CV_Playbook_14

integrity in communications, helping manage transformation, governance and compliance. Unfortunately, just as no form of security software works in a flawless vacuum, the very concept of collaboration software is not without its own unique challenges. Ever-Changing Tech With the growing evolution of communications technology and how it is transmitted, holes are constantly left open for malicious actors to expose. This threat consistently uncovers significant risk for sensitive business information, critical dialogue and private employee data. Plus, to further compound the issue, most attacks do not occur within the short, closeable window of the actual session. “Most people don’t know that the average hack lasts three to six months,” said Nace. “Monitoring for a collaboration security risk is so much more of a long-term investigation into the habits and tendencies of stakeholders than people realize.” For this reason, Telesystem pro- motes a full “white-glove” approach characterized by extra-special – and specialized – attention to the smaller details that most self-policing enterprises miss. “It’s so important to have somebody do the heavy lifting,” Nace continued, noting that companies such as Telesystem “provide the expertise that the end user might not have.” And as more groups shift to reliance on remote collaboration tools, a false feeling of bravado can have devastating side effects. Proper Data Governance Hubris aside, the increasing number of instances of reliance on remote collaboration software has exposed yet another vulnerability for cyber criminals to exploit. “The move to remote collaboration tools poses risk for online security, such as how organizations try to protect data,” said Jason Beal, AvePoint senior vice president of global channel and partner Ecosystems. “Whether it’s on-premises or in the cloud, there is so much access to data, and that requires governance as far as who can access what and share what. If you don’t have the right governance or the right policies, it will lead to storage inefficiency.” And inefficiency could be an at-best scenario. “From the user perspective,” Beal continued, “it’s a whole new set of risks.” According to the executive, common issues such as lax data-loss prevention practices, info sprawl and other storage defects only continue to open the door to third-party penetrators. With the trend toward vendor consolidation, data maintenance has become even more complex, often lending to massive, often difficult-to-manage info stores, at best, and problematic, exposed data sprawl, at worst. This trend, it should be noted, is where AvePoint’s executives believe its collaboration security options truly excel, with several products and platforms that aim to reduce a lot of the costs and headaches associated with problematic data governance. Importance of Proactivity Perhaps more than any other aspect of collaboration security, the critical need to stay proactive – or paying one to react in real-time on the organization’s behalf – cannot be underscored. “I think this is an area that is finally starting to get some attention,” observed Bill Wootton, founder and president of C3 Integrated Solutions. C3 is a government contractor IT company and managed service provider partner of AvePoint, with a staff of consultants who work to recommend best-case technology for clients. “We have an incredible opportunity to collaborate and share, both within and outside of our organization. But the security side tenses up.” “How do I know what I’m sharing, who can see it or if who is seeing it, should be?” he continued. The only clear answer is to have 24x7 anti-fraud measures in place. “I see it as more of a real-time versus reactive mindset,” said Nace, who believes that too many organizations are willing to sit back and wait for a breach to occur, all the while not comprehending the nature of how most collaboration-related hacks go down. In contrast, Telesystem’s approach is to provide a multi-faceted playbook of options for the end user, including real-time, back-end monitoring and – outside of normal calling patterns – making sure the session is shut down. Nace believes that the optimal combination to stay safe is three-pronged. They include frequent password changes; end-of-session logouts, to keep sessions from floating online; and maintaining SOC compliance, regularly monitoring for unwanted activity. Unexpected Sources While many tend to get visions of spy movies with ultra-intelligent hack26 THE CHANNEL MANAGER’S PLAYBOOK

RkJQdWJsaXNoZXIy NTg4Njc=