Who Is

watching out for you?

In today's world you need to understand a few more things...

Who Is

knocking on your virtual front door?

It could be someone down the block or from the Bloc

How do you balance the needs of the end user with the needs of the company?

Scott Baker, HP

21-Apr-2015 Managing Bring your own IT.

How do you protect your information on devices at the edge of the enterprise, while fulfilling calls for file integration and sharing?

If you make it too difficult, end users will find unsecured workarounds. If you leave it too open, your information won’t be safe, and you might break laws.

“This is an evolution of a product HP has had on the market for some time, focused on backup and recovery,” said Scott Baker, Director, Information Management Marketing, HP Software. “Connected MX marries parts of the industry companies have struggled with. From users’ perspective it’s convenient and easy to use. It also provides control to protect information, without heavy handedness that blocks end users.”

A single solution managed from a central location, it contains an analytics engine based on HP OnDemand. Policies of movement of information are predicated on the content it may or may not contain. File synchronization and analytics are the key differentiators around how mobile your data is allowed to be.

“For example if I wanted to share a file with you that had a Date of Birth and government ID number, the analytical engine would analyze that file, see identifiable info, and recognize that kind of info cannot be shared,” Baker said. “Those rules are completely flexible. Warn me first, allow me to specify why you’re sharing, then allow. Or deny it to be shared externally.”
The concept came from the HP security team and legal officers (who deserve recognition for building in security). Administrators can apply policies to control access at company, individual or group levels. Searching tools can be used for regulatory issues and to identify documents as part of case discovery. They can also identify information custodians for certain types of content or documents.

The product is for mid-size organizations to enterprise, especially those with mobile workforces.
“Bring Your own IT is the new way, and this is trying to overcome that,” said Baker.

Typically IT directors are challenged with users sharing information. The director might set policies and programs that forced setting up an FTP site. A user then had to figure out how to upload files. If it became too complex, the user might decide instead to set up a Dropbox with a few clicks.

End users aren’t supposed to take on corporate responsibilities about knowing what can be shared and what can’t.

“This product offloads the responsibility from end users to administration,” Baker said. “Right click backup, right click restore, right click share, makes adoption of enterprise service much easier to the end user. Not that we’re trying to win them over – we’re trying to make them more convenient, like a consumer grade product.”

Creation of a central information hub allows administrators to terminate access from a central location, making information no longer available from any device.
“Users are demanding faster turnarounds on projects,” said Baker. “They’re looking for anything to make the business units they work for more productive. They take on responsibility, sometimes unwillingly, and may not always know what’s best for the company. How do you balance the needs of the end user with the needs of the company? That’s the goal.”

The product goes into a file to analyze information within. It’s designed so that if you put up a binary file to look for particular patterns, it matches personally identifiable information. Policy settings apply granularity to the file level for establishing rules regarding backup, restoration, and sharing, based on file type.

Future versions are expected to offer capability for organizations to open their own search patterns. Users will receive a warning to justify that particular share.

A patented algorithm minimizes the amount of traffic that goes across the wire. It can also specify in rules how information flows on a metered – such as cell phone – connection.

Data is encrypted using a 256-bitAES algorithm that is always on, protecting data while being moved. Invisible to users, there’s no need for users to have keys or password control.

“And all of this is benign to the end user, who has one folder,” Baker said. “Log in to your Connected MX location from any device using a web-based interface. See a file, open it, and view it if allowed. Users can also create individual rules, provided IT has given them the ability to do so, and those rules don’t violate policies. I can add my external hard drive, for instance. From an endpoint device perspective it will back up any Windows laptop and Mac when supported. It uses continuous protection, without scheduled backup. It looks for opportunities when processing time is low to run backups.”