Cloud App Usage vs Data Privacy Survey:

Size: px
Start display at page:

Download "Cloud App Usage vs Data Privacy Survey:"

Transcription

1 Cloud App Usage vs Data Privacy Survey: Despite Concerns Over Data Security, Cloud-based App Use Prevalent

2 Overview While most business professionals are worried about the security of cloud-based applications, they aren t deterred from using them to store their personal and professional data, and they aren t losing sleep over their data and information, according to a recent survey from SafeMonk. When SafeNet Labs, a technology incubator created by SafeNet, Inc., asked hundreds of business professionals worldwide if they were worried about the security of the cloud-based applications or data stored in the cloud, 52 percent checked yes; however, sixty-four percent of respondents still said they frequently use cloud based apps to store their personal and professional data. Ironically, when asked what keeps them up at night regarding their data and information, more than half answered, nothing keeps me up, I sleep like a baby. services despite company policies against it (33 percent of C-level titles said yes versus 18 percent of associates). The majority of respondents - 59 percent - said they wouldn t be surprised if they found out that their boss or executives were using file sharing apps like Dropbox, despite a policy against doing so. In general, C-level executives (39 percent checked yes) are less concerned about security in the cloud than associates (54 percent checked yes). Further examination of the survey data shows that the higher a person is on the corporate ladder, the more they use file sharing services like Dropbox, and they are more likely to use file sharing C-Levels Less Concerned with Security, More Apt to Bend Rules Against Cloud App Usage

3 Location also factors into respondents attitudes about data security in the cloud. For example, the usage of cloud-based apps is far greater in EMEA than in the U.S. or APAC, so too are the levels of concern about data security and corporate policies against using cloud apps. However, EMEA respondents are more likely to ignore those very same policies. Who they are concerned about also varies: when it comes to their data privacy, respondents in the U.S. and EMEA are most concerned with the government, while APAC is most concerned with Google. Additionally, APAC respondents are the group most kept up at night when it comes to their data and information, worrying that it will be maliciously exploited. Overall, 52 percent of respondents are most concerned with someone hacking into their banking and financial apps. The systems most frequently used respondents for file storage are Dropbox (39 percent) and desk drawers (25 percent); and continues to be the dominant means for sharing files (68 percent), according to the data. What this survey suggests is that cloud app usage and document storage continue to proliferate, and that organizations should reexamine antiquated attitudes towards usage of these apps across the enterprise, said Tsion Gonen, Chief Strategy Officer, SafeNet, Inc. It s clear that top-level executives understand the advantages of cloud app usage, and should enable their companies to leverage these advantages by adopting contemporary security tools and practices.

4 Do you frequently use cloud based applications (ie. Banking, business applications, social media, etc)? 64% 25% 11% Yes No WTH is a cloud based application?

5 Do you store any personal or professional data in the cloud? 14% 3% 55% Yes 28% No I think so Not Sure

6 Are you worried at all about the security of the cloud-based applications or data stored in the cloud? 15% 53% 32% Yes No Still trying to figure out what cloud is

7 Of the applications that you use, which are you most concerned about someone hacking into? 9% 14% 8% 0% 17% Banking Application 52% File Storing / Sharing Application None of the Above Social Media Account Candy Crush

8 What system do you use most frequently for file storage? 6% 5% 1% Dropbox 39% The drawers on my desk Google Drive 24% Other Microsoft Sharepoint 25% Box.net What system for file storage and sharing does your company ask you to use? 7% 3% 1% Internal Network 12% Google Drive 12% 52% Microsoft Sharepoint Dropbox Other 13% icloud Box.net

9 When it comes to your data privacy, who are you most concerned with? 46% 22% 3% Government 1% 22% Google 6% I m not concerned about the privacy of my data. Boss Spouse Mom

10 Does your company have a policy regarding usage of file sharing applications such as Dropbox? 39% 33% 28% Yes No I don t know

11 If your company has a policy against usage of applications such as Dropbox, do you use it anyway? 21% Yes No 79%

12 If you found out that your boss or other executives were using file sharing applications such as Dropbox, despite implementing a policy against doing so, would you be: 17% 7% 17% Not Surprised Apathetic 59% Angry Compelled to do so yourself

13 What types of files do you store online? 18% 24% 8% Personal 50% Professional Both None of your business

14 How do you most frequently share documents? 2% 1% 14% 68% 15% Online file sharing service I don t share files Mail them Pigeon carrier

15 What keeps you up at night regarding your data and personal information? 17% 2% 29% Nothing keeps me up at night. I sleep like a baby. 52% It will be maliciously exploited The government will have visibility into my private information My peers will know my secrets

16 What is your title? 12% 6% 10% 13% 23% C-Level/VP Director 36% Manager Associate Student Entrepreneur

17 Where are you located? 85% 9% 4% Americas 2% Europe / Middle East / Africa Asia Pacific / AU / NZ Mars

18 SafeNet Labs conducted this survey in August, For a complete copy of the survey data set, please contact Trisha Paine at [email protected]. SafeNet Labs is the creator of SafeMonk, the world s only tapproof encryption solution designed specifically for users of the file-sharing service Dropbox. If you would like to gain access to the raw data, please send your request to [email protected]. About SafeMonk Founded in 2012 by data protection leader, SafeNet, Inc., SafeNet Labs is a technology incubator dedicated to developing next-generation solutions to some of the biggest problems facing information security. SafeNet Labs created SafeMonk to offer tap-proof security with simplicity that doesn t break Dropbox. About SafeNet Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organizations around the globe. SafeNet s data-centric approach focuses on the protection of high value information throughout its lifecycle, from the data center to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments.

19

The Market for Two-Factor Authentication

The Market for Two-Factor Authentication The Market for Two-Factor Authentication Current Usage and Trends in the Channel whitepaper % 20% 30% 40% 50% Executive Summary Change can bring both opportunities and threats to any organisation, and

More information

Multi-factor Authentication

Multi-factor Authentication Multi-factor Authentication Current Usage and Trends whitepaper Executive Summary In this digital age, validating identities and controlling access is vital, which is why multifactor authentication has

More information

Data In The Cloud: Who Owns It, and How Do You Get it Back?

Data In The Cloud: Who Owns It, and How Do You Get it Back? Data In The Cloud: Who Owns It, and How Do You Get it Back? Presented by Dave Millier, Soban Bhatti, and Oleg Sotnikov 2013 Sentry Metrics Inc. Agenda Reasons for Cloud Adoption How Did My Data Get There?

More information

APRIL CLOUD REPORT. Netskope Cloud Report for Europe, Middle East, and Africa

APRIL CLOUD REPORT. Netskope Cloud Report for Europe, Middle East, and Africa APRIL 2015 CLOUD REPORT Netskope Cloud Report for Europe, Middle East, and Africa REPORT HIGHLIGHTS Organisations have 511 cloud apps in use on average, 87.0 percent of which aren t enterprise-ready More

More information

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered

More information

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) JULY 2014 INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on

More information

A Close-up View of Microsoft Azure Adoption

A Close-up View of Microsoft Azure Adoption Cloud A Close-up View of Microsoft Azure Adoption Business Decision-Makers are Driving Cloud Trends Contents Introduction 3 Key Trends 4 Rates of evaluation and adoption of Azure are high 5 The business

More information

creating a connected world Group overview

creating a connected world Group overview creating a connected world Group overview NTT Group at a glance Who we are We provide support globally for companies of all sizes and all locations. Our group expertise delivers global and regional communications,

More information

2014 CONSUMER VIEWS OF EMAIL MARKETING

2014 CONSUMER VIEWS OF EMAIL MARKETING BLUEHORNET REPORT 2014 CONSUMER VIEWS OF EMAIL MARKETING Executive Summary For the third consecutive year, BlueHornet surveyed over 1,000 consumers across the United States to better understand their behavior

More information

Is your business secure in a hosted world?

Is your business secure in a hosted world? Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer

More information

COLLABORATION TRENDS AND TECHNOLOGY

COLLABORATION TRENDS AND TECHNOLOGY August 2015 Sponsored by Introduction Today s most productive knowledge workers business professionals who are contributing, sharing insight and experiences, participating in decision making, and influencing

More information

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1 Fidelis XPS Power Tools Gaining Visibility Into Your Cloud: Cloud Services Security February 2012 PAGE 1 PAGE 1 Introduction Enterprises worldwide are increasing their reliance on Cloud Service providers

More information

Netskope Cloud Report. Report Highlights. cloud report. Three of the top 10 cloud apps are Storage, and enterprises use an average of 26 such apps

Netskope Cloud Report. Report Highlights. cloud report. Three of the top 10 cloud apps are Storage, and enterprises use an average of 26 such apps cloud report JAN 2014 Netskope Cloud Report In the second Netskope Cloud Report, we ve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the

More information

Netskope Cloud Report

Netskope Cloud Report cloud report JUL 2014 Netskope Cloud Report In this quarterly Netskope Cloud Report, we ve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from

More information

MOBILE BANKING TESTING TIMES FOR APPS DEVELOPMENT RESULTS OF OUR SURVEY

MOBILE BANKING TESTING TIMES FOR APPS DEVELOPMENT RESULTS OF OUR SURVEY MOBILE BANKING TESTING TIMES FOR APPS DEVELOPMENT RESULTS OF OUR SURVEY About this survey A SNAPSHOT ABOUT THE DEVELOPMENT OF MOBILE BANKING APPLICATIONS The aim of this survey, conducted in February 2014,

More information

Cloud Adoption Practices & Priorities Survey Report

Cloud Adoption Practices & Priorities Survey Report Cloud Adoption Practices & Priorities Survey Report January 2015 2015 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and

More information

Cloud Computing: The Gathering Storm

Cloud Computing: The Gathering Storm Cloud Computing: Independent research Martin Wootton, RS Consulting Cloud Computing: The Gathering Storm What UK consumers really feel about cloud-based services We rely more than ever on computing and

More information

The Security Impact of Mobile Device Use by Employees

The Security Impact of Mobile Device Use by Employees The Security Impact of Mobile Device Use by Employees Sponsored by Accellion Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report The Security

More information

creating a connected world NTT clouds overview

creating a connected world NTT clouds overview creating a connected world NTT clouds overview The NTT Group companies There is a reason why the NTT Group comprises a very select group of global technology companies. It is not just that we excel in

More information

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1 Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is

More information

white paper Using WAN Optimization to support strategic cloud initiatives

white paper Using WAN Optimization to support strategic cloud initiatives Every Cloud should have a Silver Peak Lining Using WAN Optimization to support strategic cloud initiatives Every Cloud should have a Silver Peak Lining Using WAN Optimization to support strategic cloud

More information

FINTECH SURVEY REPORT. April 2016

FINTECH SURVEY REPORT. April 2016 FINTECH SURVEY REPORT April 2016 FINTECH SURVEY REPORT Contents About the Survey... 3 Respondent Profile... 3 Survey Results... 5 Familiarity with automated financial advice tools... 5 Sectors most affected

More information

NTT. NTT clouds overview

NTT. NTT clouds overview NTT NTT clouds overview The NTT Group companies There is a reason why the NTT Group comprises a very select group of global technology companies. It is not just that we excel in delivering our products,

More information

Office 365: End-User Business Environment Workshop

Office 365: End-User Business Environment Workshop Office 365: End-User Business Environment Workshop Duration: 24 hrs. Course Description This instructor-led course provides students with the knowledge and skills to productively utilize Office 365. The

More information

Internet Peering as a Cloud enabler for Enterprises

Internet Peering as a Cloud enabler for Enterprises Internet Peering as a Cloud enabler for Enterprises Lionel MARIE Network architect Schneider Electric [email protected] Board Member France-IX [email protected] Schneider Electric at

More information

FOR THE FUTURE OF DATA CENTERS?

FOR THE FUTURE OF DATA CENTERS? WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? A WHITEPAPER BROUGHT TO YOU BY SEI WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? files via the Internet to a hard drive located in a

More information

BPM 2015: Business Process Management Trends & Observations

BPM 2015: Business Process Management Trends & Observations BPM 2015: Business Process Management Trends & Observations 1 I BPM 2015: Business Process Management Trends & Observations BPM 2015: Business Process Management Trends & Observations Executive Summary

More information

Platform as a Service (PaaS) Market Global Analysis and Forecasts to 2025

Platform as a Service (PaaS) Market Global Analysis and Forecasts to 2025 Platform as a Service (PaaS) Market Global Analysis and Forecasts to 2025 No of Pages: 150 Publishing Date: January 2016 Single User PDF: US$ 3900 Publisher : The Insight Partners Website : www.reportsweb.com

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

Cloud ROI Survey Results Comparison 2011 & 2012

Cloud ROI Survey Results Comparison 2011 & 2012 Cloud ROI Survey Results Comparison & Executive Summary Throughout, Cloud Computing has continued to become commonplace within enterprises worldwide. In order to better understand Cloud adoption and the

More information

Computing Orientation

Computing Orientation Computing Orientation Welcome to Carnegie Mellon! Computing Orientation Online Orientation Computing Resources Websites Security Online Orientation http://www.heinz.cmu.edu Current Students -> Computing

More information

11 Best Practices for Mobile Device Management (MDM)

11 Best Practices for Mobile Device Management (MDM) MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.

More information

How are your business programs adapting admissions content to meet today s mobile demands?

How are your business programs adapting admissions content to meet today s mobile demands? How are your business programs adapting admissions content to meet today s mobile demands? Surveying the Mobile Habits of MBA Applicants Introduction: Mobile Is Even More Important Than You Think Although

More information

www.dowsemurray.co.nz

www.dowsemurray.co.nz What we are covering Best practices The cloud Email and document storage Phones and faxes Home office suggestions Small business suggestions Where to buy Where to get support Fun stuff What (I hope) you

More information

White Paper - Crypto Virus. A guide to protecting your IT

White Paper - Crypto Virus. A guide to protecting your IT White Paper - Crypto Virus A guide to protecting your IT Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra

More information

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees

More information

MAJOR INCIDENT MANAGEMENT TRENDS

MAJOR INCIDENT MANAGEMENT TRENDS 68% MAJOR INCIDENT MANAGEMENT TRENDS 5 2016 Survey Report 68% Introduction Reliance on digital infrastructures has dramatically increased the impact and frequency of major incidents. In fact, more than

More information

Cloud App Security. Tiberio Molino Sales Engineer

Cloud App Security. Tiberio Molino Sales Engineer Cloud App Security Tiberio Molino Sales Engineer 2 Customer Challenges 3 Many Attacks Include Phishing Emails External Phishing attacks: May target specific individuals or companies Customer malware or

More information

Shadow IT: data protection and cloud security

Shadow IT: data protection and cloud security Shadow IT: data protection and cloud security George Crump November 17, 2014 This report is underwritten by CipherCloud. TABLE OF CONTENTS Executive summary... 3 Views on shadow IT and data security from

More information

kelly Global workforce index release: JUNE 2012 when worlds collide the rise of social media for professional & personal use

kelly Global workforce index release: JUNE 2012 when worlds collide the rise of social media for professional & personal use kelly Global workforce index 168,000 people release: JUNE 2012 30 countries when worlds collide the rise of social media for professional & personal use business or pleasure? social media in the workplace

More information

TRENDS IN DATA CENTER PROCUREMENT AND SUPPORT

TRENDS IN DATA CENTER PROCUREMENT AND SUPPORT January 2016 Sponsored by Introduction The days of partnering with a single strategic vendor to deliver end-to-end data center equipment and services are over. Today s IT decision makers are expected to

More information

APRIL CLOUD REPORT. Netskope Cloud Report Worldwide

APRIL CLOUD REPORT. Netskope Cloud Report Worldwide APRIL 2015 CLOUD REPORT Netskope Cloud Report Worldwide REPORT HIGHLIGHTS 13.6 percent of enterprise users have had their accounts credentials compromised 23.6 percent of access to cloud CRM apps is by

More information

The Cloud Balancing Act for IT: Between Promise and Peril

The Cloud Balancing Act for IT: Between Promise and Peril The Cloud Balancing Act for IT: Between Promise and Peril Table of Contents EXECUTIVE SUMMARY...2 ONBOARDING CLOUD SERVICES...3 SYSTEMS OF RECORD: THE NEXT WAVE OF CLOUD ADOPTION...6 A CULTURE OF COMPLIANCE

More information

The Application Usage and Threat Report

The Application Usage and Threat Report The Application Usage and Threat Report An Analysis of Application Usage and Related Threats within the Enterprise 10th Edition February 2013 PAGE 1 Executive Summary Global Findings Since 2008, Palo Alto

More information

White Paper. Keeping Your Private Data Secure

White Paper. Keeping Your Private Data Secure WHITE PAPER: Keeping Your Private Data Secure White Paper Keeping Your Private Data Secure Keeping Your Private Data Secure Contents Keeping Your Private Data Secure............................ 3 Why Encryption?......................................

More information

Service Provider VoIP and IMS CONTINUOUS RESEARCH SERVICE. SBC Deployment Strategies: Global Service Provider Survey

Service Provider VoIP and IMS CONTINUOUS RESEARCH SERVICE. SBC Deployment Strategies: Global Service Provider Survey Service Provider VoIP and IMS CONTINUOUS RESEARCH SERVICE TABLE OF CONTENTS SBC Deployment Strategies: Global Service Provider Survey October 21, 2009 INTRODUCTION...1 TOP TAKEAWAYS...2 METHODOLOGY...3

More information

Mobile Analytics Report November 2013

Mobile Analytics Report November 2013 Mobile Analytics Report November 2013 The Citrix Mobile Analytics Report for the fourth quarter of 2013 provides insight into subscriber behavior and related factors that affect subscribers quality of

More information

About Advent One. Contents. 02 What we do. 03 Infrastructure Services. 04 Cloud and Managed Services. 07 Hosting Desktop. 08 Phone.

About Advent One. Contents. 02 What we do. 03 Infrastructure Services. 04 Cloud and Managed Services. 07 Hosting Desktop. 08 Phone. About Advent One Contents 02 What we do 03 Infrastructure Services 04 Cloud and Managed Services 07 Hosting Desktop 08 Phone 09 Email 10 Back up Recovery 12 Dev/Test 13 Contact Making technology work.

More information

Breaking Bad: The Risk of Insecure File Sharing

Breaking Bad: The Risk of Insecure File Sharing Breaking Bad: The Risk of Insecure File Sharing Sponsored by Intralinks Independently conducted by Ponemon Institute LLC Publication Date: October 2014 Ponemon Institute Research Report Breaking Bad: The

More information

Best Practices for Monitoring: Reduce Outages and Downtime. Develop an effective monitoring strategy with the right metrics, processes and alerts.

Best Practices for Monitoring: Reduce Outages and Downtime. Develop an effective monitoring strategy with the right metrics, processes and alerts. Best Practices for Monitoring: Reduce Outages and Downtime. Develop an effective monitoring strategy with the right metrics, processes and alerts. 1 TABLE OF CONTENTS INTRODUCTION WHAT TO MONITOR ENSURING

More information

FROM TACTIC TO STRATEGY:

FROM TACTIC TO STRATEGY: FROM TACTIC TO STRATEGY: The CDW 2011 Cloud Computing Tracking Poll 2011 CDW LLC TABLE OF CONTENTS Introduction 3 Key findings 4 Planning for the cloud 16 Methodology and demographics 19 Appendix 20 Industries

More information

The Unintentional Insider Risk in United States and German Organizations

The Unintentional Insider Risk in United States and German Organizations The Unintentional Insider Risk in United States and German Organizations Sponsored by Raytheon Websense Independently conducted by Ponemon Institute LLC Publication Date: July 2015 2 Part 1. Introduction

More information

The. C s. of Mobile Device. Management

The. C s. of Mobile Device. Management The AB C s of Mobile Device Management Hundreds of models, multiple carriers, OSs from Gingerbread to Jelly Bean Android fragmentation is scary for IT, but it s far from a problem with Mobile Device Management

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

efolder White Paper: 3 Little-Known Risks Associated with Leading Cloud Services

efolder White Paper: 3 Little-Known Risks Associated with Leading Cloud Services efolder White Paper: 3 Little-Known Risks Associated with Leading Cloud Services May 2015 Introduction In the last few years, an increasing amount of corporate information has moved to the cloud. Office

More information

Advanced High Availability Architecture. White Paper

Advanced High Availability Architecture. White Paper Advanced High Advanced High Production database servers are replicated in near-real time to a peer data center within the same geographic region in Asia Pacific Japan (APJ); Europe, Middle East and Africa

More information

What You Should Know About Cloud Storage

What You Should Know About Cloud Storage A DIGITAL LIFE E-GUIDE Files in Flight: What You Should Know About Cloud Storage What Is the Cloud? Back then, all your files were stored on hardware. Party photos, spreadsheets, and school projects were

More information

AppFlow: next-generation application performance monitoring. www.citrix.com

AppFlow: next-generation application performance monitoring. www.citrix.com AppFlow White Paper AppFlow: next-generation application performance monitoring www.citrix.com Introduction: monitoring application performance has become more complex In today s always-on and connected

More information

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution. Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution. TABLE OF CONTENTS WELCOME INTRODUCTION... 1 TIP 1:... 4 Ensure Ease-of-Use TIP 2:... 6 Empower Secure

More information

Kyriacos Kokkinos IBM Executive Director Analytics Consulting

Kyriacos Kokkinos IBM Executive Director Analytics Consulting Kyriacos Kokkinos IBM Executive Director Analytics Consulting Contents CMO demographics The CMO s changing world The CMO s relationship with the C-suite Profiling the CMO What it takes for success in a

More information