Consumerization Is Revolutionizing “File Sync And Share” Services

Consumerization Is Revolutionizing “File Sync And Share” Services

Consumerization is revolutionizing “file sync and share” services for the highly regulated asset management industry.

The Bring Your Own Device (BYOD) movement has gained significant popularity in the corporate world and is rapidly changing how enterprises share information. Consumerization of devices in asset management – the migration of features, feel and functionality of mainstream consumer products to specialist financial services firms – is changing this industry as well. CIOs and CTOs are realizing the need to bulletproof their consumer-grade services with industrial-strength file sync and share services in order to provide secure, easy access to data and documents, anywhere, from any device.

While the BYOD model encourages innovative thinking, reduces costs and drives employee satisfaction, it also increases IT/risk considerations. According to a June 2013 study by Ponemon Institute, the greatest potential risks to regulated data within organizations are mobile devices. Employees are now storing ever-larger amounts of data on unregulated consumer devices as tablets and mobile devices increasingly replace computers.

In a Gravitas poll conducted during this past summer, 58% of CTOs and COOs said they consider information leakage, storage, regulatory compliance and control of information flow to be major concerns. The same poll revealed that 80% of the companies surveyed allow employees to use their own devices for work. This leads to major online storage security considerations which include network availability, device security, data durability, privacy and confidentiality, control and compliance.

A range of products have emerged in an attempt to address this need.  However, the proliferation of file sync and share services has complicated the selection process. Among the key questions firms need to ask file synch and share service providers are:

  1. How will the file sync and share platform integrate with my organization’s current directory?
  2. What is your data encryption philosophy and how specifically is the data encrypted?
  3. How do you manage the encryption keys?
  4. Can files be stored on-premise, in the cloud or both?
  5. How much control of the data do I have?
  6. What is your policy on new passwords and leveraging existing passwords?
  7. What are the savings in costs over time?
  8. Will file and data protection scale as workloads continue to evolve?

The next step is to consider your organization’s work style. Employees will only take advantage of the full functionality of a file sync and share service if it matches their current work environment. It is also important to implement a pilot and testing stage, so that changes can be made depending on feedback. In a world where mobile technology is ubiquitous, identifying a file sync and share service that is robust, secure and scalable is essential.

patrick-mulleveyBy Partick Mullevey,

Patrick is Executive Director of Systems Integration at Gravitas, a leading co-sourcing™ platform providing cloud technology and collaborative outsourcing for investment support and middle office services to the alternative investment industry. Gravitas recently launched Gravitas Atmosphere™, a secure private cloud-based online file sharing and storage service for file and sync collaboration in partnership with EMC Syncplicity and EMC Atmos.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…