Box updates security features to boost user, device and content protection
Cloud storage vendor also announces partnerships with data loss prevention vendors
IDG News Service - Box is rolling out several new security features aimed at making its 150,000 business customers feel more confident in its cloud storage and file sharing service.
The new capabilities address end users, devices and content.
"Our high level goal is to meet existing and anticipate future requirements of enterprise customers in using our secure environment," said Whitney Bouck, enterprise general manager at Box. "These are things we know our customers will want to take advantage of."
At the end user level, Box will now let IT administrators have more granular control over granting or withholding employees' ability to share a folder with individuals outside of the company.
Previously, IT administrators were able to control this capability at a group level, but as of Monday they will be able to enable or disable this feature for individual users.
In an attempt to give IT departments more control over the devices employees use to access Box, the company will let administrators hand-pick approved smartphones, tablets or laptops. This feature, which Box calls "device pinning," will be available in the coming weeks.
To boost device security, Box will be one in the first wave of adopters of Samsung's new Knox security technology for its smartphones and tablets, which was announced on Monday at the Mobile World Congress in Barcelona. This is expected to be available next quarter, according to Box.
Another device-security enhancement is a new, algorithm-powered feature designed to detect suspicious log-in attempts, which is also slated for availability next quarter.
The new features are being added at no extra cost to the Business and Enterprise editions of the service.
For content security, Box is adding new partnerships with data loss prevention (DLP) vendors Code Green Networks and CipherCloud, which build upon a similar agreement with Proofpoint announced last year. These integrations with DLP systems let IT administrators establish policies and controls for the movement and distribution of corporate content via Box.
Box on Monday also announced the availability of its previously announced integration with GoodData's cloud-based business intelligence and analytics software.
Box's moves to boost its security features demonstrate an investment in its infrastructure that will allow enterprises and government agencies with strict security requirements to consider its product for content management and collaboration, said Alan Lepofsky, a Constellation Research analyst.
"This is a necessary step in Box's evolution to move beyond being just a file sync and sharing vendor," he said via e-mail.
Vanessa Thompson , an IDC analyst, said Monday's announcement is a good follow up to the security enhancements announced last year, and highlighted as particularly interesting the device-pinning feature.
Box, which is privately held, recently said that it grew its revenue 150% in 2012, compared with 2011, and that it added to its roster of large enterprise customers companies like Discovery Communications, Electronic Arts, Johnson Lambert, McCann Worldgroup, MGM Resorts International, Netflix, Nationwide and Random House. More than 15 million end users use the Box service. Box CEO Aaron Levie told Bloomberg in January that the company plans an IPO, probably for next year.
Juan Carlos Perez covers enterprise communication/collaboration suites, operating systems, browsers and general technology breaking news for The IDG News Service. Follow Juan on Twitter at @JuanCPerezIDG.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts