SlideShare a Scribd company logo
1 of 4
Download to read offline
WHITE PAP ER




 Security Policy:
 Five Keys to User
 Compliance


EXECUTIVE SUMMARY
                                               IT managers have long suspected: users, as they naturally go about trying
Business users are a key part of a company’s
security, and even the most conscientious
employees can introduce serious breaches
                                               (52%)1
of security policy. IT can do everything
                                               security policy.
in its power to secure the company’s
confidential documents — provide first-class
                                               IT too often is portrayed as the security heavy, forced to try to halt such
security infrastructure, develop reasonable
security policies and engage in extensive      security. Feeling these steps hinder their productivity, users go to great
communication and training — yet still         lengths to avoid or circumvent even the most reasonable security measures,
people fail to comply. The solution is to
provide security that helps people do their
jobs more efficiently, thereby inducing users   It is hard to blame the users; they are just trying to get their jobs done as
to follow best security practices without
even knowing it.



                                               people fail to comply. What more can IT do?

                                               The solution is to provide security without making it difficult for users to
                                               do their jobs. For example, if IT can offer easy group collaboration within a
                                               transparently secure setting, or eliminate the need for users to send sensitive
                                               documents by email, users can be as productive as ever, or even more so.
                                               And since the environment is inherently secure, users are following best
                                               security practices without even knowing it.

                                               In the paper that follows, you will find five ways IT can facilitate user productivity
                                               while automatically ensuring safe security practices. In each case, users are
                                               unhindered by security procedures, yet their work is conducted in a
                                               transparently secure environment. Even better, the environment actually
                                               streamlines processes and improves efficiency, leading users to make it their
                                               preferred work environment.




                                               1

                                                   Evade and Ignore Security, Ponemon Institute, June 10, 2009
White Paper – Security Policy



                                         In some cases, such as those involving negotiations [see #3 below], the
                                         secure environment actually gives workers a distinct advantage.
                                         And as people experience the advantages of working within such an
                                         environment, advantages like increased efficiency or negotiation leverage,
                                         they readily return to make use of these advantages. Suddenly, IT no
                                         longer needs to force compliance with document security procedures.
                                         Users willingly comply, often without even realizing it.

                                         The following table illustrates unsafe behaviors resulting from human
                                         factors that can be reduced or eliminated through a transparently secure
                                         environment, which also makes work easier or more efficient for the users.
                                         In all the cases above, security is built into the online environment




                                         of a security issue.




   Business Practice                                                                 Mitigation Strategy
                                       People often use email where delivery            A central document repository
                                       isn’t assured or can be intercepted              eliminates the need to send
   1 Group collaboration on doc-                                                        unsecured emails
     uments, presentations, analysis   Easy to accidentally send to the
                                       wrong person with a similar name                 No need for multiple versions
                                                                                        distributed among group members

                                       Unauthorized forwarding of                       Put usage restrictions on documents:
                                       documents                                        disable printing or forwarding
   2 Project collaboration             Never sure who has seen the material             Share large files
     with vendors, contractors,                                                         Ensure all have the most recent version
     offsite employees
                                                                                        Track receipt and viewing
                                                                                        Accelerate workflow

                                       Difficult to prevent documents from               Due diligence documentation in the
   3 Confidential bidding               being leaked to unauthorized parties             secure environment is protected
     and negotiation                   Difficult to gauge interest level                 Able to see which bidders have read
                                                                                        the documentation most thoroughly

                                       Users take files home or with them on a           Safe, convenient remote access to
                                       USB, running the risk of loss of the USB         centrally stored and secured files
   4 Traveling or multi-location       and its contents                                 No need to copy files to USB or synch
     workers
                                       May require use of a cumbersome VPN              to laptop
                                       Need to continually synch systems

                                       Documents are at risk during distribution        Secure access to all documents
                                       by email or as paper documents via delivery      Enables confidential online voting
   5 Boardroom minutes /               services
     Sensitive communications                                                           Eliminates risk and expense of courier
                                       No effective decision-making structures
                                                                                        services
                                       outside of scheduled meetings
White Paper – Security Policy



                                The business advantages of a transparently secure work space quickly
                                become clear:
                                 Increased productivity through easy group collaboration that removes version
                                 management hassles

                                 Improved security and productivity through the elimination of email mix ups and
                                 crossed, delayed, and lost messages, which not only reduces business risk but also
                                 cuts down the amount of email flooding into users’ mailboxes that must be managed

                                 Improved communication in collaboration and bidding processes through the
                                 identification of which documents have been accessed and by whom, spotlighting
                                 the most interested parties and pinpointing uncompleted tasks

                                 Increased mobile efficiency by avoiding the tedious chore of synching documents
                                 between desktop, laptops, and mobile devices when traveling since all the data is
                                 available via the Internet anytime in the secure work space

                                 Improved governance efficiency by creating an audit trail of accesses and changes
                                 to documents that address corporate policy or are required for regulatory
                                 compliance

                                 Reduced need for costly, time-consuming, and inconvenient travel and shipping
                                 physical documents

                                From the IT perspective, the deployment of a secure work space eliminates the
                                need to enforce heavy-handed security policies on reluctant users. Instead, the policies
                                are enforced transparently and automatically, resulting in better security while
                                reducing tension between IT and users.

                                For everyone — IT, users, and the business — it becomes a win-win-win situation.
                                IT doesn’t have to play the security heavy, users don’t feel burdened but actually
                                feel more productive, and the business gets better security and increased productivity.


                                Appendix: Brainloop Secure Dataroom


                                users inside and outside your company. Top encryption, sophisticated security




                                About Brainloop




                                documents and enabling document sharing and collaboration among authorized

                                unauthorized users. Frequent uses include contract negotiations, project
White Paper – Security Policy




                                  CONTACT

                                  Brainloop Inc.                              Brainloop AG
                                  One Broadway, 14th floor
                                                                                                                    Copyright © 2009




                                  Cambridge, MA 02142 · USA                   81669 Munich · Germany
                                  T: +1 (800) 517 317 1
                                  info@brainloop.com                          info@brainloop.de
                                  www.brainloop.com                           www.brainloop.de

                                Copyright © 2009, Brainloop Inc. All rights reserved. Brainloop and the “brainball” logo
                                are trademarks of Brainloop AG. All other trademarks mentioned in this document are
                                the properties of their respective parties.

More Related Content

More from United Interactive™

Black Hat: MENA Market Fact Sheet – 2010
Black Hat: MENA Market Fact Sheet – 2010Black Hat: MENA Market Fact Sheet – 2010
Black Hat: MENA Market Fact Sheet – 2010United Interactive™
 
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...United Interactive™
 
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...United Interactive™
 
Click 4.0: Digital Marketing Professionals of the Middle East Survey 2010
Click 4.0: Digital Marketing Professionals of the Middle East Survey 2010Click 4.0: Digital Marketing Professionals of the Middle East Survey 2010
Click 4.0: Digital Marketing Professionals of the Middle East Survey 2010United Interactive™
 
Jazarah.net: Saudi Arabia Facebook Fact Sheet – April 2010
Jazarah.net: Saudi Arabia Facebook Fact Sheet – April 2010Jazarah.net: Saudi Arabia Facebook Fact Sheet – April 2010
Jazarah.net: Saudi Arabia Facebook Fact Sheet – April 2010United Interactive™
 
TNS Global: The Arab As A Consumer 20-20 Woman – Saudi Arabia
TNS Global: The Arab As A Consumer 20-20 Woman – Saudi ArabiaTNS Global: The Arab As A Consumer 20-20 Woman – Saudi Arabia
TNS Global: The Arab As A Consumer 20-20 Woman – Saudi ArabiaUnited Interactive™
 
Media Habits of MENA Youth: A Three-Country Survey
Media Habits of MENA Youth: A Three-Country SurveyMedia Habits of MENA Youth: A Three-Country Survey
Media Habits of MENA Youth: A Three-Country SurveyUnited Interactive™
 
The Silatech Index: Voices of Young Arabs 2010
The Silatech Index: Voices of Young Arabs 2010The Silatech Index: Voices of Young Arabs 2010
The Silatech Index: Voices of Young Arabs 2010United Interactive™
 
The 500 Most Influental Muslims 2010
The 500 Most Influental Muslims 2010The 500 Most Influental Muslims 2010
The 500 Most Influental Muslims 2010United Interactive™
 
TNS Global: GEMs – Insights from Emerging Markets 2/2010
TNS Global: GEMs – Insights from Emerging Markets 2/2010TNS Global: GEMs – Insights from Emerging Markets 2/2010
TNS Global: GEMs – Insights from Emerging Markets 2/2010United Interactive™
 
TNS Global: GEMs – Insights from Emerging Markets 1/2010
TNS Global: GEMs – Insights from Emerging Markets 1/2010TNS Global: GEMs – Insights from Emerging Markets 1/2010
TNS Global: GEMs – Insights from Emerging Markets 1/2010United Interactive™
 
Nowandnext.com: Trends & Technology Timeline 2010+ (infographic)
Nowandnext.com: Trends & Technology Timeline 2010+ (infographic)Nowandnext.com: Trends & Technology Timeline 2010+ (infographic)
Nowandnext.com: Trends & Technology Timeline 2010+ (infographic)United Interactive™
 
Oracle: Capitalising On The Digital Age
Oracle: Capitalising On The Digital AgeOracle: Capitalising On The Digital Age
Oracle: Capitalising On The Digital AgeUnited Interactive™
 
Jonckers: Choosing A Srategic Sourcing Model For Localisation
Jonckers: Choosing A Srategic Sourcing Model For LocalisationJonckers: Choosing A Srategic Sourcing Model For Localisation
Jonckers: Choosing A Srategic Sourcing Model For LocalisationUnited Interactive™
 
The Netsize Guide 2010 'Mobile Renaissance'
The Netsize Guide 2010 'Mobile Renaissance'The Netsize Guide 2010 'Mobile Renaissance'
The Netsize Guide 2010 'Mobile Renaissance'United Interactive™
 
A.T. Kearney: Internet Value Chain Economics
A.T. Kearney: Internet Value Chain EconomicsA.T. Kearney: Internet Value Chain Economics
A.T. Kearney: Internet Value Chain EconomicsUnited Interactive™
 
Burson-Marsteller: The Global Social Media Check-up 2010
Burson-Marsteller: The Global Social Media Check-up 2010Burson-Marsteller: The Global Social Media Check-up 2010
Burson-Marsteller: The Global Social Media Check-up 2010United Interactive™
 

More from United Interactive™ (20)

Black Hat: MENA Market Fact Sheet – 2010
Black Hat: MENA Market Fact Sheet – 2010Black Hat: MENA Market Fact Sheet – 2010
Black Hat: MENA Market Fact Sheet – 2010
 
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...
 
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...
 
Click 4.0: Digital Marketing Professionals of the Middle East Survey 2010
Click 4.0: Digital Marketing Professionals of the Middle East Survey 2010Click 4.0: Digital Marketing Professionals of the Middle East Survey 2010
Click 4.0: Digital Marketing Professionals of the Middle East Survey 2010
 
Jazarah.net: Saudi Arabia Facebook Fact Sheet – April 2010
Jazarah.net: Saudi Arabia Facebook Fact Sheet – April 2010Jazarah.net: Saudi Arabia Facebook Fact Sheet – April 2010
Jazarah.net: Saudi Arabia Facebook Fact Sheet – April 2010
 
TNS Global: The Arab As A Consumer 20-20 Woman – Saudi Arabia
TNS Global: The Arab As A Consumer 20-20 Woman – Saudi ArabiaTNS Global: The Arab As A Consumer 20-20 Woman – Saudi Arabia
TNS Global: The Arab As A Consumer 20-20 Woman – Saudi Arabia
 
Media Habits of MENA Youth: A Three-Country Survey
Media Habits of MENA Youth: A Three-Country SurveyMedia Habits of MENA Youth: A Three-Country Survey
Media Habits of MENA Youth: A Three-Country Survey
 
AMRB: The Modern Muslim Consumer
AMRB: The Modern Muslim ConsumerAMRB: The Modern Muslim Consumer
AMRB: The Modern Muslim Consumer
 
The Silatech Index: Voices of Young Arabs 2010
The Silatech Index: Voices of Young Arabs 2010The Silatech Index: Voices of Young Arabs 2010
The Silatech Index: Voices of Young Arabs 2010
 
United Arab Emirates ICT Survey
United Arab Emirates ICT SurveyUnited Arab Emirates ICT Survey
United Arab Emirates ICT Survey
 
The 500 Most Influental Muslims 2010
The 500 Most Influental Muslims 2010The 500 Most Influental Muslims 2010
The 500 Most Influental Muslims 2010
 
TNS Global: GEMs – Insights from Emerging Markets 2/2010
TNS Global: GEMs – Insights from Emerging Markets 2/2010TNS Global: GEMs – Insights from Emerging Markets 2/2010
TNS Global: GEMs – Insights from Emerging Markets 2/2010
 
TNS Global: GEMs – Insights from Emerging Markets 1/2010
TNS Global: GEMs – Insights from Emerging Markets 1/2010TNS Global: GEMs – Insights from Emerging Markets 1/2010
TNS Global: GEMs – Insights from Emerging Markets 1/2010
 
Nowandnext.com: Trends & Technology Timeline 2010+ (infographic)
Nowandnext.com: Trends & Technology Timeline 2010+ (infographic)Nowandnext.com: Trends & Technology Timeline 2010+ (infographic)
Nowandnext.com: Trends & Technology Timeline 2010+ (infographic)
 
Oracle: Capitalising On The Digital Age
Oracle: Capitalising On The Digital AgeOracle: Capitalising On The Digital Age
Oracle: Capitalising On The Digital Age
 
Jonckers: Choosing A Srategic Sourcing Model For Localisation
Jonckers: Choosing A Srategic Sourcing Model For LocalisationJonckers: Choosing A Srategic Sourcing Model For Localisation
Jonckers: Choosing A Srategic Sourcing Model For Localisation
 
The Netsize Guide 2010 'Mobile Renaissance'
The Netsize Guide 2010 'Mobile Renaissance'The Netsize Guide 2010 'Mobile Renaissance'
The Netsize Guide 2010 'Mobile Renaissance'
 
A.T. Kearney: Internet Value Chain Economics
A.T. Kearney: Internet Value Chain EconomicsA.T. Kearney: Internet Value Chain Economics
A.T. Kearney: Internet Value Chain Economics
 
Burson-Marsteller: The Global Social Media Check-up 2010
Burson-Marsteller: The Global Social Media Check-up 2010Burson-Marsteller: The Global Social Media Check-up 2010
Burson-Marsteller: The Global Social Media Check-up 2010
 
comScore: Data Passport 1/2010
comScore: Data Passport 1/2010comScore: Data Passport 1/2010
comScore: Data Passport 1/2010
 

Recently uploaded

MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 

Recently uploaded (20)

MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 

Brainloop: Security Policy - Five Keys to User Compliance (White Paper)

  • 1. WHITE PAP ER Security Policy: Five Keys to User Compliance EXECUTIVE SUMMARY IT managers have long suspected: users, as they naturally go about trying Business users are a key part of a company’s security, and even the most conscientious employees can introduce serious breaches (52%)1 of security policy. IT can do everything security policy. in its power to secure the company’s confidential documents — provide first-class IT too often is portrayed as the security heavy, forced to try to halt such security infrastructure, develop reasonable security policies and engage in extensive security. Feeling these steps hinder their productivity, users go to great communication and training — yet still lengths to avoid or circumvent even the most reasonable security measures, people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users It is hard to blame the users; they are just trying to get their jobs done as to follow best security practices without even knowing it. people fail to comply. What more can IT do? The solution is to provide security without making it difficult for users to do their jobs. For example, if IT can offer easy group collaboration within a transparently secure setting, or eliminate the need for users to send sensitive documents by email, users can be as productive as ever, or even more so. And since the environment is inherently secure, users are following best security practices without even knowing it. In the paper that follows, you will find five ways IT can facilitate user productivity while automatically ensuring safe security practices. In each case, users are unhindered by security procedures, yet their work is conducted in a transparently secure environment. Even better, the environment actually streamlines processes and improves efficiency, leading users to make it their preferred work environment. 1 Evade and Ignore Security, Ponemon Institute, June 10, 2009
  • 2. White Paper – Security Policy In some cases, such as those involving negotiations [see #3 below], the secure environment actually gives workers a distinct advantage. And as people experience the advantages of working within such an environment, advantages like increased efficiency or negotiation leverage, they readily return to make use of these advantages. Suddenly, IT no longer needs to force compliance with document security procedures. Users willingly comply, often without even realizing it. The following table illustrates unsafe behaviors resulting from human factors that can be reduced or eliminated through a transparently secure environment, which also makes work easier or more efficient for the users. In all the cases above, security is built into the online environment of a security issue. Business Practice Mitigation Strategy People often use email where delivery A central document repository isn’t assured or can be intercepted eliminates the need to send 1 Group collaboration on doc- unsecured emails uments, presentations, analysis Easy to accidentally send to the wrong person with a similar name No need for multiple versions distributed among group members Unauthorized forwarding of Put usage restrictions on documents: documents disable printing or forwarding 2 Project collaboration Never sure who has seen the material Share large files with vendors, contractors, Ensure all have the most recent version offsite employees Track receipt and viewing Accelerate workflow Difficult to prevent documents from Due diligence documentation in the 3 Confidential bidding being leaked to unauthorized parties secure environment is protected and negotiation Difficult to gauge interest level Able to see which bidders have read the documentation most thoroughly Users take files home or with them on a Safe, convenient remote access to USB, running the risk of loss of the USB centrally stored and secured files 4 Traveling or multi-location and its contents No need to copy files to USB or synch workers May require use of a cumbersome VPN to laptop Need to continually synch systems Documents are at risk during distribution Secure access to all documents by email or as paper documents via delivery Enables confidential online voting 5 Boardroom minutes / services Sensitive communications Eliminates risk and expense of courier No effective decision-making structures services outside of scheduled meetings
  • 3. White Paper – Security Policy The business advantages of a transparently secure work space quickly become clear: Increased productivity through easy group collaboration that removes version management hassles Improved security and productivity through the elimination of email mix ups and crossed, delayed, and lost messages, which not only reduces business risk but also cuts down the amount of email flooding into users’ mailboxes that must be managed Improved communication in collaboration and bidding processes through the identification of which documents have been accessed and by whom, spotlighting the most interested parties and pinpointing uncompleted tasks Increased mobile efficiency by avoiding the tedious chore of synching documents between desktop, laptops, and mobile devices when traveling since all the data is available via the Internet anytime in the secure work space Improved governance efficiency by creating an audit trail of accesses and changes to documents that address corporate policy or are required for regulatory compliance Reduced need for costly, time-consuming, and inconvenient travel and shipping physical documents From the IT perspective, the deployment of a secure work space eliminates the need to enforce heavy-handed security policies on reluctant users. Instead, the policies are enforced transparently and automatically, resulting in better security while reducing tension between IT and users. For everyone — IT, users, and the business — it becomes a win-win-win situation. IT doesn’t have to play the security heavy, users don’t feel burdened but actually feel more productive, and the business gets better security and increased productivity. Appendix: Brainloop Secure Dataroom users inside and outside your company. Top encryption, sophisticated security About Brainloop documents and enabling document sharing and collaboration among authorized unauthorized users. Frequent uses include contract negotiations, project
  • 4. White Paper – Security Policy CONTACT Brainloop Inc. Brainloop AG One Broadway, 14th floor Copyright © 2009 Cambridge, MA 02142 · USA 81669 Munich · Germany T: +1 (800) 517 317 1 info@brainloop.com info@brainloop.de www.brainloop.com www.brainloop.de Copyright © 2009, Brainloop Inc. All rights reserved. Brainloop and the “brainball” logo are trademarks of Brainloop AG. All other trademarks mentioned in this document are the properties of their respective parties.