secure Enterprise Collaboration Tool

we need a tool for the following purposes: secure file sharing and collaboration,secure dataroom,secure mail,etc.
is there a tool that fullfills those needs?
DukewillNukemAsked:
Who is Participating?
 
btanConnect With a Mentor Exec ConsultantCommented:
two way to secure (1) secure cloud service and (2) secure device mgmt, they are two separate provider - yet to see a all in one and we will want to have a balanced and have best of breed where possible. I suggest focus on the business for collaboration first as most likely you will be in the BYOD situation and secure device mgmt tends to be more managed enterprise device and apps which may not be user friendly for now.

So go for (1) that is Highq or Brainloop as discussed then later stage with buy in probe the provider any partnership with MDM. Just trying to gain small steps rather than big bangs first
0
 
DukewillNukemAuthor Commented:
i found Brainloop meantime. Looks good,any other suggestions?
0
 
btanExec ConsultantCommented:
Microsoft Sharepoint seem to came in as first thought but I suggest others though as it can be quite deployment and PKI centric to get working right at first round, Azure may be one but did not explore further. Most of it leads to cloud to collaborate as baseline and security is then layered over.

Yammer - online private social network with secure hardening protecting those required collaboration services (features). It support Office365 too.

Huddle - can be accessed online, on desktops via Microsoft Office applications, on the move with BlackBerry, iPhone and iPad apps. They preached to be Sharepoint alternative . They do have the security collaboration measures as well

Highq - enterprise-grade collaboration platform that can provide data room solution with over 10,000 transactions completed in the legal, banking and corporate sectors. Like security assurance is claimed too for high availability and diligence

Probably it is not only down to cost but platform agnostic can be bonus, we tend to stay conservative for putting everything to the cloud. Building a private cloud is another good question to poll above provider - and that can differentiate the leader and normal chaser
0
The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

 
DukewillNukemAuthor Commented:
these are great proposals! which would you prefer-and why?
check that brainloop,that seems to be an awesome tool.
0
 
btanExec ConsultantCommented:
Yap Brainloop seems to be like Huddle, and probably more with its DRM layered. I tend to see all equal since we are none wiser to guess or anticipate how good and comprehensive they can be. Safely, I will say that they fulfill all you needs but the support and upgrade in tier fashion may be the bonus - we do want to start with small user based as trial and move to larger wins only the small wins gotten some ROI :)

 I tend to look for their pricing pack and capability - Highq tends to list it well, so does Huddle has a list, yammer has a list but not explicitly clear from first glance on the variety. Brainloop does not seem so open from its website and request for customer service - looks like going to cost a fair sum.
0
 
DukewillNukemAuthor Commented:
good statements!
the quality of a product/company always shows up then we you need serious support.
therefore,the price itself is not so relevant to us-but the features:

instead of emailing large files,our users want to share big-and confidential data with their customers. a secure dataroom (which will be deployed in our datacenter) ensures that the data stays in our company.
therefore, whatever we choose-the tool must deliver a high secure standard.

we do have good technologies in place,but its not really secure.....
0
 
btanExec ConsultantCommented:
good to engage the Huddle and Brainloop to "fish" out the value adds and differentiator - is it really just DRM, it will be interesting to know how they handle incident and patching without any claims of invalidating and data loss from customer end - but keeping us well informed still.

Also if serve to protect privacy, any other caveats if time comes to a call from the security agencies make it a mandatory letter to grab some data - so is it really full privacy especially if you going to house your cloud with your customer data and even as a private cloud
0
 
DukewillNukemAuthor Commented:
do i understand you right: good is not really complete solution? i think,its a good product,but doesnt fulfill all our  (security) needs...
0
 
btanExec ConsultantCommented:
I will say they have the security capability but they need to verify though we trust their offering. No worries, can still approach these candidates, just be wary of the sales side, and not be easily taken and swayed over by what you really need, not what they want you to have. Best they can share security certification that it is compliance with regulation and standard
0
 
DukewillNukemAuthor Commented:
but isnt Good Solutions rather for email stuff?
theres a feeling that tells me it might not be enough to fulfill BYOD security
0
 
btanExec ConsultantCommented:
The collaboration service is functional and has its own security measures, but the mobile hardening and security for the device required separate mobile device mgmt and mobile apps mgmt provisioning, those solution definitely not prime MDM and MAM provider which in a case will be more suited for managed mobile device.

For BYOD, MAM will be key to make sure enterprise apps data on the device segregate from personnal data. That is big topic hence I rather you focus on the baseline need for secure coallaboration first. You can be tough finding one size fit all - maybe they have and as mentioned we are none wiser
0
 
DukewillNukemAuthor Commented:
are you saying to keep Good as a collaboration service and secure that one as much as possible,but do mobile hardening and security go for MAM? i want to deploy MAC-filtering on mobiles,i dont know it Good can do that.
MAM as a enterprise apps data repository is certainly we want to deploy.
0
 
btanExec ConsultantCommented:
Goods may not be the prime collaborative service provider, they are specialised in securing (or containerisation of) the apps but may not provide all the required collaboration services  protfolio like dataroom, whiteboarding, discussion room, distributed project sharing of info real time etc. maybe good to poll them for the possible services

...for mobile MAC, it is more of UUID or device id, it tends to be more of MDM capability than MAM, since the latter is protect apps. I know there are some that detect for root device and prevent execution or even have the virutal mobile OS embedded with the apps (after containerisation or using the MAM SDK API) to stop starting or running  when environment changes. Nonetheless, it is always to start off with trial user and managed device before ventruing into full BYOD fashion. Loss of device and leakage of corporate info into cloud service are costly to recover compared to being flexible and over mobile. Remote wipe is essential to handle case of loss of device where possible.

Seems like we are going off the question :)
0
 
DukewillNukemAuthor Commented:
so,yes.what could be a solution then?
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.