Welcome!

SOA & WOA Authors: Carmen Gonzalez, Jnan Dash, Liz McMillan, Elizabeth White, Pat Romanski

Related Topics: Cloud Expo, Wireless, SOA & WOA, Web 2.0, Apache, Security

Cloud Expo: Article

Seizing Control of Data Delivery

A tough economy has forced IT departments to do more with less – especially within small and medium-sized businesses (SMBs)

The "consumerization of IT" is a topic we've heard a lot about recently - especially when it comes to "Bring Your Own Device (BYOD)." One area that is less talked about, yet a growing trend under the "consumerization" umbrella, is the use of free, consumer-type file transfer services in the workplace.

A tough economy has forced IT departments to do more with less - especially within small and medium-sized businesses (SMBs). Working with limited resources and budget, SMB IT professionals are still expected to manage everything from network infrastructure to cloud services to security and compliance issues, all while keeping the business running smoothly. Sometimes this results in long "wait" times for employees.

Unfortunately, some employees get tired of waiting for IT to help them out and take matters into their own hands in order to get their jobs done. When it comes to sending large files that an email server can't handle, many employees are turning to consumer-type, cloud-based tools, such as YouSendIt, Dropbox and iCloud. To them, it's a way to send files in a matter of minutes without having to bother the IT department. But in reality, it's a recipe for disaster and a data security nightmare.

Employees aren't the only problem. A recent survey by DataMotion found that nearly 35% of IT and business managers admit that they've actually used or recommended that others use free consumer-type, file transfer services for work purposes.

This is a major problem that needs to be addressed. Free services disrupt any semblance of centralized IT control, as there is no way to track and manage files sent via these solutions. These tools often have weak or non-existent security controls, which introduce serious risks when transmitting sensitive information. This can lead to data leakage, compliance fines, legal liabilities and a tarnished reputation. Need proof of the security issues surrounding these services? Dropbox recently confirmed that usernames and passwords stolen from third party websites were used to access its customers' accounts.

What Can Be Done?
To avoid putting their infrastructure at risk, some companies are banning consumer-type, file-transfer services in the workplace altogether. In fact, nearly 42% of DataMotion's survey respondents stated that their company forbids the use of these services in the workplace, and nearly 30% said their company even goes so far as to block the sites' URLs.

But, IT must offer employees viable, easy-to-use alternatives or frustrated workers will continue to find workarounds. Luckily, there are data delivery solutions that help employees transmit information quickly and easily through secure channels, while still providing IT staff with visibility and control over this data.

Here is a brief, yet important, checklist of product features to consider when evaluating data delivery offerings for your organization. Make sure the solution:

  • —Offers Simplicity - If the product is not intuitive and easy-to-use for both senders and recipients, not only will the IT support burden increase, but, employees will find alternative, insecure ways to send their data. The best security does no good if it is not used.
  • —Provides Flexibility - Going back to BYOD, employees are sending just as many emails via their mobile devices as they are on their computers. Consider a data delivery solution that integrates with mobile devices, so security and compliance controls are enforced no matter how - or on what device - data is sent. Solutions that do so natively (without the need to launch an application) make it easy for the employee to follow policy.
  • Prioritizes Security - The ability to easily send sensitive information securely is vital. Make sure your data delivery solution encrypts data while it's in transit and at every "hop" where it's stored along the way. It's also important to ensure the solution's delivery methods adhere to your own internal - as well as industry - security and compliance regulations.
  • —Gives Control to the IT department - A solid solution will provide IT with centralized control, the ability to easily provision/de-provision users, and track and monitor all data transfers, including file names, sender and recipient IDs, timestamps, completion status notifications and other important metadata.
  • —Delivers ROI - Consider the difference between on-premise and cloud-based solutions. Cloud solutions often offer lower total cost of ownership (TCO) because of significant cost savings in hardware, OS licenses, staffing and disaster recovery. Additionally, because up-front costs are minimal and the solution can be up and running quickly, cloud solutions provide companies with a quick return on investment. Just remember to make sure your cloud provider upholds or exceeds the same security and compliance standards that you follow.

With data breaches more prevalent than ever, industry regulations rapidly expanding, and Big Data becoming the norm, companies must re-evaluate their methods of data sharing. Choosing a solution that encompasses the features outlined in this checklist will put you well on your way to protecting sensitive information and staying ahead of the competition. And pairing this with employee education and awareness will help you gain control back from the "wild west" of rogue application use.

More Stories By Pete Cafarchio

Technology veteran Pete Cafarchio is vice president of DataMotion, innovators in cloud-based data delivery services. Millions of users worldwide rely on DataMotion to transparently improve business processes and reduce costs, while mitigating security and compliance risk. The company’s core DataMotion Platform solves business issues by providing a secure data delivery hub. Its easy-to-use solutions for secure email, file transfer, forms processing and customer contact leverage the DataMotion Platform for unified data delivery.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Technology is enabling a new approach to collecting and using data. This approach, commonly referred to as the "Internet of Things" (IoT), enables businesses to use real-time data from all sorts of things including machines, devices and sensors to make better decisions, improve customer service, and lower the risk in the creation of new revenue opportunities. In his General Session at Internet of @ThingsExpo, Dave Wagstaff, Vice President and Chief Architect at BSQUARE Corporation, discuss the real benefits to focus on, how to understand the requirements of a successful solution, the flow of ...
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
We’re no longer looking to the future for the IoT wave. It’s no longer a distant dream but a reality that has arrived. It’s now time to make sure the industry is in alignment to meet the IoT growing pains – cooperate and collaborate as well as innovate. In his session at @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, will examine the key ingredients to IoT success and identify solutions to challenges the industry is facing. The deep industry expertise behind this presentation will provide attendees with a leading edge view of rapidly emerging IoT oppor...
In this Women in Technology Power Panel at 15th Cloud Expo, moderated by Anne Plese, Senior Consultant, Cloud Product Marketing at Verizon Enterprise, Esmeralda Swartz, CMO at MetraTech; Evelyn de Souza, Data Privacy and Compliance Strategy Leader at Cisco Systems; Seema Jethani, Director of Product Management at Basho Technologies; Victoria Livschitz, CEO of Qubell Inc.; Anne Hungate, Senior Director of Software Quality at DIRECTV, discussed what path they took to find their spot within the technology industry and how do they see opportunities for other women in their area of expertise.
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential.
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, data security and privacy.
Wearable devices have come of age. The primary applications of wearables so far have been "the Quantified Self" or the tracking of one's fitness and health status. We propose the evolution of wearables into social and emotional communication devices. Our BE(tm) sensor uses light to visualize the skin conductance response. Our sensors are very inexpensive and can be massively distributed to audiences or groups of any size, in order to gauge reactions to performances, video, or any kind of presentation. In her session at @ThingsExpo, Jocelyn Scheirer, CEO & Founder of Bionolux, will discuss ho...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...

ARMONK, N.Y., Nov. 20, 2014 /PRNewswire/ --  IBM (NYSE: IBM) today announced that it is bringing a greater level of control, security and flexibility to cloud-based application development and delivery with a single-tenant version of Bluemix, IBM's platform-as-a-service. The new platform enables developers to build ap...

Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at home including open source hardware, the raw materials required and the options available to power s...
The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, demonstrated how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more.
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use cases.
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session at @ThingsExpo, Ryan Bagnulo, Solution Architect / Software Engineer at SOA Software, focused on desi...
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With "smart" appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user's habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps, abiding by privacy concerns and making the concept a reality. These challenges can't be addressed w...
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates hundreds of DNS queries. In addition, as more internet-enabled ‘Things' get connected, people will rely on DNS to name and find their fridges, toasters and toilets. According to a recent IDG Research Services Survey this rate of traffic will only grow. What's driving t...
"For over 25 years we have been working with a lot of enterprise customers and we have seen how companies create applications. And now that we have moved to cloud computing, mobile, social and the Internet of Things, we see that the market needs a new way of creating applications," stated Jesse Shiah, CEO, President and Co-Founder of AgilePoint Inc., in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example t...
The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focused on understanding how industrial data can create intelligence for industrial operations. Imagine ...