Cloud App Usage vs Data Privacy Survey:

Size: px
Start display at page:

Download "Cloud App Usage vs Data Privacy Survey:"

Transcription

1 Cloud App Usage vs Data Privacy Survey: Despite Concerns Over Data Security, Cloud-based App Use Prevalent

2 Overview While most business professionals are worried about the security of cloud-based applications, they aren t deterred from using them to store their personal and professional data, and they aren t losing sleep over their data and information, according to a recent survey from SafeMonk. When SafeNet Labs, a technology incubator created by SafeNet, Inc., asked hundreds of business professionals worldwide if they were worried about the security of the cloud-based applications or data stored in the cloud, 52 percent checked yes; however, sixty-four percent of respondents still said they frequently use cloud based apps to store their personal and professional data. Ironically, when asked what keeps them up at night regarding their data and information, more than half answered, nothing keeps me up, I sleep like a baby. services despite company policies against it (33 percent of C-level titles said yes versus 18 percent of associates). The majority of respondents - 59 percent - said they wouldn t be surprised if they found out that their boss or executives were using file sharing apps like Dropbox, despite a policy against doing so. In general, C-level executives (39 percent checked yes) are less concerned about security in the cloud than associates (54 percent checked yes). Further examination of the survey data shows that the higher a person is on the corporate ladder, the more they use file sharing services like Dropbox, and they are more likely to use file sharing C-Levels Less Concerned with Security, More Apt to Bend Rules Against Cloud App Usage

3 Location also factors into respondents attitudes about data security in the cloud. For example, the usage of cloud-based apps is far greater in EMEA than in the U.S. or APAC, so too are the levels of concern about data security and corporate policies against using cloud apps. However, EMEA respondents are more likely to ignore those very same policies. Who they are concerned about also varies: when it comes to their data privacy, respondents in the U.S. and EMEA are most concerned with the government, while APAC is most concerned with Google. Additionally, APAC respondents are the group most kept up at night when it comes to their data and information, worrying that it will be maliciously exploited. Overall, 52 percent of respondents are most concerned with someone hacking into their banking and financial apps. The systems most frequently used respondents for file storage are Dropbox (39 percent) and desk drawers (25 percent); and continues to be the dominant means for sharing files (68 percent), according to the data. What this survey suggests is that cloud app usage and document storage continue to proliferate, and that organizations should reexamine antiquated attitudes towards usage of these apps across the enterprise, said Tsion Gonen, Chief Strategy Officer, SafeNet, Inc. It s clear that top-level executives understand the advantages of cloud app usage, and should enable their companies to leverage these advantages by adopting contemporary security tools and practices.

4 Do you frequently use cloud based applications (ie. Banking, business applications, social media, etc)? 64% 25% 11% Yes No WTH is a cloud based application?

5 Do you store any personal or professional data in the cloud? 14% 3% 55% Yes 28% No I think so Not Sure

6 Are you worried at all about the security of the cloud-based applications or data stored in the cloud? 15% 53% 32% Yes No Still trying to figure out what cloud is

7 Of the applications that you use, which are you most concerned about someone hacking into? 9% 14% 8% 0% 17% Banking Application 52% File Storing / Sharing Application None of the Above Social Media Account Candy Crush

8 What system do you use most frequently for file storage? 6% 5% 1% Dropbox 39% The drawers on my desk Google Drive 24% Other Microsoft Sharepoint 25% Box.net What system for file storage and sharing does your company ask you to use? 7% 3% 1% Internal Network 12% Google Drive 12% 52% Microsoft Sharepoint Dropbox Other 13% icloud Box.net

9 When it comes to your data privacy, who are you most concerned with? 46% 22% 3% Government 1% 22% Google 6% I m not concerned about the privacy of my data. Boss Spouse Mom

10 Does your company have a policy regarding usage of file sharing applications such as Dropbox? 39% 33% 28% Yes No I don t know

11 If your company has a policy against usage of applications such as Dropbox, do you use it anyway? 21% Yes No 79%

12 If you found out that your boss or other executives were using file sharing applications such as Dropbox, despite implementing a policy against doing so, would you be: 17% 7% 17% Not Surprised Apathetic 59% Angry Compelled to do so yourself

13 What types of files do you store online? 18% 24% 8% Personal 50% Professional Both None of your business

14 How do you most frequently share documents? 2% 1% 14% 68% 15% Online file sharing service I don t share files Mail them Pigeon carrier

15 What keeps you up at night regarding your data and personal information? 17% 2% 29% Nothing keeps me up at night. I sleep like a baby. 52% It will be maliciously exploited The government will have visibility into my private information My peers will know my secrets

16 What is your title? 12% 6% 10% 13% 23% C-Level/VP Director 36% Manager Associate Student Entrepreneur

17 Where are you located? 85% 9% 4% Americas 2% Europe / Middle East / Africa Asia Pacific / AU / NZ Mars

18 SafeNet Labs conducted this survey in August, For a complete copy of the survey data set, please contact Trisha Paine at trisha@safemonk.com. SafeNet Labs is the creator of SafeMonk, the world s only tapproof encryption solution designed specifically for users of the file-sharing service Dropbox. If you would like to gain access to the raw data, please send your request to hello@safemonk.com. About SafeMonk Founded in 2012 by data protection leader, SafeNet, Inc., SafeNet Labs is a technology incubator dedicated to developing next-generation solutions to some of the biggest problems facing information security. SafeNet Labs created SafeMonk to offer tap-proof security with simplicity that doesn t break Dropbox. About SafeNet Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organizations around the globe. SafeNet s data-centric approach focuses on the protection of high value information throughout its lifecycle, from the data center to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments.

19

2014 Authentication Survey Executive Summary. How Organizations Are Responding to Mobile and Cloud Threats

2014 Authentication Survey Executive Summary. How Organizations Are Responding to Mobile and Cloud Threats 2014 Authentication Survey Executive Summary How Organizations Are Responding to Mobile and Cloud Threats Overview As IT teams seek to keep sensitive assets safe, while supporting the evolving adoption

More information

The Market for Two-Factor Authentication

The Market for Two-Factor Authentication The Market for Two-Factor Authentication Current Usage and Trends in the Channel whitepaper % 20% 30% 40% 50% Executive Summary Change can bring both opportunities and threats to any organisation, and

More information

Multi-factor Authentication

Multi-factor Authentication Multi-factor Authentication Current Usage and Trends whitepaper Executive Summary In this digital age, validating identities and controlling access is vital, which is why multifactor authentication has

More information

Primer CLOUD COMPUTING DEMYSTIFIED 5 CLOUD COMPUTING MYTHS EVERY SMALL BUSINESS SHOULD KNOW ABOUT

Primer CLOUD COMPUTING DEMYSTIFIED 5 CLOUD COMPUTING MYTHS EVERY SMALL BUSINESS SHOULD KNOW ABOUT A Primer CLOUD COMPUTING DEMYSTIFIED 5 CLOUD COMPUTING MYTHS EVERY SMALL BUSINESS SHOULD KNOW ABOUT Everyone is talking about how cloud computing may bring considerable benefits to small and medium-sized

More information

Data In The Cloud: Who Owns It, and How Do You Get it Back?

Data In The Cloud: Who Owns It, and How Do You Get it Back? Data In The Cloud: Who Owns It, and How Do You Get it Back? Presented by Dave Millier, Soban Bhatti, and Oleg Sotnikov 2013 Sentry Metrics Inc. Agenda Reasons for Cloud Adoption How Did My Data Get There?

More information

Intralinks Survey Report

Intralinks Survey Report Intralinks Survey Report Safe Sharing: A Survey of Enterprise IT Decision Makers on Best Practices for Adopting File Sync and Share Applications New research conducted by Harris Poll June 2014 Copyright

More information

APRIL CLOUD REPORT. Netskope Cloud Report for Europe, Middle East, and Africa

APRIL CLOUD REPORT. Netskope Cloud Report for Europe, Middle East, and Africa APRIL 2015 CLOUD REPORT Netskope Cloud Report for Europe, Middle East, and Africa REPORT HIGHLIGHTS Organisations have 511 cloud apps in use on average, 87.0 percent of which aren t enterprise-ready More

More information

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered

More information

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) JULY 2014 INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on

More information

A Close-up View of Microsoft Azure Adoption

A Close-up View of Microsoft Azure Adoption Cloud A Close-up View of Microsoft Azure Adoption Business Decision-Makers are Driving Cloud Trends Contents Introduction 3 Key Trends 4 Rates of evaluation and adoption of Azure are high 5 The business

More information

creating a connected world Group overview

creating a connected world Group overview creating a connected world Group overview NTT Group at a glance Who we are We provide support globally for companies of all sizes and all locations. Our group expertise delivers global and regional communications,

More information

2014 CONSUMER VIEWS OF EMAIL MARKETING

2014 CONSUMER VIEWS OF EMAIL MARKETING BLUEHORNET REPORT 2014 CONSUMER VIEWS OF EMAIL MARKETING Executive Summary For the third consecutive year, BlueHornet surveyed over 1,000 consumers across the United States to better understand their behavior

More information

EXECUTIVE BRIEF PON SPON. The Cloud Application Explosion. Published April 2013. An Osterman Research Executive Brief. sponsored by.

EXECUTIVE BRIEF PON SPON. The Cloud Application Explosion. Published April 2013. An Osterman Research Executive Brief. sponsored by. EXECUTIVE BRIEF PON Explosion An Osterman Research Executive Brief Published April 2013 sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel:

More information

Is your business secure in a hosted world?

Is your business secure in a hosted world? Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer

More information

COLLABORATION TRENDS AND TECHNOLOGY

COLLABORATION TRENDS AND TECHNOLOGY August 2015 Sponsored by Introduction Today s most productive knowledge workers business professionals who are contributing, sharing insight and experiences, participating in decision making, and influencing

More information

The EMEA Encryption and Authentication Markets

The EMEA Encryption and Authentication Markets The EMEA Encryption and Authentication Markets Current Trends in the Channel whitepaper Evolving, increasingly advanced threats, the increased adoption of cloud services, mobile device proliferation, and

More information

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1 Fidelis XPS Power Tools Gaining Visibility Into Your Cloud: Cloud Services Security February 2012 PAGE 1 PAGE 1 Introduction Enterprises worldwide are increasing their reliance on Cloud Service providers

More information

Netskope Cloud Report. Report Highlights. cloud report. Three of the top 10 cloud apps are Storage, and enterprises use an average of 26 such apps

Netskope Cloud Report. Report Highlights. cloud report. Three of the top 10 cloud apps are Storage, and enterprises use an average of 26 such apps cloud report JAN 2014 Netskope Cloud Report In the second Netskope Cloud Report, we ve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the

More information

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,

More information

Netskope Cloud Report

Netskope Cloud Report cloud report JUL 2014 Netskope Cloud Report In this quarterly Netskope Cloud Report, we ve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from

More information

CSA Survey Results Government Access to Information July 2013

CSA Survey Results Government Access to Information July 2013 CSA Survey Results Government Access to Information July 2013 EXECUTIVE OVERVIEW During June and July of 2013, news of a whistleblower, US government contractor Edward Snowden, dominated global headlines.

More information

HOW COMPANIES FIND APP DEVELOPERS

HOW COMPANIES FIND APP DEVELOPERS INDUSTRY RESEARCH RESULTS: HOW COMPANIES FIND APP DEVELOPERS INTRODUCTION As a part of research strategy, BAMBOOAPPS, mobile web and app product development company, conducted a survey to uncover the approach

More information

MOBILE BANKING TESTING TIMES FOR APPS DEVELOPMENT RESULTS OF OUR SURVEY

MOBILE BANKING TESTING TIMES FOR APPS DEVELOPMENT RESULTS OF OUR SURVEY MOBILE BANKING TESTING TIMES FOR APPS DEVELOPMENT RESULTS OF OUR SURVEY About this survey A SNAPSHOT ABOUT THE DEVELOPMENT OF MOBILE BANKING APPLICATIONS The aim of this survey, conducted in February 2014,

More information

Cloud Adoption Practices & Priorities Survey Report

Cloud Adoption Practices & Priorities Survey Report Cloud Adoption Practices & Priorities Survey Report January 2015 2015 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and

More information

2012 Bit9 Cyber Security Research Report

2012 Bit9 Cyber Security Research Report 2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by

More information

Cloud Computing: The Gathering Storm

Cloud Computing: The Gathering Storm Cloud Computing: Independent research Martin Wootton, RS Consulting Cloud Computing: The Gathering Storm What UK consumers really feel about cloud-based services We rely more than ever on computing and

More information

The Security Impact of Mobile Device Use by Employees

The Security Impact of Mobile Device Use by Employees The Security Impact of Mobile Device Use by Employees Sponsored by Accellion Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report The Security

More information

Cloud Security for SME

Cloud Security for SME Cloud Security for SME Hong Kong Computer & Communications Festival 2015 21 Aug 2015 Agenda About HKCERT What is cloud? Cloud security challenges to SME Tips for using cloud service securely About HKCERT

More information

creating a connected world NTT clouds overview

creating a connected world NTT clouds overview creating a connected world NTT clouds overview The NTT Group companies There is a reason why the NTT Group comprises a very select group of global technology companies. It is not just that we excel in

More information

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1 Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is

More information

Genes for Good Consent Form

Genes for Good Consent Form Genes for Good Consent Form Version 2.1 The next few screens contain information about Genes for Good and the benefits and risks of participating. This is called "informed consent", because we want you

More information

Cloud computing an insight

Cloud computing an insight Cloud computing an insight Overview IT infrastructure is changing according the fast-paced world s needs. People in the world want to stay connected with Work / Family-Friends. The data needs to be available

More information

TOP FINDINGS. 48% of enterprises are now using a cloud-based productivity & email suite, up from 28% in 2014

TOP FINDINGS. 48% of enterprises are now using a cloud-based productivity & email suite, up from 28% in 2014 TOP FINDINGS 48% of enterprises are now using a cloud-based productivity & email suite, up from 28% in s underdog, Microsoft has surged ahead of Google, more than tripling its adoption from 7.7% in to

More information

What Dropbox Can t Do For Your Business

What Dropbox Can t Do For Your Business What Dropbox Can t Do For Your Business 33 Things to Consider When Choosing a Secure File Sharing and Collaboration Service for Your Business A Soonr Study Executive Summary The need for a well-rounded

More information

white paper Using WAN Optimization to support strategic cloud initiatives

white paper Using WAN Optimization to support strategic cloud initiatives Every Cloud should have a Silver Peak Lining Using WAN Optimization to support strategic cloud initiatives Every Cloud should have a Silver Peak Lining Using WAN Optimization to support strategic cloud

More information

FINTECH SURVEY REPORT. April 2016

FINTECH SURVEY REPORT. April 2016 FINTECH SURVEY REPORT April 2016 FINTECH SURVEY REPORT Contents About the Survey... 3 Respondent Profile... 3 Survey Results... 5 Familiarity with automated financial advice tools... 5 Sectors most affected

More information

NTT. NTT clouds overview

NTT. NTT clouds overview NTT NTT clouds overview The NTT Group companies There is a reason why the NTT Group comprises a very select group of global technology companies. It is not just that we excel in delivering our products,

More information

Office 365: End-User Business Environment Workshop

Office 365: End-User Business Environment Workshop Office 365: End-User Business Environment Workshop Duration: 24 hrs. Course Description This instructor-led course provides students with the knowledge and skills to productively utilize Office 365. The

More information

Internet Peering as a Cloud enabler for Enterprises

Internet Peering as a Cloud enabler for Enterprises Internet Peering as a Cloud enabler for Enterprises Lionel MARIE Network architect Schneider Electric lionel.marie@schneider-electric.com Board Member France-IX lionel@franceix.net Schneider Electric at

More information

The Convergence of IT Operations Management

The Convergence of IT Operations Management The Convergence of IT Operations Management Mobile applications, cloud computing and personal devices present new challenges. Integration and automation are keys to a successful management response. It

More information

9 REALITIES OF PORTABLE AND PERSISTENT DATA PROTECTION IN THE 21 ST CENTURY

9 REALITIES OF PORTABLE AND PERSISTENT DATA PROTECTION IN THE 21 ST CENTURY 9 REALITIES OF PORTABLE AND PERSISTENT DATA PROTECTION IN THE 21 ST CENTURY INTRODUCTION Over the past decade, major data breaches have made headlines, resulting in significant brand damage, costly fines,

More information

Shadow IT in the Enterprise

Shadow IT in the Enterprise Confessions from More Than 1,000 Enterprise Users www.nasuni.com Introduction In today s work environment, the proliferation of smartphones and tablets is driving mobility and a corresponding culture of

More information

FOR THE FUTURE OF DATA CENTERS?

FOR THE FUTURE OF DATA CENTERS? WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? A WHITEPAPER BROUGHT TO YOU BY SEI WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? files via the Internet to a hard drive located in a

More information

BPM 2015: Business Process Management Trends & Observations

BPM 2015: Business Process Management Trends & Observations BPM 2015: Business Process Management Trends & Observations 1 I BPM 2015: Business Process Management Trends & Observations BPM 2015: Business Process Management Trends & Observations Executive Summary

More information

Platform as a Service (PaaS) Market Global Analysis and Forecasts to 2025

Platform as a Service (PaaS) Market Global Analysis and Forecasts to 2025 Platform as a Service (PaaS) Market Global Analysis and Forecasts to 2025 No of Pages: 150 Publishing Date: January 2016 Single User PDF: US$ 3900 Publisher : The Insight Partners Website : www.reportsweb.com

More information

Datacenter Hosting - The Best Form of Protection

Datacenter Hosting - The Best Form of Protection Datacenter Hosting Scalable Technology and Insurance for Your Business nsacom.com Datacenter Hosting Scalable Technology and Insurance for Your Business Datacenter Hosting Gives You the Best of Both Worlds

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

The Truth About Enterprise Mobile Security Products

The Truth About Enterprise Mobile Security Products The Truth About Enterprise Mobile Security Products Presented by Jack Madden at TechTarget Information Security Decisions 2013 Welcome to my enterprise mobile security product session! Instead of printing

More information

Cloud ROI Survey Results Comparison 2011 & 2012

Cloud ROI Survey Results Comparison 2011 & 2012 Cloud ROI Survey Results Comparison & Executive Summary Throughout, Cloud Computing has continued to become commonplace within enterprises worldwide. In order to better understand Cloud adoption and the

More information

Computing Orientation

Computing Orientation Computing Orientation Welcome to Carnegie Mellon! Computing Orientation Online Orientation Computing Resources Websites Security Online Orientation http://www.heinz.cmu.edu Current Students -> Computing

More information

11 Best Practices for Mobile Device Management (MDM)

11 Best Practices for Mobile Device Management (MDM) MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.

More information

'Strategic Data Center Management: Transforming Fear into Opportunity' A CoreNet Global and Johnson Controls Survey Research Project

'Strategic Data Center Management: Transforming Fear into Opportunity' A CoreNet Global and Johnson Controls Survey Research Project 'Strategic Data Center Management: Transforming Fear into Opportunity' A CoreNet Global and Johnson Controls Survey Research Project Presenters John Richard, Director Global Critical Environments Eric

More information

How are your business programs adapting admissions content to meet today s mobile demands?

How are your business programs adapting admissions content to meet today s mobile demands? How are your business programs adapting admissions content to meet today s mobile demands? Surveying the Mobile Habits of MBA Applicants Introduction: Mobile Is Even More Important Than You Think Although

More information

What Dropbox Can t Do For Your Business

What Dropbox Can t Do For Your Business What Dropbox Can t Do For Your Business 32 Things to Consider When Choosing a Secure File Sharing and Collaboration Service for Your Business A Soonr Study Executive Summary The need for a well-rounded

More information

www.dowsemurray.co.nz

www.dowsemurray.co.nz What we are covering Best practices The cloud Email and document storage Phones and faxes Home office suggestions Small business suggestions Where to buy Where to get support Fun stuff What (I hope) you

More information

White Paper - Crypto Virus. A guide to protecting your IT

White Paper - Crypto Virus. A guide to protecting your IT White Paper - Crypto Virus A guide to protecting your IT Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra

More information

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees

More information

SUMMER 2015 WORLDWIDE EDITION CLOUD REPORT. sensitive data in the cloud

SUMMER 2015 WORLDWIDE EDITION CLOUD REPORT. sensitive data in the cloud CLOUD REPORT SUMMER 2015 WORLDWIDE EDITION sensitive data in the cloud Report Highlights 17.9 percent of all files in enterprise-sanctioned cloud apps constitute a data policy violation. 22.2 percent of

More information

Survey Results Exposing Risky Person-to-Person File Sharing Practices An ebook Report

Survey Results Exposing Risky Person-to-Person File Sharing Practices An ebook Report Are Employees Putting Your Company s Data at Risk? Survey Results Exposing Risky Person-to-Person File Sharing Practices An ebook Report ARE Employees Putting Your COMPANY S Data at Risk? Ipswitch File

More information

The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools

The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools Why have virtual desktops been positioned as a cure-all for many of today s endpoint

More information

The Cloud: Reinventing

The Cloud: Reinventing White Paper The Cloud: Reinventing Enterprise Collaboration IDG survey points to need for collaboration across all business units and an end to spot solutions It is no surprise to anyone working in virtually

More information

State of the Mobile Enterprise

State of the Mobile Enterprise State of the Mobile Enterprise APPCELERATOR Q1 2013 MOBILE ENTERPRISE REPORT GAMESTOP NBC.COM Appcelerator Q1 2013 MOBILE ENTERPRISE REPORT SUMMARY RESPONDENT PROFILE Appcelerator surveyed 770 enterprise

More information

Optimizes the Customer Experience on Hundreds of Websites Worldwide

Optimizes the Customer Experience on Hundreds of Websites Worldwide Large Consumer Packaged Goods Company CASE STUDY Large Consumer Packaged Goods Company Optimizes the Customer Experience on Hundreds of Websites Worldwide At a Glance Industry Consumer Packaged Goods CDN

More information

MAJOR INCIDENT MANAGEMENT TRENDS

MAJOR INCIDENT MANAGEMENT TRENDS 68% MAJOR INCIDENT MANAGEMENT TRENDS 5 2016 Survey Report 68% Introduction Reliance on digital infrastructures has dramatically increased the impact and frequency of major incidents. In fact, more than

More information

Cloud App Security. Tiberio Molino Sales Engineer

Cloud App Security. Tiberio Molino Sales Engineer Cloud App Security Tiberio Molino Sales Engineer 2 Customer Challenges 3 Many Attacks Include Phishing Emails External Phishing attacks: May target specific individuals or companies Customer malware or

More information

Shadow IT: data protection and cloud security

Shadow IT: data protection and cloud security Shadow IT: data protection and cloud security George Crump November 17, 2014 This report is underwritten by CipherCloud. TABLE OF CONTENTS Executive summary... 3 Views on shadow IT and data security from

More information

kelly Global workforce index release: JUNE 2012 when worlds collide the rise of social media for professional & personal use

kelly Global workforce index release: JUNE 2012 when worlds collide the rise of social media for professional & personal use kelly Global workforce index 168,000 people release: JUNE 2012 30 countries when worlds collide the rise of social media for professional & personal use business or pleasure? social media in the workplace

More information

Enterprise Mobility Report 10/2014. Creation date: 31.10.2014. Vlastimil Turzík, Edward Plch

Enterprise Mobility Report 10/2014. Creation date: 31.10.2014. Vlastimil Turzík, Edward Plch 10/2014 Creation date: 31.10.2014 Author: Vlastimil Turzík, Edward Plch Content Content... 2 Introduction... 4 Interesting Articles... 4 95% of companies challenged by BYOD security... 4 ios... 4 Vulnerability...

More information

Information Protection in Today s Changing Mobile and Cloud Environments

Information Protection in Today s Changing Mobile and Cloud Environments Information Protection in Today s Changing Mobile and Cloud Environments Art Gilliland, Sr. Vice President Symantec, Information Security Group Session ID: SPO1-107 Session Classification: Intermediate

More information

TRENDS IN DATA CENTER PROCUREMENT AND SUPPORT

TRENDS IN DATA CENTER PROCUREMENT AND SUPPORT January 2016 Sponsored by Introduction The days of partnering with a single strategic vendor to deliver end-to-end data center equipment and services are over. Today s IT decision makers are expected to

More information

IDENTITY SOLUTIONS: Security Beyond the Perimeter

IDENTITY SOLUTIONS: Security Beyond the Perimeter IDENTITY SOLUTIONS: Security Beyond the Perimeter 2016 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud

More information

APRIL CLOUD REPORT. Netskope Cloud Report Worldwide

APRIL CLOUD REPORT. Netskope Cloud Report Worldwide APRIL 2015 CLOUD REPORT Netskope Cloud Report Worldwide REPORT HIGHLIGHTS 13.6 percent of enterprise users have had their accounts credentials compromised 23.6 percent of access to cloud CRM apps is by

More information

The Cloud Balancing Act for IT: Between Promise and Peril

The Cloud Balancing Act for IT: Between Promise and Peril The Cloud Balancing Act for IT: Between Promise and Peril Table of Contents EXECUTIVE SUMMARY...2 ONBOARDING CLOUD SERVICES...3 SYSTEMS OF RECORD: THE NEXT WAVE OF CLOUD ADOPTION...6 A CULTURE OF COMPLIANCE

More information

The Application Usage and Threat Report

The Application Usage and Threat Report The Application Usage and Threat Report An Analysis of Application Usage and Related Threats within the Enterprise 10th Edition February 2013 PAGE 1 Executive Summary Global Findings Since 2008, Palo Alto

More information

Two Peas in a pod: BrinG your own device and Expense management. ITFMA Conference, Mobile, AL April 4, 2013

Two Peas in a pod: BrinG your own device and Expense management. ITFMA Conference, Mobile, AL April 4, 2013 Two Peas in a pod: BrinG your own device and Expense management ITFMA Conference, Mobile, AL April 4, 2013 Agenda The Bring Your Own Device (BYOD) Movement Does BYOD Save Money? The Importance of Mobile

More information

White Paper. Keeping Your Private Data Secure

White Paper. Keeping Your Private Data Secure WHITE PAPER: Keeping Your Private Data Secure White Paper Keeping Your Private Data Secure Keeping Your Private Data Secure Contents Keeping Your Private Data Secure............................ 3 Why Encryption?......................................

More information

Service Provider VoIP and IMS CONTINUOUS RESEARCH SERVICE. SBC Deployment Strategies: Global Service Provider Survey

Service Provider VoIP and IMS CONTINUOUS RESEARCH SERVICE. SBC Deployment Strategies: Global Service Provider Survey Service Provider VoIP and IMS CONTINUOUS RESEARCH SERVICE TABLE OF CONTENTS SBC Deployment Strategies: Global Service Provider Survey October 21, 2009 INTRODUCTION...1 TOP TAKEAWAYS...2 METHODOLOGY...3

More information

Organizations Continue to Rely on Outdated Technologies, When Advanced Threats a Reality

Organizations Continue to Rely on Outdated Technologies, When Advanced Threats a Reality NETWORK SECURITY SURVEY RESULTS Is Network Access Putting You at Risk? Organizations Continue to Rely on Outdated Technologies, When Advanced Threats a Reality Introductions Given the proliferation of

More information

Mobile Analytics Report November 2013

Mobile Analytics Report November 2013 Mobile Analytics Report November 2013 The Citrix Mobile Analytics Report for the fourth quarter of 2013 provides insight into subscriber behavior and related factors that affect subscribers quality of

More information

About Advent One. Contents. 02 What we do. 03 Infrastructure Services. 04 Cloud and Managed Services. 07 Hosting Desktop. 08 Phone.

About Advent One. Contents. 02 What we do. 03 Infrastructure Services. 04 Cloud and Managed Services. 07 Hosting Desktop. 08 Phone. About Advent One Contents 02 What we do 03 Infrastructure Services 04 Cloud and Managed Services 07 Hosting Desktop 08 Phone 09 Email 10 Back up Recovery 12 Dev/Test 13 Contact Making technology work.

More information

Breaking Bad: The Risk of Insecure File Sharing

Breaking Bad: The Risk of Insecure File Sharing Breaking Bad: The Risk of Insecure File Sharing Sponsored by Intralinks Independently conducted by Ponemon Institute LLC Publication Date: October 2014 Ponemon Institute Research Report Breaking Bad: The

More information

Best Practices for Monitoring: Reduce Outages and Downtime. Develop an effective monitoring strategy with the right metrics, processes and alerts.

Best Practices for Monitoring: Reduce Outages and Downtime. Develop an effective monitoring strategy with the right metrics, processes and alerts. Best Practices for Monitoring: Reduce Outages and Downtime. Develop an effective monitoring strategy with the right metrics, processes and alerts. 1 TABLE OF CONTENTS INTRODUCTION WHAT TO MONITOR ENSURING

More information

FROM TACTIC TO STRATEGY:

FROM TACTIC TO STRATEGY: FROM TACTIC TO STRATEGY: The CDW 2011 Cloud Computing Tracking Poll 2011 CDW LLC TABLE OF CONTENTS Introduction 3 Key findings 4 Planning for the cloud 16 Methodology and demographics 19 Appendix 20 Industries

More information

The Unintentional Insider Risk in United States and German Organizations

The Unintentional Insider Risk in United States and German Organizations The Unintentional Insider Risk in United States and German Organizations Sponsored by Raytheon Websense Independently conducted by Ponemon Institute LLC Publication Date: July 2015 2 Part 1. Introduction

More information

The. C s. of Mobile Device. Management

The. C s. of Mobile Device. Management The AB C s of Mobile Device Management Hundreds of models, multiple carriers, OSs from Gingerbread to Jelly Bean Android fragmentation is scary for IT, but it s far from a problem with Mobile Device Management

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

efolder White Paper: 3 Little-Known Risks Associated with Leading Cloud Services

efolder White Paper: 3 Little-Known Risks Associated with Leading Cloud Services efolder White Paper: 3 Little-Known Risks Associated with Leading Cloud Services May 2015 Introduction In the last few years, an increasing amount of corporate information has moved to the cloud. Office

More information

Advanced High Availability Architecture. White Paper

Advanced High Availability Architecture. White Paper Advanced High Advanced High Production database servers are replicated in near-real time to a peer data center within the same geographic region in Asia Pacific Japan (APJ); Europe, Middle East and Africa

More information

FOSTERING EASIER, MORE PRODUCTIVE MULTIMEDIA COLLABORATION IN THE WORKPLACE

FOSTERING EASIER, MORE PRODUCTIVE MULTIMEDIA COLLABORATION IN THE WORKPLACE FOSTERING EASIER, MORE PRODUCTIVE MULTIMEDIA COLLABORATION IN THE WORKPLACE A FIRST-OF-ITS KIND APPLIANCE TURNS MULTIMEDIA COLLABORATION FROM A SPECIAL EVENT INTO AN INTEGRAL PART OF THE WORK DAY A MITEL

More information

The Pros and Cons of Cloud Services

The Pros and Cons of Cloud Services SECURING MICROSOFT OFFICE 365 WHITE PAPER Do a search for trending IT topics today, and it s hard to find one that s more discussed or more controversial than cloud services. IT departments love that they

More information

What You Should Know About Cloud Storage

What You Should Know About Cloud Storage A DIGITAL LIFE E-GUIDE Files in Flight: What You Should Know About Cloud Storage What Is the Cloud? Back then, all your files were stored on hardware. Party photos, spreadsheets, and school projects were

More information

SharePoint and Security: A Survey of SharePoint Stakeholders

SharePoint and Security: A Survey of SharePoint Stakeholders SharePoint and Security: A Survey of SharePoint Stakeholders December 2013 1 Key Findings Non-employee access to on-premise SharePoint desirable 76% have had requests to grant non-employee access 72% say

More information

PARTNER LOGO. The. C s. Mobile Device Management

PARTNER LOGO. The. C s. Mobile Device Management PARTNER LOGO The AB C s of Mobile Device Management Hundreds of models, multiple carriers, OSs from Gingerbread to Jelly Bean Android fragmentation is scary for IT, but it s far from a problem with Mobile

More information

Mobile Security Landscape in 2014 - A Report

Mobile Security Landscape in 2014 - A Report The Mobile Security Landscape in 2014 Securing BYOD in today s connected workplace A report by: Copyright 2014. All rights Reserved. The Role for Mobile Operators in Enterprise Mobility Security Working

More information

AppFlow: next-generation application performance monitoring. www.citrix.com

AppFlow: next-generation application performance monitoring. www.citrix.com AppFlow White Paper AppFlow: next-generation application performance monitoring www.citrix.com Introduction: monitoring application performance has become more complex In today s always-on and connected

More information

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution. Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution. TABLE OF CONTENTS WELCOME INTRODUCTION... 1 TIP 1:... 4 Ensure Ease-of-Use TIP 2:... 6 Empower Secure

More information

The Complete Guide to Email Encryption for Google Apps Administrators

The Complete Guide to Email Encryption for Google Apps Administrators The Complete Guide to Email Encryption for Google Apps Administrators virtru.com The Complete Guide to Email Encryption for Google Apps Administrators Alarming increases in security breaches and data leaks,

More information

The Right Way to do Exchange in the Cloud

The Right Way to do Exchange in the Cloud The Right Way to do Exchange in the Cloud SilverSky 440 Wheelers Farms Road Suite 202 Milford CT 06461 silversky.com 2013 SilverSky P.2 The right way to do Exchange in the cloud Executive Summary For the

More information

Commissioned Study. SURVEY: Mobile Threats are Real and Costly

Commissioned Study. SURVEY: Mobile Threats are Real and Costly Commissioned Study SURVEY: Mobile Threats are Real and Costly Introduction A lack of integrated mobile security is costing companies in terms of everything from lost productivity to lost data. Cyber criminals

More information

Kyriacos Kokkinos IBM Executive Director Analytics Consulting

Kyriacos Kokkinos IBM Executive Director Analytics Consulting Kyriacos Kokkinos IBM Executive Director Analytics Consulting Contents CMO demographics The CMO s changing world The CMO s relationship with the C-suite Profiling the CMO What it takes for success in a

More information