Secur Your Social
Enviado por maximoespinoza77 • 6 de Abril de 2014 • 1.683 Palabras (7 Páginas) • 215 Visitas
Secure Your Social
Organization with
HootSuite Enterprise
Secure Your Social Organization
with HootSuite Enterprise
2
Introduction
In this guide, you will gain an understanding of the key technical considerations
when evaluating a social relationship platform to meet your organization-wide
requirements, including:
XX Governance
XX Security
XX Compliance
XX Scalability
XX Platform Integration
Social media typically arrives in an enterprise company at the business unit level,
as various divisions create their own presences on public social networks. This
decentralized pattern is repeated when some business units adopt social relationship
platforms to manage growing numbers of accounts and users. However, most
companies don’t keep an overall inventory of customer-facing profiles, and their
security measures vary from department to department.
Without centralized ownership of corporate social media profiles, it’s nearly impossible
to prevent password sharing or even know which employees have access to which
accounts. Revoking or adjusting social media permissions is a constant source of
frustration for IT departments, who are called in to clean up issues that stem from a
variety of unconnected, unsupported systems. Company policies meant to ensure
regulatory compliance and brand standards are rendered meaningless by poor security
and account provisioning.
IT departments at large enterprises have recognized these threats and are beginning to
centralize social media with an organization-wide social relationship platform.
HootSuite Enterprise provides a secure environment for social media across every
device and department, allowing you to reap the rewards of enterprise-scale social
communication without overwhelming compliance officers or putting your brand at risk.
Secure Your Social Organization
with HootSuite Enterprise
3
Here’s how HootSuite Enterprise meets your
governance requirements:
FF Social Account Management
• Discover and organize company accounts.
• Persistently monitor social networks for
unauthorized and fraudulent accounts.
FF Organizational Flexibility
• Build role-based team structures that reflect the
way your company does business.
• Securely incorporate partners, contractors and
agencies into your enterprise’s social media
operations with granular control over publishing
and data access.
Governance
Effective social media governance can’t be achieved
through technology alone, but no policy or process
can work without a robust platform. Because
technology should map to the unique goals and
workflows of your organization, HootSuite Enterprise
has been built to enable any governance approach,
from a contained, centralized model to an entirely
dispersed, decentralized strategy.
FF Granular Permissions
• Safeguard valuable social assets with highly
customizable user permissions.
• Give managers as much or as little control as
they require over team member permissions or
social network accounts.
• Manage interns and contractors with publishing
approval queues.
FF Secure Profiles
Even the most experienced social media manager
can accidently select the wrong profile to publish
their personal message to, creating an acute brand
crisis. HootSuite Secure Profiles protects your brand
from careless human errors.
• Account owners can designate chosen social
profiles as “Secure” for their designated Team
Members.
• Team Members are prompted to manually
confirm messages before broadcasting to
secured profiles.
• Profiles are secured across all platforms,
including web, tablet and mobile.
XX The average enterprise has more than
178 social media accounts.
XX Only 49% of enterprises have a
centralized inventory of social assets.
Source: Altimeter Group
Secure Your Social Organization
with HootSuite Enterprise
4
Security
Your organization’s employees are bringing social
media into the workplace because it’s proven to
improve business results. Unfortunately, they’re
probably bringing some lax consumer attitudes
toward security along with them. They may create
weak passwords for social media accounts and
share them with coworkers. Complicating matters
further, they typically want to be able to access both
personal and business-related social profiles from
their own devices at any time. Consequently, social
media security must be an integral component of
every company’s bring-your-own-device (BYOD)
policy. Social media affects your entire organization’s
risk profile, so security can’t be left to individual
departments to figure out on their own.
Here’s how HootSuite Enterprise helps IT leaders
rationalize social media security:
FF Security Audit
HootSuite’s team of security experts can help your
organization safeguard your social accounts against
internal and external threats.
Identify potential social media security breaches
before they occur.
Audit current access levels on native social networks,
and migrate access to HootSuite’s secure
environment as appropriate.
FF Single Sign-On
Users with Single Sign-On gain access to HootSuite by
using their enterprise network identity, eliminating the need
for multiple passwords to multiple business applications.
Any enterprise network that supports Security
Assertion Markup Language 2.0 (SAML) can extend
user authentication for HootSuite accounts.
When an employee leaves your organization, your network
administrator can effortlessly revoke the employee’s
access to HootSuite through your Active Directory.
Top 5 Social Media Risks Identified by
Internal Auditors
XX Brand and/or reputational damage
XX Data security (company information)
XX Regulatory and compliance violations
XX Data leakage (employee personal information)
XX Viruses and malware
Source: Protivi
What is SAML?
This is an open standard
...