Consumerization Is Revolutionizing “File Sync And Share” Services

Consumerization Is Revolutionizing “File Sync And Share” Services

Consumerization is revolutionizing “file sync and share” services for the highly regulated asset management industry.

The Bring Your Own Device (BYOD) movement has gained significant popularity in the corporate world and is rapidly changing how enterprises share information. Consumerization of devices in asset management – the migration of features, feel and functionality of mainstream consumer products to specialist financial services firms – is changing this industry as well. CIOs and CTOs are realizing the need to bulletproof their consumer-grade services with industrial-strength file sync and share services in order to provide secure, easy access to data and documents, anywhere, from any device.

While the BYOD model encourages innovative thinking, reduces costs and drives employee satisfaction, it also increases IT/risk considerations. According to a June 2013 study by Ponemon Institute, the greatest potential risks to regulated data within organizations are mobile devices. Employees are now storing ever-larger amounts of data on unregulated consumer devices as tablets and mobile devices increasingly replace computers.

In a Gravitas poll conducted during this past summer, 58% of CTOs and COOs said they consider information leakage, storage, regulatory compliance and control of information flow to be major concerns. The same poll revealed that 80% of the companies surveyed allow employees to use their own devices for work. This leads to major online storage security considerations which include network availability, device security, data durability, privacy and confidentiality, control and compliance.

A range of products have emerged in an attempt to address this need.  However, the proliferation of file sync and share services has complicated the selection process. Among the key questions firms need to ask file synch and share service providers are:

  1. How will the file sync and share platform integrate with my organization’s current directory?
  2. What is your data encryption philosophy and how specifically is the data encrypted?
  3. How do you manage the encryption keys?
  4. Can files be stored on-premise, in the cloud or both?
  5. How much control of the data do I have?
  6. What is your policy on new passwords and leveraging existing passwords?
  7. What are the savings in costs over time?
  8. Will file and data protection scale as workloads continue to evolve?

The next step is to consider your organization’s work style. Employees will only take advantage of the full functionality of a file sync and share service if it matches their current work environment. It is also important to implement a pilot and testing stage, so that changes can be made depending on feedback. In a world where mobile technology is ubiquitous, identifying a file sync and share service that is robust, secure and scalable is essential.

patrick-mulleveyBy Partick Mullevey,

Patrick is Executive Director of Systems Integration at Gravitas, a leading co-sourcing™ platform providing cloud technology and collaborative outsourcing for investment support and middle office services to the alternative investment industry. Gravitas recently launched Gravitas Atmosphere™, a secure private cloud-based online file sharing and storage service for file and sync collaboration in partnership with EMC Syncplicity and EMC Atmos.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

2 Responses to Consumerization Is Revolutionizing “File Sync And Share” Services

  1. The
    selection criteria outlined Partick Mullevey is right on the mark.  At Accellion, we have been providing
    enterprise organizations and government agencies answers to those very
    questions.   In fact, Accellion was rated a Strong Positive in the
    Gartner Marketscope for Enterprise File
    Synchronization and Sharing. The
    solution integrates with an organization’s LDAP/AD,  files can stored in a
    private or public cloud, customers manage encryption keys,and using a strong Admin Interface,IT can manage password policies.  http://accellion.com

  2. Patrick, excellent article. File Sync n Share continues to be the top reason customers turn to our solution. Luckily they don’t have to think about all the 8 points you have outlined. We allow files to stay where they are.. if it is the intranet that is fine, we will securely make it available when the user needs it on the device of their choice with dynamic watermarking, full audit and 100% data loss prevention. In addition to secure viewing Armor5 solution also supports 100% cloud based editing of all msft apps without requiring a local app on the device! try it out today..

Comic
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Rounding Out Your Security Strategy With The Enterprise Cloud

Rounding Out Your Security Strategy With The Enterprise Cloud

Enterprise Cloud Security Strategy No company wants to be the one to have to announce one of the world’s biggest data breaches. From managing networks and datacenters to protecting hundreds of applications, today’s enterprises face enormous challenges. With all the surface area that needs to be tracked and protected including APIs on the front-end, customer integrations…

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps Whether it be enterprise apps or any other, if there is any heavy data that is going to be transacted in and through an app, then affiliating it with the Cloud becomes a must. And then an important question arises: How do you decide when to integrate your enterprise app with…

Who’s Who In The Booming World Of Data Science

Who’s Who In The Booming World Of Data Science

The World of Data Science The nature of work and business in today’s super-connected world means that every second of every day, the world produces an astonishing amount of data. Consider some of these statistics; every minute, Facebook users share nearly 2.5 million pieces of content, YouTube users upload over 72 hours of content, Apple…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

Fintech Investments Are Seeing Consistent Growth

Fintech Investments Are Seeing Consistent Growth

The Financial Services Cloud Fintech investment has been seeing consistent growth in 2015, with some large moves being made this year. The infographic (Courtesy of Venturescanner) below shows the top Fintech investors and the amount of companies they’re currently funding: Just this week, a financial data startup known as Orchard Platform raised $30 million in…

Business Analytics Vs Data Science

Business Analytics Vs Data Science

Big Data Continues To Grow Big Data continues to be a much discussed topic of interest and for good reason.  According to a recent report from International Data Corporation (IDC), “worldwide revenues for big data and business analytics will grow from nearly $122 billion in 2015 to more than $187 billion in 2019, an increase…