Beruflich Dokumente
Kultur Dokumente
White Master
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
Reduce travel costs Increase productivity Decrease security and compliance risk
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
Adobe on Adobe
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
Engagement
Need to communicate Need to deliver rich content Need to check is everyone still there? Need to gather feedback Need to get people involved
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
Security Challenges
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
Compliance Challenges
FISMA (US)
HIPAA (US)
Health Insurance Portability and Accountability Act Security and privacy of patient health data
Federal Information Processing Standard Security standards the specify requirements for cryptography
Joint Interoperability Test Command Certification of technology that pertains to branches of the government and armed services
BASEL II (EU)
MiFID (EU)
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
10
1.1 billion
PCs and devices
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
11
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
12
MANAGED ACCESS Users must authenticate to enter Pre-approved access lists Guest access restrictions Auditable access
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
13
ADOBE FLASH PLAYER Installed on 99% of connected desktops Proven footprint Constantly scrutinized by security experts Hardened against threats
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
14
ON-PREMISE DEPLOYMENT Run behind your firewall Full control over access, upgrades, and deployment options MANAGED HOSTED DEPLOYMENT Third party hosting for FISMA or SIPR requirements
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
15
SINGLE PORT SOLUTION Secure implementations support SSL over port 443 Data encryption over a secured connection
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
16
VOIP PROTECTS CONFERENCE CALL VOIP is integrated into every room Prevents unauthorized eavesdropping Can be extended to Premiere Global Teleconferencing Bridge Bridge calls attendees
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
17
SECURE ACCESS TO SHARED CONTENT File storage and sharing is controlled Many types of files can be stored in room and delivered to attendees Auditable access to shared files
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
18
AUTHENTICATION OPTIONS PKI Authentication Single Sign-On Authentication Active Directory / LDAP Authentication MEETING ACCESS CONTROL Users can be required to log in with system accounts to access any meeting Meeting Hosts can remove guest access to specific meetings
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
19
COMPLIANCE & CONTROL OPTIONS Disable and restrict user activities at the account level Clear private data Audit Communications
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
20
What
Enable Admin to lock down certain options or pods system-wide Enable Admin to exert greater control and comply with internal/external policies Enable Hosts to deny access to Guests or specific users Leading organizations expect compliance support from enterprise software vendors Compliance applies to regulated industries (FinServ, Healthcare, Gov) and beyond (any public company subjected to SOX)
Why
How
Connect Pro 7:
Deliver built-in features to enable/disable features, system-wide Allow for automated, administrative recording and logging of communications
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
21
Retain electronic communications Force recording settings Control communication flows Block Guests Access Role-based room access entitlement Generate chat transcripts Recording notice and disclaimer
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
22
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
23
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
24
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
25
Secure Web Collaboration Defense Connect Online Defense Connect Online leverages Adobe Connect Pro for Adobe Acrobat Connect ProWeb allows agenciesportals to both their Secure and Non-Secure Collaboration
accomplish secure web collaboration Utilizes Web Services API through two methods:
CAC Authentication* FIPS 140-2 SSL** Custom Portal Custom Content rules
User Activity
* CAC Authentication - PKI based token used on Non-Secure portal only ** Leverages F-5 SSL Accelerator
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
2
26
GRAPHIC
Challenge Need to enable secure, real-time collaboration for the armed services Solution
Solution
Detail
Enabled secure, cross-platform collaboration that works in hostile, low-bandwidth environments Increased efficiency of soldier planning debrief sessions Decreased the total cost of ownership for the DOD
Results
Detail
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
27
Increased safety of U.S. food supply through disaster planning Shortened life cycle of food recall Met evolving set of requirements Enhanced communication and collaboration via web and mobile
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
28
Summary SECURITY User authentication required Secure transmission of data protects privacy Hosted or on-site deployment provides options that fit your security needs CONTROL User accounts are unique Meeting Hosts can control guest access Compliance settings allow control over chat, recordings and pods
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
30
Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe confidential.
31