ILTA Webinar: Secure Yet Pain Free Mobile Access to Confidential Documents and Collaboration Tools3 October 2013
Seth Hallem, Co-Founder and CEO, Mobile Helix
Matt Bancroft, Co-Founder, President and COO, Mobile Helix
2
Presenters
Matt BancroftMobile Helix co-founder, COO and President
Expert in the mobile data market and mobile data technologies.
Seth HallemMobile Helix CEO and co-founder
Subject matter expert in software development, testing and security.
3
A Case Study24 hours in the life of a busy legal team…
4©MOBILE HELIX INC. PROPRIETARY AND CONFIDENTIAL. ALL RIGHTS RESERVED. PATENT PENDING..
The Players…The Client
Acme Inc.
• Large multi-national corporation
• Listed on NYSE• 300,000 employees• 50 countries• $100 B in revenue• $300 B market cap
The Legal Team
International Prestigious Law, LLC
• Litigation• Corporate Attorneys• Finance and Banking• Intellectual Property
The Outsourcing Partner
International Outsourcing Inc.
• Based in China• HQ in Hong Kong
5
At Home
Must review critical confidential Acme Inc. deal documents on flight
Day trip; taking only tablet
Forwards docs to personal Gmail account
Saves docs to personal cloud storage to access from tablet
10:00 PMNew York, NY
6
FOLLOWING THE DOCUMENTS
• Personal Gmail account
• Personal Cloud Storage account
• Personal tablet
10:00 PM
SOURCES OF FRUSTRATION
• Cannot access files directly from tablet
• Worried files will get out of date
New York, NY
7
At JFK Airport
Reviews deal points with team verbally
Team cannot forward revised documents to Partner’s tablet
Will review old documents and call with comments
7:30 AMJFK Airport, NY
8
7:30 AMJFK Airport, NY FOLLOWING THE DOCUMENTS
• Personal Gmail account
• Personal Cloud Storage account
• Personal tablet
SOURCES OF FRUSTRATION
• Cannot access files directly from tablet
• Worried files will get out of date
• Cannot access latest documents
9
On Flight to Chicago
Reviews contract documents on tablet
Notices important point of Chinese law
Needs to contact Hong Kong office
10:30 AMNY to Chicago
10
10:30 AMNY to Chicago FOLLOWING THE DOCUMENTS
• Personal Gmail account
• Personal Cloud Storage account
• Personal tablet
SOURCES OF FRUSTRATION
• Cannot access files directly from tablet
• Worried files will get out of date
• Cannot access latest documents
• Cannot access Contact Database
11
Lands in Chicago
Reviews comments verbally with team
Gets HK Partner contact details
Forwards cloud storage link to deal documents HK Partner
Calls and wakes HK Partner at home (12:00 AM in HK)
12:00 PMO’Hare Airport, Chicago
12
12:00 PMO’Hare Airport, Chicago FOLLOWING THE DOCUMENTS
• Personal Gmail account
• Personal Cloud Storage account
• Personal tablet
• Cloud storage link via personal email
SOURCES OF FRUSTRATION
• Cannot access files directly from tablet
• Worried files will get out of date
• Cannot access latest documents
• Cannot access Contact Database
• Slow document review process
• Cannot share documents with HK
13
Hong Kong Partner – At Home
Has to use daughter’s personal Android tablet
Downloads documents from cloud storage to tablet
Summarizes comments in email sent via personal account
Calls US Partner, leaves voicemail
1:00 AMHong Kong, China
14
1:00 AMHong Kong, China
FOLLOWING THE DOCUMENTS
• Personal Gmail account
• Personal Cloud Storage account
• Personal tablet
• Cloud storage link via personal email
• Personal Android tablet
• HK Partner personal email
SOURCES OF FRUSTRATION
• Cannot access files directly from tablet
• Worried files will get out of date
• Cannot access latest documents
• Cannot access Contact Database
• Slow document review process
• Cannot share documents with HK
• Painful collaboration process
• First angry call to IT…
15
An Alternate Case Study24 hours in the life of a busy legal team…
16
At Home
Must review critical confidential Acme Inc. deal documents on flight
Day trip; taking only tablet
Selects documents in Filebox app and marks for offline access
Documents update automatically overnight
10:00 PMNew York, NY
17
FOLLOWING THE DOCUMENTS
• Secure Container
10:00 PM
SOURCES OF FRUSTRATION
• The alarm clock
New York, NY
18
At JFK Airport
Reviews key deal points with the team
Syncs the documents on his tablet to the latest version
Tells team he will review documents during the flight and will send comments when he lands
7:30 AMJFK Airport, NY
19
7:30 AMJFK Airport, NY FOLLOWING THE DOCUMENTS
• Secure container
SOURCES OF FRUSTRATION
• The alarm clock
• Crowded airport
20
On Flight to Chicago
Reviews documents on tablet
Adds comments to the documents
Notices important point of Chinese law
Opens Firm contact / expertise directory app that is available offline, finds contact details for HK partner
Drafts email to the Hong Kong partner, sends secure link to the deal documents in the Firm file share
10:30 AMNY to Chicago
21
10:30 AMNY to Chicago FOLLOWING THE DOCUMENTS
• Secure container
SOURCES OF FRUSTRATION
• The alarm clock
• Crowded airport
• Airline coffee
22
Lands in Chicago
Filebox app syncs automatically and sends documents with comments to the team
Email app sends email to HK partner
Calls deal team, explains comments
Calls and wakes HK Partner at home (12:00 AM in HK)
12:00 PMO’Hare Airport, Chicago
23
12:00 PMO’Hare Airport, Chicago
FOLLOWING THE DOCUMENTS
• Secure container
• Secure email
SOURCES OF FRUSTRATION
• The alarm clock
• Crowded airport
• Airline coffee
• Chicago weather
24
Hong Kong Partner – At Home
Must use daughter’s personal Android tablet
Downloads secure container app to the tablet, logs in to Firm’s network
Opens corporate email and reads message from NY Partner
Clicks on link in secure email and opens documents
Adds comments to the documents, syncs back to the Filebox
1:00 AMHong Kong, China
25
1:00 AMHong Kong, China
FOLLOWING THE DOCUMENTS
• Secure Container
• Secure Corporate email
• Another Secure Container
SOURCES OF FRUSTRATION
• The alarm clock
• Crowded airport
• Airline coffee
• Chicago weather
• Having to thank IT…
26©MOBILE HELIX INC. PROPRIETARY AND CONFIDENTIAL. ALL RIGHTS RESERVED. PATENT PENDING..
Enabling Technologies
Three enabling technologies are critical to effective and secure work on the deal:
Comprehensive Application Access
Offline Access
Secure Container
27
Enabling Technologies:Comprehensive Application Access
• Seamless mobile access to the full suite of productivity applications from any enabled device.
• Includes custom Intranet apps, SharePoint Document Libraries and Sites, document management tools, Corporate email, and new mobile apps.
DESCRIPTION
• Secure, encapsulated container for each operating system.
• Instant access to all applications and files on the corporate intranet.
• Integration with your existing security infrastructure, including single-sign-on and role-based authorization.
• Seamless user experience, including native device gestures (touch, swipe – not right-click, double-click), and responsive performance.
• Rich, simple, and standards-based app development environment for rapid and secure development and deployment of mobile-first app.
CRITICAL CAPABILITIES
28
Enabling Technologies:Comprehensive Application Access
• Acme deal unaffected by travel schedules and events.• Lawyers able to work without avoidable stress.
CASE STUDY EVENTS
• Removes the risk of sensitive data being lost or compromised. • IT to maintains full control over access to sensitive data and documents.• One common security model for fixed and mobile access.
SECURITY IMPLICATIONS
29
Enabling Technologies:Offline Access
• Lawyers continue to work and are productive when no network connection is available.
• Offline data remains secure even if device is lost or compromised.DESCRIPTION
• Separate strong encryption for online and offline data.
• Automatic synchronization of files marked for offline storage.
• Offline access to full suite of legal applications, documents, SharePoint sites and lists, including recently viewed documents and web pages.
• IT determines data and applications accessible by each user and by device, configurable automatic expiry date for offline data.
• App-specific data synchronization API to integrate offline storage with backend data sources.
CRITICAL CAPABILITIES
30
Enabling Technologies:Comprehensive Offline Access
• Download updated deal documents for review in flight, automatic sync when connected to update document versions.
• Access internal Contacts and Expertise directory in flight.
• Review and edit documents in flight.
• Access review and respond to emails and attachments while in flight.
CASE STUDY EVENTS
• More convenient to keep documents in the container than it is to use a personal cloud storage provider.
• Access productivity tools developed by IT anywhere enabling sensitive data to stay in the container without impacting productivity.
• IT is in full control of offline access to sensitive documents and data.
• Automatically delete saved documents with configurable expiration policy.
SECURITY IMPLICATIONS
31
Enabling Technologies:Secure Container
• Secure partitioned environment on mobile device for sensitive corporate apps and data.
• Completely separate from all personal data, content, apps.DESCRIPTION
• Container functionality and security completely independent of device OS, enabling a worry-free BYOD program.
• Strong authentication to access both online and offline data.
• Provisioned and managed by IT independent of rest of device.
• Selective wipe of container without impacting remainder of device.
• All configurations, app definitions, data fully encrypted.
• Auditable trail of all interactions between the container and corporate data.
CRITICAL CAPABILITIES
32
Enabling Technologies:Secure Container
• Access to internal apps and documents on any device.CASE STUDY
EVENTS
• Protect data from security threats resident on personal devices.
• Security remains in enterprise control, not dependent on 3rd parties.
• Implement comprehensive protection for your data and your network.
SECURITY IMPLICATIONS
33©MOBILE HELIX INC. PROPRIETARY AND CONFIDENTIAL. ALL RIGHTS RESERVED. PATENT PENDING..
CONCLUSION Mobility is happening. IT has the opportunity to lead. Effective secure mobility enables attorneys to access
critical documents and applications when and where they need to.
Though an important first step, effective secure mobility is about more than email, calendar and contacts.
The three critical enabling technologies required for effective secure mobility are: Comprehensive Application Access
Comprehensive Offline Access
Secure Container
34
Thank you for joining today.
Join us for a Link Product Briefing Webinar to learn more.
Q&A
Wed, Oct 23, Register now: http://www.mobilehelix.com/introducing-link-webinar/
Recommended