Secure mobile collaboration

Smart devices such as iPads and Androids are being embraced by
New Zealand to realise the potential for a user who now has a
choice on how, where and when they would like to work. To gain
this capability and user freedom businesses are considering
"Bring You Own" computing. Many organisations have been unable to
stem the growing tide of user's personal devices already on
their networks.

Allowing any device to connect to your network is liberating

Allowing any device to connect to your network is liberating for
the user but presents a business problem for the company's data
which users need to access, collaborate and save whilst mobile
and outside of the network. Historically determining the
boundaries that the data could travel within has been an easy
decision, as it was predominately accessed  inside the network
on a company device, where company policy and management could
be applied.

What are the implications of DIY cloud services?

With this requirement now being user driven the tools they have
as consumers to share data, such as DropBox, are being
introduced into businesses with often no planning or
consideration of the implications of using this type of DIY
consumer grade cloud service.

Users can securely download, edit, collaborate and save company
documents on mobile devices

From MPA's experience with company data being mobile, the
requirement to control, audit, collaborate and work securely on
company documents whilst addressing the demands of the user, is
critical. Using Accellion Mobile Secure Collaboration users can
securely download, edit, collaborate and save company files on
their mobile devices through a secure workspace. This secure
workspace is provided, managed and audited within their
organisations network whilst adhering to company's data security

MPA Guide to secure mobile collaboration

For a copy of the MPA's 5 step guide to secure mobile
collaboration please contact

Latest Security Problems Solved

Privileged Password Management - Pitfalls to consider More >
SIEM matures, however landscape changes. More >
2014: The Year Encryption Comes of Age More >
The key to a secure BYOD-enabled enterprise More >
Our Solutions
Security Solutions

We work with leaders in the fields of data protection, authentication and perimeter security to protect your organisation and manage any threats with the most effective security systems. More >

Technical Services

MPA New Zealand Ltd provides a range of technical services to compliment the vendor technology our company brings to the local market. More >