• open panel
  • Home
  • Posts Tagged'sharepoint'

Posts Tagged ‘sharepoint’

Enabling the mobile workforce with Managed File Transfer

The proliferation of mobile devices within the enterprise is undeniable with tablets and smart phones becoming key tools for employees looking to ‘get the job done’.  Many CIO’s and IT Directors know they have a problem with ensuring the secure and controlled mobile access to data, but what’s the solution?

Should access be restricted completely and a ban be placed on BYOD (Bringing Your Own Device) to work?  Or should your staff use internal tools such as Sharepoint, live with its inadequacies and struggle on with their limitations knowing that its not specifically built for the job?  Or do you take on the challenge of choosing the right tool for the job?  Realistically the choice is already made as there’s no easy way in which to stop people using mobile devices.  The most effective route is to provide them with the right tools to be successful in their jobs, whilst giving IT and security teams the tools that they need to manage users, set security policy and privileges.

Some key thoughts you should consider when selecting a mobile enabled managed file transfer solution are:

Mobile File Sharing

  • What mobile / tablet platforms do you need to support?
  • Is there a business need for a mobile application or will a browser based interface suffice?
  • How many users do you intend on providing the technology to?
  • How will you restrict access to data, e.g. users home folders only?

At Pro2col we’ve been helping companies to secure their data since 2003 and securing the mobile workforce isn’t a great deal different.  Of course there are a few different considerations to take into account, but that’s all part of what we do.  We work with a wide range of managed file transfer vendors, not all of whom want to be listed on our web site but who are taking the secure exchange of data with the mobile workforce very seriously.  Different vendors take different approaches to addressing the problem.  We work with vendors who have approached mobile file sharing from very different perspectives, which might form another blog item.

The experience we’ve gained in helping other enterprises address their mobile file sharing problems can help your business too.  Overcoming the challenge of securely exchanging data with remote workers across a range of mobile or tablet platforms, doesn’t need to be a hassle.  Get in touch with our team of technical specialists on 0333 123 1240 to work out what’s most suitable for you.

Share on TwitterShare on FacebookShare on LinkedIn+1
 

Moving On From FTP: Where To Begin

“My company still relies heavily on FTP.  I know we should be using something more secure, but I don’t know where to begin.”

Sound familiar?

The easy answer is that you should migrate away from antiquated FTP software because it could be putting your company’s data at risk – unsecured data is obviously an enormous liability.  Not only does FTP pose a real security threat, but it also lacks many of the management and enforcement capabilities that modern managed file transfer solutions offer.

No, it won’t be as daunting of a task as you think.  Here’s a few steps to help you get started:

FTP

  1. Identify the various tools that are being used to transfer information in, out, and around your organisation.  This would include not only all the one-off FTP instances, but also email attachments, file sharing websites, smartphones, EDI, etc.  Chances are, you’ll be surprised to learn some of the methods employees are using to share and move files and data.
  2. Map out existing processes for file and data interactions.  Include person-to-person, person-to-server, business-to-business and system-to-system scenarios.  Make sure you really understand the business processes that consume and rely on data.
  3. Take inventory of the places where files live.  Servers, employee computers, network directories, SharePoint, ordering systems, CRM software, etc.  After all, it’s harder to protect information that you don’t even know exists.
  4. Think about how much your company depends on the secure and reliable transfer of files and data.  What would the effects be of a data breach?  How much does revenue or profitability depend on the underlying business process and the data that feeds them?
  5. Determine who has access to sensitive company information.  Then think about who really needs access (and who doesn’t) to the various types of information.  If you’re not already controlling access to company information, it should be part of your near-term plan.   Not everybody in your company should have access to everything.

Modern managed file transfer solutions deliver not only the security you know your business requires, but also the ability to better govern and control you data as well as provide you with visibility and auditing capabilities into all of your organisations data interactions, including files, events, people, policies and processes.

So what are you waiting for, give Pro2col a call on 0333 123 1240 and let us help you replace your legacy FTP solutions.

Share on TwitterShare on FacebookShare on LinkedIn+1
 
© Pro2col Ltd 2012 | Terms of Sale | Privacy Policy | Sitemap
Part of the Pro2col Group