance.

A range of products have emerged in an attempt to address this need.  However, the proliferation of file sync and share services has complicated the selection process. Among the key questions firms need to ask file synch and share service providers are:

  1. How will the file sync and share platform integrate with my organization’s current directory?
  2. What is your data encryption philosophy and how specifically is the data encrypted?
  3. How do you manage the encryption keys?
  4. Can files be stored on-premise, in the cloud or both?
  5. How much control of the data do I have?
  6. What is your policy on new passwords and leveraging existing passwords?
  7. What are the savings in costs over time?
  8. Will file and data protection scale as workloads continue to evolve?

The next step is to consider your organization’s work style. Employees will only take advantage of the full functionality of a file sync and share service if it matches their current work environment. It is also important to implement a pilot and testing stage, so that changes can be made depending on feedback. In a world where mobile technology is ubiquitous, identifying a file sync and share service that is robust, secure and scalable is essential.

patrick-mulleveyBy Partick Mullevey,

Patrick is Executive Director of Systems Integration at Gravitas, a leading co-sourcing™ platform providing cloud technology and collaborative outsourcing for investment support and middle office services to the alternative investment industry. Gravitas recently launched Gravitas Atmosphere™, a secure private cloud-based online file sharing and storage service for file and sync collaboration in partnership with EMC Syncplicity and EMC Atmos.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

2 Responses to Consumerization Is Revolutionizing “File Sync And Share” Services

  1. The
    selection criteria outlined Partick Mullevey is right on the mark.  At Accellion, we have been providing
    enterprise organizations and government agencies answers to those very
    questions.   In fact, Accellion was rated a Strong Positive in the
    Gartner Marketscope for Enterprise File
    Synchronization and Sharing. The
    solution integrates with an organization’s LDAP/AD,  files can stored in a
    private or public cloud, customers manage encryption keys,and using a strong Admin Interface,IT can manage password policies.  http://accellion.com

  2. Patrick, excellent article. File Sync n Share continues to be the top reason customers turn to our solution. Luckily they don’t have to think about all the 8 points you have outlined. We allow files to stay where they are.. if it is the intranet that is fine, we will securely make it available when the user needs it on the device of their choice with dynamic watermarking, full audit and 100% data loss prevention. In addition to secure viewing Armor5 solution also supports 100% cloud based editing of all msft apps without requiring a local app on the device! try it out today..

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

E-Commerce Advances For Savvy Marketers

E-Commerce Advances For Savvy Marketers

Digital Marketing Platforms Advertising and marketing techniques have progressed rapidly in the last decade with both channel focus and the direction of content shifting considerably due primarily to advances in cloud technology. Gartner’s Magic Quadrant for Digital Commerce 2016 singles out a few ecommerce providers who are topping their sector in both ability to execute…

The Lighter Side Of The Cloud – Energy Battle

The Lighter Side Of The Cloud – Energy Battle

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via@cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities for tech jobs and startup companies in the industry. ZipRecruiter, an online recruitment and job…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the Internet and PC.…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at least one cloud-based application.…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

Cloud Infographic – Big Data Analytics Trends

Cloud Infographic – Big Data Analytics Trends

Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…