securing the new digital enterprise: trackable, controlled, and authorized

29
IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING David Monahan Research Director Enterprise Management Associates (EMA) Kevin Froese VP of Global Sales Cirius

Upload: enterprise-management-associates

Post on 14-Feb-2017

41 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

IT & DATA MANAGEMENT RESEARCH,

INDUSTRY ANALYSIS & CONSULTING

David Monahan

Research Director

Enterprise Management Associates (EMA)

Kevin Froese

VP of Global Sales

Cirius

Page 2: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

IT & DATA MANAGEMENT RESEARCH,

INDUSTRY ANALYSIS & CONSULTING

Today’s Presenters

Slide 2 © 2016 Enterprise Management Associates, Inc.

David Monahan – Research Director, Risk and Security

David is a senior information security executive with several years of experience.

He has organized and managed both physical and information security

programs, including security and network operations (SOCs and NOCs) for

organizations ranging from Fortune 100 companies to local government and

small public and private companies.

Kevin Froese, VP of Global Sales

Kevin has been a leader in high-growth technology companies for over 20 years.

He is responsible for strategy, revenue delivery and business development. In

his role he regularly consults with technology and privacy stakeholders in global

companies to develop and deliver highly-secure cloud communication solutions.

Page 3: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

IT & DATA MANAGEMENT RESEARCH,

INDUSTRY ANALYSIS & CONSULTING

Logistics for Today’s Webinar

Slide 3 © 2016 Enterprise Management Associates, Inc.

Questions

• An archived version of the event recording

will be available at

www.enterprisemanagement.com

• Log questions in the Q&A panel located on the

lower right corner of your screen

• Questions will be addressed during the Q&A

session of the event

Event recording

Event presentation

• A PDF of the PowerPoint presentation will be

emailed to you as part of the follow-up email.

Page 4: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

IT & DATA MANAGEMENT RESEARCH,

INDUSTRY ANALYSIS & CONSULTING

David Monahan

Research Director

Enterprise Management Associates (EMA)

Page 5: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

IT & DATA MANAGEMENT RESEARCH,

INDUSTRY ANALYSIS & CONSULTING

The Digital Enterprise

• What is it?

• Paperless?- How about just less paper

• Using technology for a business advantage

• Both internal and external facing digitization

• What are its benefits?

• Time/Efficiency

• Money

• Customer Satisfaction

Slide 5 © 2016 Enterprise Management Associates, Inc.

photo by Louie Psihoyos

Page 6: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

IT & DATA MANAGEMENT RESEARCH,

INDUSTRY ANALYSIS & CONSULTING

The Digital Enterprise (continued)

• Expanding use cases

• Business to Consumer-

Reliance on the digital infrastructure health care,

government, finance and others (electronic only

processes)

Loan approvals

Health and care status updates, prescriptions

• Internal approvals

Vacation requests

Click to agree on emails

Slide 6 © 2014 Enterprise Management Associates, Inc.

photo by Louie Psihoyos

Page 7: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

IT & DATA MANAGEMENT RESEARCH,

INDUSTRY ANALYSIS & CONSULTING

Unsecured Communications Increase Data Loss Risks!

Slide 7 © 2016 Enterprise Management Associates, Inc.

Page 8: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

IT & DATA MANAGEMENT RESEARCH,

INDUSTRY ANALYSIS & CONSULTING

Top Methods of Data Loss or Leakage

Slide 8 © 2016 Enterprise Management Associates, Inc.

Page 9: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

IT & DATA MANAGEMENT RESEARCH,

INDUSTRY ANALYSIS & CONSULTINGSlide 9 © 2016 Enterprise Management Associates, Inc.

Where We Are Today

Page 10: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

IT & DATA MANAGEMENT RESEARCH,

INDUSTRY ANALYSIS & CONSULTINGSlide 10 © 2016 Enterprise Management Associates, Inc.

Inhibitors for Data/Document Security

What is stopping better security?

Page 11: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

IT & DATA MANAGEMENT RESEARCH,

INDUSTRY ANALYSIS & CONSULTING

E-Signatures Provide Data Security and Process Acceleration

Slide 11 © 2016 Enterprise Management Associates, Inc.

* Ombud e-signature research

*

*

*

Page 12: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

Securing the New

Digital Enterprise:

Trackable, Controlled,

and Authorized

Kevin Froese,

Global VP of Sales Cirius

Page 13: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

• New e-signature drivers:

• Reducing transaction cost

• Convenience and time

• Need to reduce approval friction

• Emergence of “Click to acknowledge.”

• Acceptance-based approvals

• Ordered acceptance

• Trackable

• Leading adoption wave:

• Client agreements, acknowledgements, and consents

• Sales agreements

• Human resources agreements

• Document approvals

E-Signature Evolution: From Agreements to Acceptance

Page 14: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

Key E-Signature Risk Factors:

Unencrypted Documents and Links,Authority, and Document Residency

Page 15: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

• Document / data leakage

• Theft of personally Identifiable Information

• Risk of regulatory non-compliance

• Agreement and acceptance integrity

• Possible unauthorized approvals

Consequences of Unchecked E-Signature Risk

Page 16: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

Expensive and complex security overlays reduce adoption

Page 17: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

Digital Enterprise Needs

Page 18: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

Digital Enterprise Needs

Security

Page 19: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

Digital Enterprise Needs

Security Authority

Page 20: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

Digital Enterprise Needs

Security Authority Visibility Control

Page 21: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

Digital Enterprise Needs

Security Authority Visibility Control

Usability/Ease of Use for Both Sender and Receiver

Page 22: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

Secure E-Signature Case Study: Medical Device Manufacturer

Page 23: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

Challenge: Cost Effective FDA-Regulated Notifications and Recalls

• Product recalls done via FedEx and fax

• Slow process (average 257 days from awareness to recall notification

• Expensive postage, tracking, follow up

• High risk of unknown recipient acceptance

• Needs:

• Secure way to send, receive and track two-way product, patient

information & product recall sign-off

• Integration with existing SSO federation service

Page 24: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

Alternative Solutions

• Old school encryption solutions are too complicated

and not tracked

• Out of box E-signature solutions create HIPAA risk

(requires complicated PKI)

• E-Signature solutions do not support Enterprise branding nor

SSO out of the box

Page 25: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

• Application to send secure bulk messages, files, and e-signature documents

• Tracking and reporting on every recipient action

• Non-repudiated e-signature without expensive PKI

• Supports SSO (SAML and OAUTH)

• Supports compliance for FDA and HIPPA at low cost

• Replaced planned e-signature solution and encryption solution

• Fully hosted; third-party audited

Solution: Cirius Secure Messaging and ‘Click to Acknowledge’ E-Signatures

Page 26: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

• Secure e-signatures

• Desktop, web and mobile

• Integrated into the email

workflow

• API integration

• Optional dedicated cloud service

• Tracking and control via

the Delivery Slip

Cirius Secure E-Signatures

Key integrations include: Mobile App Support:

Page 27: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

The Delivery Slip

Message tracking Know the moment a

message has been

received, read, replied,

forwarded, printed or

deleted by all receivers.

Message securityUsers have the ability to stop

replies and forwards of their

secure messages and require

the receiver provide a

password.

Page 28: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

Message controlTrue message recall allows

users to revoke a message even

after it has been read.

Large File TransferUsers can rapidly send and

receive file attachments of up to

5GB without overloading their

inboxes.

Secure E-SignaturesEasily include documents for

quick ‘Click to Acknowledge’ e-

signatures that are secure and

authenticated

Page 29: Securing the New Digital Enterprise: Trackable, Controlled, and Authorized

Contact us and receive:

15 minute

demo

30 day

free trial

5 minute

activation

Kevin Froese

[email protected]