Consumerization Is Revolutionizing “File Sync And Share” Services

The highly regulated asset management industry

The Bring Your Own Device (BYOD) movement has gained significant popularity in the corporate world and is rapidly changing how enterprises share information. Consumerization of devices in asset management – the migration of features, feel and functionality of mainstream consumer products to specialist financial services firms – is changing this industry as well. CIOs and CTOs are realizing the need to bulletproof their consumer-grade services with industrial-strength file sync and share services in order to provide secure, easy access to data and documents, anywhere, from any device.

While the BYOD model encourages innovative thinking, reduces costs and drives employee satisfaction, it also increases IT/risk considerations. According to a June 2013 study by Ponemon Institute, the greatest potential risks to regulated data within organizations are mobile devices. Employees are now storing ever-larger amounts of data on unregulated consumer devices as tablets and mobile devices increasingly replace computers.

In a Gravitas poll conducted during this past summer, 58% of CTOs and COOs said they consider information leakage, storage, regulatory compliance and control of information flow to be major concerns. The same poll revealed that 80% of the companies surveyed allow employees to use their own devices for work. This leads to major online storage security considerations which include network availability, device security, data durability, privacy and confidentiality, control and compliance.

A range of products have emerged in an attempt to address this need.  However, the proliferation of file sync and share services has complicated the selection process. Among the key questions firms need to ask file synch and share Service Providers are:

  1. How will the file sync and share platform integrate with my organization’s current directory?
  2. What is your data encryption philosophy and how specifically is the data encrypted?
  3. How do you manage the encryption keys?
  4. Can files be stored on-premise, in the cloud or both?
  5. How much control of the data do I have?
  6. What is your policy on new passwords and leveraging existing passwords?
  7. What are the savings in costs over time?
  8. Will file and data protection scale as workloads continue to evolve?

The next step is to consider your organization’s work style. Employees will only take advantage of the full functionality of a file sync and share service if it matches their current work environment. It is also important to implement a pilot and testing stage, so that changes can be made depending on feedback. In a world where mobile technology is ubiquitous, identifying a file sync and share service that is robust, secure and scalable is essential.

By Patrick Mullevey,

Patrick is Executive Director of Systems Integration at Gravitas, a leading co-sourcing™ platform providing cloud technology and collaborative outsourcing for investment support and middle office services to the alternative investment industry. Gravitas recently launched Gravitas Atmosphere™, a secure private cloud-based online file sharing and storage service for file and sync collaboration in partnership with EMC Syncplicity and EMC Atmos.

Cloudways

Episode 1: Why Small and Medium Sized Businesses Need an MSP

Small and Medium Sized Businesses Need an MSP Small and medium-sized businesses don’t enjoy the benefits of a large IT department. What should they consider when it comes to handing over their data to a ...
Anita Raj

A Winning Data Strategy Series Part 3: From Data-driven To An Insight-driven Organization

Insight-driven Organization This is the third piece of a 5-part series on plugging the obvious but overlooked gaps in achieving digital success through a refined data strategy. Data is essential, yes. But the whole idea ...
Dan Saks 1

How to Transform to Succeed in the Digital Economy

Succeed in the Digital Economy In today’s increasingly competitive business climate, companies must put digital technologies at the core of their operations. In order to avoid the same fate as companies like Sears or Yellow ...
Signal Messenger: How to Successfully Resist Wiretapping Attempts

Signal Messenger: How to Successfully Resist Wiretapping Attempts

Successfully Resist Wiretapping Attempts Against the backdrop of events in the US, the popularity of the Signal secure messenger has grown sharply - from 6,000 to 26,000 downloads per day. This software uses strong cryptography ...
Kip Compton

What’s Ahead for Cloud

The Cloud 2018 was an incredible time for cloud. Its impact on customer experiences, business processes and models, and workforce innovations was undeniable. We saw more and more use cases where customers started leveraging multiple ...
12 Cybersecurity CEOs On What Each Learned Leading During The Pandemic

12 Cybersecurity CEOs On What Each Learned Leading During The Pandemic

Cybersecurity CEOs’ lessons learned from navigating the pandemic provide a valuable framework for leading and growing a business through anxious, uncertain times. How each cybersecurity CEO responds to the challenges of keeping employees safe, customers ...