Thursday, December 15th, 2011

Simplifying Cloud Content Security for End Users and IT

By

We take the security of your information very, very seriously at Box – it’s where we spend a disproportionate amount of our time and energy. But we’re also strong believers in building simple, intuitive software that end users can actually use. Legacy solutions have traditionally pursued security through information lock-down, making sharing and collaboration virtually impossible and forcing workers to find (often unsanctioned) tools elsewhere.

At Box, we live at the intersection of simplicity and security. We’re always striving to find the balance between providing the flexibility that end users want, with the visibility and control that IT departments need. It’s a tough mission. And as Box has moved further upstream in the enterprise, with adoption in 82% of the Fortune 500, the demands and challenges of IT departments have grown.

Today, we’re excited to announce a wide range of updates that support the new ways that people are working, while giving IT departments unprecedented visibility into how content is moving within and beyond their organizations.

First up, we’re rolling out smart shared links over the next week. Sharing is absolutely core to what we do here at Box, and workers increasingly need to share securely with parties outside their business: vendors, partners, customers, etc. With smart shared links, we’ve enhanced the security permissions on Box’s popular grab and share link feature to make it easy to dictate who can access what content. For example, you can restrict access to colleagues within a company domain, or to collaborators within a specific folder. This option can be set at various levels including on individual files, at the folder level, by the folder owner or by the administrator for an entire enterprise. This feature is an industry first, illustrating our commitment to providing comprehensive security controls for your most important content.

Today’s employees are not only working with a lot of different collaborators, they’re also working from a lot of different devices. According to Gartner, smart phones and tablets will account for 90 percent of device adoption growth in the next four years. As enterprises increasingly embrace a ‘bring-your-own-device’ (BYOD) policy, it should come as no surprise that security and access permissions are critical considerations for today’s CIO. To this end, we’ve updated our popular Trusted Access Management feature. IT admins can now track logins from mobile devices, desktops via Box Sync and custom apps via Box APIs. In addition to tracking logins and alerting users to new access instances, IT admins can now limit the number of devices an employee can access from the same user ID.

And to help enterprises of all sizes easily make the transition to Box easier than ever before, we’re also introducing Groups Active Directory Synchronization. For Box accounts that are linked to their company’s Active Directory (AD), IT admins can now opt to have their AD groups automatically populated within Box. When users log into Box, they will be added or removed from Box groups based on their AD groups. Admins can create new groups in Box from AD, add users to a Box group or remove users from a Box group.

To provide better management at scale, we’re also announcing a new Intel relationship with feature integrations that simplify how admins manage user permissions and group access through Single Sign-On (SSO) and authentication. Via Intel Expressway Cloud Access 360 (ECA 360), administrators can automatically provision Box accounts, leveraging existing identity repositories and enable federated SSO to Box. This integration helps eliminate the need for additional authentication and adds another layer of user convenience to the Box platform.

Whew, that’s quite a lineup of updates, I know. But at Box, we believe that 2012 will be a transformative year for enterprise software, as businesses of all sizes, all over the world make the transition to the cloud. They’re only going to make this shift once, and we want to support them with a cloud content management solution that is flexible and intuitive, but also incredibly secure.

We’d love to hear your feedback on these new features – remember to stay tuned for some killer updates in early 2012. Otherwise, happy holidays!

  • http://bestbusinessbrands.blogspot.com/ Best Business Brands

    te

  • Guest

    I like the Box but no the cloud. One word for the company Box “Encryption”. The problem is not: Who is seeing my files. Is who, without autorization can see the files.

    For those people want a lot of security. Why dont sell a security token? With this key you can know: If have permission to see the file, Who, From, When and How.

    What type of token key? Some may store cryptographic keys, such as a digital signature, or biometric data, such as fingerprint minutiae. Some designs feature tamper resistant packaging, while others may include small keypads to allow entry of a PIN or a simple button to start a generating routine with some display capability to show a generated key number. Special designs include a USB connector, RFID functions or Bluetooth wireless interface to enable transfer of a generated key number sequence to a client system.

    Blackberry was a great seller, because (apart of good, cell phones) the encryption used by the BlackBerry network.