Securing Email Attachments: File Transfer Trends for 2014

 
 
By Chris Preimesberger  |  Posted 2014-01-17 Email Print this article Print
 
 
 
 
 
 
 
 

Despite the huge impact in the last five years of social networks, video conferencing and texting, email is still the killer app for most enterprise communication infrastructures. Email has also served as the main load-bearer for attached documents—a de facto file transport system for most organizations, a role it was never intended to play. As a result, large file transfers sent through email often impede efficient email server performance, resulting in slow message delivery times, higher storage costs, slower backups and slower restores. If file-size limitations prevent users from sending particularly large files through email, they will find alternative methods to send their content, which could drive up cost and sacrifice security. Alternatives that allow efficient and secure delivery of content are available. In this eWEEK slide show, Bill Ho, president of secure document delivery and synchronization software maker Biscom, outlines 10 trends in his sector that he believes will drive the cultural, policy, technology and regulatory discussions surrounding secure file transfer in 2014.

 
 
 
  • Securing Email Attachments: File Transfer Trends for 2014

    by Chris Preimesberger
    1 - Securing Email Attachments: File Transfer Trends for 2014
  • Anywhere, Anytime Access to Files Will Further Strain IT

    With every worker likely to have three, four or five mobile devices, 2014 will see IT work on defining parameters around the use of multiple devices on corporate networks.
    2 - Anywhere, Anytime Access to Files Will Further Strain IT
  • Big Data Analysis Will Mandate the Need for Secure File Transfers at All Levels

    Big data analysis will make businesses more productive, resulting in more file sharing and collaboration among employees, partners and customers. This will add to the complexity as IT works to accommodate increased demand.
    3 - Big Data Analysis Will Mandate the Need for Secure File Transfers at All Levels
  • Third-Party Apps Will Present Bigger Problems

    The threat of malware will increase through Trojan horse-type apps disguising themselves as innocuous apps. Hackers will use these new hacking techniques to up the ante and look to steal more important IP and enterprise research. Even children coming to work with parents present a problem as their applications and devices pose security risks on corporate networks. IT will look at ways to secure the IT environment.
    4 - Third-Party Apps Will Present Bigger Problems
  • Authentication Will Become Easier

    If users have to enter a PIN for every app they use, they won't bring the device in to be managed. The hunt will be on for less onerous authentication processes. The heavy lifting of authentication will be done behind the scenes, invisible to the user, and will integrate more biometric/fingerprint information for access.
    5 - Authentication Will Become Easier
  • New Compliance Rules Will Put More Emphasis on Reporting and Secure Fax Transmissions

    Small to large organizations will need to add processes and more reporting to accommodate new rules and regulations coming from industry and government into the marketplace.
    6 - New Compliance Rules Will Put More Emphasis on Reporting and Secure Fax Transmissions
  • Collaboration Widens Market for Secure File Transfer

    Employee reliance on collaborative workflows also will increase the pressure on IT to provide the infrastructure to meet these new demands.
    7 - Collaboration Widens Market for Secure File Transfer
  • Improved Productivity

    By doing more with the same or fewer resources, people will need to find ways to boost their productivity. With more self-service applications that reduce reliance on IT, users can get things done more quickly with better feedback and responsiveness as they share and collaborate with internal and external users.
    8 - Improved Productivity
  • Securing BYOD in the Enterprise

    Enterprise IT teams will have to find ways to enable access but maintain security as users expect to have anytime/anywhere access to corporate files, information and email. They also may be transacting business away from their offices.
    9 - Securing BYOD in the Enterprise
  • Cloud Reservations

    The cloud is great for many applications, but the more security-conscious organizations will still have reservations about comingling of data with potential data, vendor access to information and concerns about vendors giving up data to the National Security Agency. We will see many enterprises unwilling to give up control of their data, especially in highly regulated industries.
    10 - Cloud Reservations
  • Virtualization and FOIP

    More and more organizations will virtualize their fax environments. Companies have come to realize the cost savings and productivity benefits derived from deploying a FOIP (fax over IP) server that integrates with their existing equipment to route faxes over their IP network.
    11 - Virtualization and FOIP
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
Rocket Fuel