Solved

secure Enterprise Collaboration Tool

Posted on 2014-04-07
14
388 Views
Last Modified: 2014-05-06
we need a tool for the following purposes: secure file sharing and collaboration,secure dataroom,secure mail,etc.
is there a tool that fullfills those needs?
0
Comment
Question by:DukewillNukem
  • 7
  • 7
14 Comments
 

Author Comment

by:DukewillNukem
Comment Utility
i found Brainloop meantime. Looks good,any other suggestions?
0
 
LVL 61

Expert Comment

by:btan
Comment Utility
Microsoft Sharepoint seem to came in as first thought but I suggest others though as it can be quite deployment and PKI centric to get working right at first round, Azure may be one but did not explore further. Most of it leads to cloud to collaborate as baseline and security is then layered over.

Yammer - online private social network with secure hardening protecting those required collaboration services (features). It support Office365 too.

Huddle - can be accessed online, on desktops via Microsoft Office applications, on the move with BlackBerry, iPhone and iPad apps. They preached to be Sharepoint alternative . They do have the security collaboration measures as well

Highq - enterprise-grade collaboration platform that can provide data room solution with over 10,000 transactions completed in the legal, banking and corporate sectors. Like security assurance is claimed too for high availability and diligence

Probably it is not only down to cost but platform agnostic can be bonus, we tend to stay conservative for putting everything to the cloud. Building a private cloud is another good question to poll above provider - and that can differentiate the leader and normal chaser
0
 

Author Comment

by:DukewillNukem
Comment Utility
these are great proposals! which would you prefer-and why?
check that brainloop,that seems to be an awesome tool.
0
 
LVL 61

Expert Comment

by:btan
Comment Utility
Yap Brainloop seems to be like Huddle, and probably more with its DRM layered. I tend to see all equal since we are none wiser to guess or anticipate how good and comprehensive they can be. Safely, I will say that they fulfill all you needs but the support and upgrade in tier fashion may be the bonus - we do want to start with small user based as trial and move to larger wins only the small wins gotten some ROI :)

 I tend to look for their pricing pack and capability - Highq tends to list it well, so does Huddle has a list, yammer has a list but not explicitly clear from first glance on the variety. Brainloop does not seem so open from its website and request for customer service - looks like going to cost a fair sum.
0
 

Author Comment

by:DukewillNukem
Comment Utility
good statements!
the quality of a product/company always shows up then we you need serious support.
therefore,the price itself is not so relevant to us-but the features:

instead of emailing large files,our users want to share big-and confidential data with their customers. a secure dataroom (which will be deployed in our datacenter) ensures that the data stays in our company.
therefore, whatever we choose-the tool must deliver a high secure standard.

we do have good technologies in place,but its not really secure.....
0
 
LVL 61

Expert Comment

by:btan
Comment Utility
good to engage the Huddle and Brainloop to "fish" out the value adds and differentiator - is it really just DRM, it will be interesting to know how they handle incident and patching without any claims of invalidating and data loss from customer end - but keeping us well informed still.

Also if serve to protect privacy, any other caveats if time comes to a call from the security agencies make it a mandatory letter to grab some data - so is it really full privacy especially if you going to house your cloud with your customer data and even as a private cloud
0
 

Author Comment

by:DukewillNukem
Comment Utility
do i understand you right: good is not really complete solution? i think,its a good product,but doesnt fulfill all our  (security) needs...
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 
LVL 61

Expert Comment

by:btan
Comment Utility
I will say they have the security capability but they need to verify though we trust their offering. No worries, can still approach these candidates, just be wary of the sales side, and not be easily taken and swayed over by what you really need, not what they want you to have. Best they can share security certification that it is compliance with regulation and standard
0
 

Author Comment

by:DukewillNukem
Comment Utility
but isnt Good Solutions rather for email stuff?
theres a feeling that tells me it might not be enough to fulfill BYOD security
0
 
LVL 61

Expert Comment

by:btan
Comment Utility
The collaboration service is functional and has its own security measures, but the mobile hardening and security for the device required separate mobile device mgmt and mobile apps mgmt provisioning, those solution definitely not prime MDM and MAM provider which in a case will be more suited for managed mobile device.

For BYOD, MAM will be key to make sure enterprise apps data on the device segregate from personnal data. That is big topic hence I rather you focus on the baseline need for secure coallaboration first. You can be tough finding one size fit all - maybe they have and as mentioned we are none wiser
0
 

Author Comment

by:DukewillNukem
Comment Utility
are you saying to keep Good as a collaboration service and secure that one as much as possible,but do mobile hardening and security go for MAM? i want to deploy MAC-filtering on mobiles,i dont know it Good can do that.
MAM as a enterprise apps data repository is certainly we want to deploy.
0
 
LVL 61

Expert Comment

by:btan
Comment Utility
Goods may not be the prime collaborative service provider, they are specialised in securing (or containerisation of) the apps but may not provide all the required collaboration services  protfolio like dataroom, whiteboarding, discussion room, distributed project sharing of info real time etc. maybe good to poll them for the possible services

...for mobile MAC, it is more of UUID or device id, it tends to be more of MDM capability than MAM, since the latter is protect apps. I know there are some that detect for root device and prevent execution or even have the virutal mobile OS embedded with the apps (after containerisation or using the MAM SDK API) to stop starting or running  when environment changes. Nonetheless, it is always to start off with trial user and managed device before ventruing into full BYOD fashion. Loss of device and leakage of corporate info into cloud service are costly to recover compared to being flexible and over mobile. Remote wipe is essential to handle case of loss of device where possible.

Seems like we are going off the question :)
0
 

Author Comment

by:DukewillNukem
Comment Utility
so,yes.what could be a solution then?
0
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
Comment Utility
two way to secure (1) secure cloud service and (2) secure device mgmt, they are two separate provider - yet to see a all in one and we will want to have a balanced and have best of breed where possible. I suggest focus on the business for collaboration first as most likely you will be in the BYOD situation and secure device mgmt tends to be more managed enterprise device and apps which may not be user friendly for now.

So go for (1) that is Highq or Brainloop as discussed then later stage with buy in probe the provider any partnership with MDM. Just trying to gain small steps rather than big bangs first
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now