Click me

The History of File Sharing from Igloo

"Gretchen Wieners knows "That's why her hair is so big, everybody's business, she knows everything about everyone." it's full of secrets. - Mean Girls, 2004 A history of-cerperate espienage file sharing by Igloo Software, the new digital workplace A BATTLE FOR FREEDOM A BATTLE FOR SECURITY Business users want to work anywhere, share, IT and business owners want to keep their corporate secrets outside the prying hands of competitors. collaborate and be awesome. AT STAKE Information means Keep it secret, innovation! keep it safe. $12 BILLION" COULD BE LOST BY FORTUNE 500 COMPANIES 1,800,000,000,000,000GB One million, billion, trillion, quadrillion gigabytes of data was created in 2011. This will double in 2013. A LONG TIME AGO, IN A MONASTERY FAR, FAR AWAY It started with copying by hand Physical theft Information was limited and only copied by hand, With minimal amounts of hard copies, data can be stolen, deleted or corrupted. In historical by monks, hiding in the dark with their beautiful illustrations. times this might have been a monk running away with The BibleTM in the middle of the night. Information wants to be free These days it's leaving a laptop in a taxi, an iPhone in a bar, or robbery by a homeless football player in search of fizzy water nirvana. Gutenberg was like, "Hey Girl, we need to set this information free. We need a bible in every motel room this side of the Rhineland" – so he invented the printing press. Literacy skyrocketed. So did writing. Power to the people.. and stuff. Did we mention the massive increase in vulgarity? Long distance Welcome to the age of enlightenment, NSFW communication brought faster, newer innovations. Snail mail, telegraph and telephone Change brings new issues of trust, interception & complexity. We all started writing. Communication spread. And everyone moved further away. Snail mail became de rigeur, and a need for speed led us to the telegraph and later the telephone. Telephone leads to the fax. The story goes on... but we won't bore you. And singing telegrams. A COLD WAR Interception of data Your information and communication can be stolen in transit. 65% Historically this meant stealing the mail en-route, listening in on the telegraph or telephone transmissions. These days it's more likely your information is transmitting unencrypted over WiFi or cellular networks, which can be picked up by malicious third parties over lattes. agree there is significant risk that sensitive or confidential documents would end up in the hands of unauthorized parties From code cracking to modern hacking To get around interception, codes and passwords were developed to keep communication lines secure. As the enigma machine proved, codes can be hacked or the means decode them stolen. These days, brute force attacks, malware and keyloggers can claim your account logins. It's even worse when consumer companies keep losing your passwords. And, uh, you can't solve for laziness. II Top 10 passwords' 1. password 40% 2. 123456 3. 12345678 4. 1234 of passwords appear on the top 100 passwords 5. qwerty 6. 12345 7. dragon list. 8. NSFW 9. baseball 10. football ВСС? Сryptography! On average, when a rogue employee steals sensitive company documents, it costs a business $380,701 per incident Leaks are everywhere. Today an internal email can be sent to the media with two taps on a glass screen. With origins in cryptography, more sophisticated organizations use subtle changes in wording to track down the leaks. 34% of the businesses polled have no tools or procedures in place to detect identity fraud 640K OUGHT TO BE ENOUGH FOR ANYBODY - Bill Gates, 1981 Digital storage Duplication Duplication Duplication Duplicati Digital storage started with small capacities. The files were huge by comparison. Transferring files was so slow over digital networks that Sneakernet evolved – carrying floppy disks around by foot. With the prevalance of digital data, files can be duplicated, shared and transmitted without knowledge or much expense. Controlling access to your data becomes paramount to keeping your business information safe. Today we can transfer a floppy disk's worth of data in less than a second. You can store 73,142 times more data on a thumb drive. Hacking / Decryption We have so much data now we don't even know where it all is. Hackers can break through your passwords and your encryption. Sure, with 256-bit encyrption it can take up to 28 years to decode - but do most business users even know how to turn it on? And lighter weight consumer technologies sometimes don't even have encryption available. Human Error You can only do so much. Inevitably, you're going to log into an account in the wrong place, or be overwhelmed by passwords and security algorithms that you write your logins down. Fortunately there are some great software tools to help, like the wonderful 1Password. "Wokka wokka wokka wokka wokka" The Internet(s) ****! The Internet changed everything. We could instantly share files around the world. We could also steal them over the wire. A battle of technological warfare grew until we ended up in a VPN and firewall deadlock - unable to work because of all the security restrictions we put into place. Now employees get to choose their own device for work, but sometimes it doesn't mesh with IT policies. SharePoint doesn't like Macs. Business users don't like SharePoint. So they started sharing files via consumer cloud services, like YouSendlt, Dropbox, Box, and iCloud - just so they could do their jobs. 53% of mobile business professionals carry confidential data 65% of them unprotected from data theft The average cost of a lost laptop is $26,335 81% of US firms have lost a laptop with sensitive (That's just hard costs. It doesn't include the economic value of the data lost.) data on it !90% of organizations experienced leakage or loss of sensitive or confidential documents over the past 12-months AND THEN THIS HAPPENS... Firewall! Intranet! MOAR SECURITY! 79% increased firewall 58% introduced greater levels of 40% are budgeting for Web 2.0 79% implemented greater protection" web filtering specific security solutions web gateway protection MEANWHILE... :( So... Dropbox? A rogue employee used their privileges to 60 of organizations have employees who move confidential files to Dropbox without permission, either frequently or very frequently.3 % access sensitive company documents that they had no business reason to view/use, causing average damage of: 59% of organizations' say their controls are ineffective at monitoring employees, $82,214 contractors or other insiders who access these confidential documents. THIS IS NOT THE CLOUD YOU'RE LOOKING FOR... The Consumer Cloud Social Engineering The consumer cloud is great - for consumers. It's easy to use, it's beautiful, and it works on any device you want anywhere in the world. As they say, it just works. Consumer products aim to please - we love it. But secure, it is not. As we've seen with Mat Honan's epic hacking, social engineering poses the biggest risk to our data security. But it's not meant for business. It puts information into a wild The ability to reset passwords or gain access to consumer accounts via phone support or email poses even greater risk west of software and hardware that's fully outside of your control. to your confidential files if your employees are using consumer cloud services to access their work from home or on any device they want to use. of respondents say their employees use at least 51% one browser-based file sharing tools. ? 34 of IT professionals do not know the extent to which these applications are being used in the workplace. say documents accessed by mobile data-bearing 70% devices such as smartphones and tablets present a significant security risk. "Collaboration tools do not work in isolation. They overlap in numerous areas; asking users to switch between multiple applications and lose context in the process will result in user frustration and lagging business value." Excerpt from: Social, Mobile, And The Cloud Converge To Drive Competitive Advantage, a commissioned study conducted by Forrester Consulting on behalf of Igloo, May 2012. TL:DR; employees use consumer tools because yours are too hard. A HERO WE NEED The Enterprise Cloud All the usability and convenience of the consumer cloud with the security of an on-premise solution. It's hosted, it's managed, and it works securely on any device inside or outside your firewallI. The way we work is changing" tablets smartphones laptops At a client site While travelling (i.e. Hotel) While commuting (i.e. Train) THE ENTERPRISE CLOUD IS SECURE Your work More layers than an onion Database Balancing this is a series of security measures from end user security controlled by IT through highly secured data centers. With the enterprise cloud you get all the ease-of-use your employees want with the security, accountability, and regulartory compliance you need. A secure, three-tiered architecture separates the database from the platform - creating isolation but connectivity via our API. Platform The platform has limited accounts that can access it. The platform is separate from your data, so in the case of a brute-force attack, it's easy for us to sever the connection. Audit trails Single Sign-On Data Center Know who is viewing, Since IT owns log-in credentials, they can set Igloo uses Savvis for our data center. Savvis is a world leader in network security. Your data is behind seven physical layers of security, not to mention enough network security to be SAS70 Type III compliant. downloading, changing and password expiration and control access. You sharing documents with one can even use two-factor authentication to get click. Limit access with past loss of password security." document-level security controls. If someone leaves your company, so does their access to your files. Encryption As your data is transmitted from your device to the cloud, if you have SSL, your data is encyrpted inside a 256-bit SSL container. If a nefarious actor captures your data over the air it will take 28 years to decrypt." VPN and IPSEC controls are also available. AND IT'S NOT JUST ABOUT DOCUMENTS It's about sharing everything A digital workplace brings everything into one secure platform for your employees to work together - from user profiles and messaging to microblogs, from news and discussions to wikis - it's a secure, managed service built for business humans. Copyright 2012 lIgloo Inc. IGLOO Learn more about solutions for your employees, customers, and partners at The new digital workplace Igloo Inc. @lglooSoftware Sources 1: Enterprise Content Management Market, 2012-2016, The Radicati Group, 2012 2: The 2011 Digital Universe Study from IDC (underwritten by EMC), 2011 3: 2012 Confidential Documents at Risk Study, Ponemon Institute, July 2012 4: Web 2.0: A Complex Balancing Act, The First Global Study on Web 2.0 Usage & Beset Practices, 2010 5: Ad-hoc News, Business Owners Have "False Sense of Security" When It Comes to Data Breaches, May 27, 2008 6: Forreeter: The Value Of Corporate Secrets, How Compliance And Collaboration Affect Enterprise Perceptions Of Riek March 2010 7: 8: 9: 10: Social, Mobile, And The Cloud Converge To Drive Competitive Advantage, a commissioned study conducted by Forrester Consulting on behalf of Igloo, May 2012. 11: European Knowledge Management Fact Book, IDC #21511, January 2000 1Paseword is owned by AgileBite Inc. The Dropbox name is copyright Dropbox Inc. iCloud is copyright Apple Inc. Mean Girle is copyright Paramount Pictures, 2004. YouSendit name is owned by YouSendit Inc. Bill Gates is a man – he owne his own name, though, it's actually William. SharePoint is copyright Microsoft Inc. Box is copyright Box. -330, two-factor authentication and 9SL are optional upgrades on the Igloo platform 2005 Bonus fact: you save money! $ $$$$$ New "information taming" technologies such as deduplication, compression, and analysis tools are driving down the cost of creating, capturing, managing, and storing information to one-sixth the cost in 2011 in comparison to 2005. 2011

The History of File Sharing from Igloo

shared by Igloo_Software on Aug 23
Whether it be portability or security, it is evident that more organizations are looking into an effective way of collaborating. This infographic takes a look inside the history of file sharing.


Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy


Click the code to copy
Customize size