enterprise collaboration - 4

5

Click here to load reader

Upload: nitin-kohli

Post on 21-Jun-2015

365 views

Category:

Technology


6 download

DESCRIPTION

We've talked now about Enterprise Collaboration Vision, Process and Tools. Now lets talk about Privacy and security.

TRANSCRIPT

Page 1: Enterprise Collaboration - 4

Nitin Kohli

Enterprise CollaborationPrivacy & Security Privacy & Security

Nitin Kohli

Page 2: Enterprise Collaboration - 4

AGENDA Nitin Kohli

• Basics

• Vision: The What?

• Process: The HOW?• Process: The HOW?

• Tools

• Privacy and Security

• Other Considerations

• Other ExamplesOther Examples

Page 3: Enterprise Collaboration - 4

Privacy & Security

The following should be considered:

Nitin Kohli

The following should be considered:

1. Secure Intranet

• Consider using a VPN (virtual private network) toConsider using a VPN (virtual private network) to 

protect "internal" information in transit. 

• They would also access their "intranet" via this 

technologytechnology. 

• Many companies have moved toward SSL VPN or what 

is called "clientless" VPN. 

SSL VPN i l i b th th ti• SSL VPN simply requires a browser rather than creating 

the administrative overhead of installing and 

maintaining client VPN software. 

• Results in cost savings.

Page 4: Enterprise Collaboration - 4

Privacy & Security Nitin Kohli

2. Administrative / Authentication Standards

• Single Sign On (SSO) alleviates the burden of employees 

d kand security risk. 

• Centralized user provisioning (and deprovisioning) tools 

make creating and removing accounts, a simpler task. 

• Users passwords are essentially synchronized so they can 

access all necessary business tools with one user ID and 

password. 

• “Self‐help" modules can be used to reset passwords.

• Administrative costs savings associated with help desk 

password resets. 

Page 5: Enterprise Collaboration - 4

3. Access Rights Management

Privacy & Security Nitin Kohli

• Defines Access Control. 

• The goal is to provide access to just what a person 

needs to get their job done and nothing more. 

• “Practice of least privilege". 

4. Interactions with Customers / Outer World

• To ensure information leakage doesn’t happen by 

employees, additional training may be required.  

5. Social Bookmarking 

• It  builds community around topics of interest/role. 

• Search/browse by tag and user• Search/browse by tag and user

• Search/browse the content of the comments 

• Bookmark URL itself

• Any search or cross correlation can be turned into a• Any search or cross‐correlation can be turned into a 

feed and used other ways (mashups).