EXECUTIVE BRIEF PON SPON. The Cloud Application Explosion. Published April 2013. An Osterman Research Executive Brief. sponsored by.



Similar documents
WHITE PAPER SPON. Do Ex-Employees Still Have Access to Your Corporate Data? Published August 2014 SPONSORED BY. An Osterman Research White Paper

EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, Published May An Osterman Research Executive Brief

SURVEY REPORT SPON. Identifying Critical Gaps in Database Security. Published April An Osterman Research Survey Report.

WHITE PAPER SPON. Archive Migration: Opportunities and Risks. Published February An Osterman Research White Paper.

WHITE PAPER SPON. Making File Transfer Easier, Compliant and More Secure. Published February 2012 SPONSORED BY!!! An Osterman Research White Paper

WHITE PAPER SPON. Information Security Best Practices: Why Classification is Key. Published November 2011 SPONSORED BY

The Cost Benefits of a Hybrid Approach to Security

Total Cost of Ownership - SharePoint Security

WHITE PAPER SPON. What is the Total Value of Ownership for a Hosted PBX? Published September An Osterman Research White Paper.

EXECUTIVE BRIEF SPON. Third-Party Archiving Solutions Are Still Needed in Exchange 2013 Environments. Published April 2015

How To Choose Between Onpremises Or Cloud Based

WHITE PAPER SPON. The Cost and ROI Advantages of IronKey Workspace W300 for Windows to Go. Published May 2013 SPONSORED BY

WHITE PAPER SPON. Achieving Rapid Payback With Mobile Device Management. Published November An Osterman Research White Paper.

The Growing Problem of Outbound Spam

WHITE PAPER SPON. Making File Transfer Easier, Compliant and More Secure. Published February 2012 SPONSORED BY!!! An Osterman Research White Paper

SURVEY REPORT PON SPON. Results of a Survey Conducted for Electric Cloud. Published January An Osterman Research Survey Report.

SURVEY REPORT SPON. Small and Medium Business: IT/Security Priorities and Preferences. Published September An Osterman Research Survey Report

How To Calculate Total Cost Of Ownership (Tco) For Systems

Using SaaS to Reduce the Costs of Security

WHITE PAPER SPON. The Benefits of Vendor Consolidation and Centralized IT Management. Published June 2014 SPONSORED BY

WHITE PAPER SPON. A Comparison of and Collaboration Platforms. Published October 2012 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. Why the Cloud is Not Killing Off the On-Premises Market. Published April 2011 SPONSORED BY. An Osterman Research White Paper

The Cost Effective Migration to Integrated Hybrid SaaS Security

WHITE PAPER SPON. Encryption is an Essential Best Practice. Published August 2014 SPONSORED BY. An Osterman Research White Paper.

EXECUTIVE BRIEF SPON. Third-Party Archiving Solutions Are Still Needed in Exchange 2010 Environments. Published March 2012

WHITE PAPER SPON. Managing SharePoint Growth: Strategies for Planning and Governance. Published October An Osterman Research White Paper

WHITE PAPER SPON. Business-Class File Sharing Best Practices SPONSORED BY. An Osterman Research White Paper. sponsored by.

SURVEY REPORT SPON. Security Awareness Training Effectiveness Report. Results of a Survey of KnowBe4 Customers and Non-Customers. Published July 2013

WHITE PAPER. Taking a Strategic Approach to Unified Communications: Best of Breed vs. Single Vendor Solutions SPON. Published February 2013

Why You Need to Focus on Social Networking in Your Company

Realizing the Cost Savings and Other Benefits from SaaS Archiving

Achieving Greater TCO Benefits Using a Secure Workspace Solution: Comparing TCO for Three Telework Approaches

WHITE PAPER PON SPON. Comparing the Cost of Alt-N MDaemon and Exchange. Published July 2013 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. Dealing with Data Breaches and Data Loss Prevention. Published March An Osterman Research White Paper.

WHITE PAPER SPON. What is the Total Value of Ownership for a Hosted PBX? Published September 2012 SPONSORED BY. An Osterman Research White Paper

Why You Need to Consider Virtualization

WHITE PAPER SPON. Critical Issues in Evaluating the TCO of . Published March 2013 SPONSORED BY. An Osterman Research White Paper.

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost

WHITE PAPER SPON. The Need for IT to Get in Front of the BYOD Problem. Published October 2012 SPONSORED BY. An Osterman Research White Paper

THE VALUE OF VOICE-ENABLING OFFICE 365. By Mike Osterman President Osterman Research

WHITE PAPER SPON. Managing Content in Enterprise Social Networks. Published August 2014 SPONSORED BY. An Osterman Research White Paper.

WHITE PAPER SPON. Managing Growth and Driving Down Costs for Microsoft SharePoint. Published October An Osterman Research White Paper

WHITE PAPER SPON. Considerations for Archiving in Exchange Environments. Published July 2013 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. Why Should You Encrypt and What Happens if You Don t? Published July An Osterman Research White Paper.

Skybox Security Survey: Next-Generation Firewall Management

Should You Install Messaging Security Software on Your Exchange Server?

Microsoft Lync Server 2010 and the Unified Communications Market Key Considerations for Adoption, Deployment and Ongoing Management

WHITE PAPER SPON. A Cloud-Client Architecture Provides Increased Security at Lower Cost. Published January 2012 SPONSORED BY

WHITE PAPER SPON. How SMBs Can Unleash the Power of the Cloud. Published September 2011 SPONSORED BY. An Osterman Research White Paper.

Solving.PST Management Problems in Microsoft Exchange Environments

Solving Key Management Problems in Lotus Notes/Domino Environments

WHITE PAPER SPON. The Cloud Advantage: Increased Security and Lower Costs for SMBs. Published August 2012 SPONSORED BY

WHITE PAPER SPON. Mobile Devices in the Enterprise: MDM Usage and Adoption Trends. Published July 2012 SPONSORED BY. An Osterman Research White Paper

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

THE BENEFITS OF A CLOUD BASED PBX WITH HOSTED LYNC. By Mike Osterman President Osterman Research

WHITE PAPER SPON. What is the Total Value of Ownership for a Hosted PBX? Published December 2014 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. Pain Free Unified Communications and Collaboration. Published May 2011 SPONSORED BY. An Osterman Research White Paper.

The Need for a Better Way to Send Files and Attachments an Osterman Research white paper sponsored by

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.

Authentication Strategy: Balancing Security and Convenience

10 Steps to Establishing an Effective Retention Policy

Whitepaper: File-sharing and sync done right

WHITE PAPER SPON. Three Steps to Get Started With DLP. Published July 2013 SPONSORED BY. An Osterman Research White Paper.

WHITE PAPER SPON. Comparing the Cost of Leading Systems. Published June 2011 SPONSORED BY. An Osterman Research White Paper.

WHITE PAPER SPON. Securely Enabling Remote Workers at Lower Cost Than Traditional Approaches. Published January 2014 SPONSORED BY

CLOUD-BASED PBX: A CLEAR VALUE FOR BUSINESSES. By Mike Osterman President Osterman Research

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

WHITE PAPER SPON. Addressing Information Governance Challenges. Published March 2014 SPONSORED BY. An Osterman Research White Paper.

Security and Privacy Considerations for BYOD

The Benefits of Unified Communications

The Advantages of Cloud-based Messaging and Collaboration Services

How Do Threat Actors Move Deeper Into Your Network?

The 5 Best Practices For Archiving

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

WHITE PAPER SPON. Why Securing Communications and Content is a Critical Best Practice. Published October 2012 SPONSORED BY

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Netskope Cloud Report. Report Highlights. cloud report. Three of the top 10 cloud apps are Storage, and enterprises use an average of 26 such apps

WHITE PAPER SPON. The Importance of Continuity in Office 365 Environments. Published April 2013 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER. Using DNS RPZ to Protect Against Web Threats SPON. Published June 2015 SPONSORED BY. An Osterman Research White Paper.

RESEARCH NOTE. Workplace Service. Why You Need A Technology Toolbox For External Collaboration

Reducing the cost and complexity of endpoint management

HTTPS Inspection with Cisco CWS

V1.4. Spambrella Continuity SaaS. August 2

A Review of MessageSolution Enterprise Archive and Enterprise File Archive

Service Updates and Enhancements

ForeScout MDM Enterprise

Secure Cross Border File Protection & Sharing for Enterprise Product Brief CRYPTOMILL INC

Selecting Your Essential Cloud Services

CA Technologies Healthcare security solutions:

The ForeScout Difference

Cisco Cloud Web Security

Safeguarding the cloud with IBM Dynamic Cloud Security

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Content Security: Protect Your Network with Five Must-Haves

IBM QRadar Security Intelligence April 2013

Five Best Practices for Secure Enterprise Content Mobility

Primer CLOUD COMPUTING DEMYSTIFIED 5 CLOUD COMPUTING MYTHS EVERY SMALL BUSINESS SHOULD KNOW ABOUT

Integrating Single Sign-on Across the Cloud By David Strom

SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK

Transcription:

EXECUTIVE BRIEF PON Explosion An Osterman Research Executive Brief Published April 2013 sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 253 630 5839 Fax: +1 253 458 0934 info@ostermanresearch.com www.ostermanresearch.com twitter.com/mosterman

THE CLOUD APPLICATION EXPLOSION: A PROBLEM YOU NEED TO ADDRESS There are a large and growing number of cloud-based applications being deployed in organizations of all sizes to provide a variety of capabilities, including email, real-time communications, social media, file sharing, file storage, telephony and other services. Among the more popular of these applications are Twitter, Facebook, LinkedIn, Google Plus, Hotmail, Yahoo! Mail, Google Mail, YouSendIt, Dropbox, Box and Microsoft SkyDrive, although there are literally thousands of cloud-based applications in use worldwide. Some of these applications have been approved and/or deployed by in-house IT departments, although most have been deployed by individual users without the authorization or often the knowledge of the IT department. For example, Dropbox is currently used in 68% of organizations, but only 45% of these deployments have the blessing of the IT department. Similarly, Apple icloud is used in 65% of organizations, but only 57% of these deployments have IT s blessing; while SkyDrive is used in 44% of organizations with only 56% having IT s blessing. Osterman Research has found that small organizations have the highest penetration of cloud-based applications in use, although these applications are commonly found in even the largest enterprises. Leading Cloud-Based Applications in Use Some applications have been approved and/or deployed by inhouse IT departments, although most have been deployed by individual users without the authorization or often the knowledge of the IT department. WHY CLOUD-BASED APPS? It is important to note that the vast majority of employees who deploy cloud-based applications do so to solve specific business problems that they cannot easily solve in other ways, such as gaps in the capabilities provided by their internal IT departments. For example, many users will often deploy a file-storage application in order to more easily share content with others inside and outside their organization, or to have all of their critical business files available when traveling or when working from home. Similarly, users will often employ a file-sharing application to overcome file-size limitations in their corporate email system. 2013 Osterman Research, Inc. 1

Fundamentally, cloud-based applications have been deployed by employees with the best of intentions and often as a result of IT s inability to deploy important features and functions that users need in order to remain productive. THE RISK IS SIGNIFICANT Although cloud-based applications are most often deployed to enhance users productivity and to improve business processes, they carry with them a number of serious risks. For example: Cloud-based applications typically store large amounts of corporate data much of it of a sensitive or confidential nature in data repositories that are outside the control of the organization that owns this data. When data is stored in the cloud, it is often not accessible to the organization at large. This creates significant problems when an organization must have access to this information during a regulatory audit, for ediscovery purposes, or when senior managers otherwise must gain access to it. Most of the time, organizations do not control access to these applications or the data they contain, nor do they control the methods of access to them. Moreover, employees typically control access to data stored in the cloud, not the organization itself, creating significant problems if any employee leaves the organization or forgets that data is stored in a particular cloud repository. A related problem is that access methods are typically weak, normally requiring only a user-defined username and password for access. For sensitive or confidential information, this form of authentication is unsatisfactorily weak. Corporate policies are often ignored or followed incompletely when data is stored in cloud-based applications. This includes policies focused on encrypting sensitive data, establishing expiration periods for files, or determining permissions on certain types of data. While many cloud-based providers offer robust security for their customers data, there have been some well-publicized breaches that have permitted access to customer data by unauthorized parties. For all intents and purposes, organizations are subject to whatever security standards or lack thereof maintained by cloud providers. IT and other decision makers have little or no visibility into data that resides in cloud-based data stores. Because many cloud-based providers do not run malware scanning on their customers content, cloud-based applications present another means of ingress for malware into corporate networks. For example, a user who accesses his or her Dropbox account from home using a PC whose anti-virus signatures are out of date may inadvertently infect a file, load it back into Dropbox, and then infect the corporate network when accessing the file from his or her work PC. Cloud-based applications typically store large amounts of corporate data much of it of a sensitive or confidential nature in data repositories that are outside the control of the organization that owns this data. IMPORTANT QUESTIONS TO ASK Business and IT decision makers should ask and properly answer some critical questions about the use of cloud-based applications in their organizations in order to maintain robust access control and to protect sensitive and confidential data assets: Do you know what applications are in use across your organization? Many decision makers do not have good visibility into how many users employ personally deployed and managed applications, what these applications are, what data they contain, etc. 2013 Osterman Research, Inc. 2

Can access to these cloud-based applications be managed through your current access and identity management infrastructure? If so, are they being managed this way today? If not, will cloud-based applications require an entirely new set of tools? Do you know the risks you face? This includes not only the risks of losing access to important corporate data, but also the risks associated with data breaches and their remediation, violation of federal data protection statutes, increased risks of data spoliation during legal proceedings, etc. Have you quantified these risks? This is an important step in the process of understanding risks, since a single data breach or an inability to satisfy an ediscovery order can cost hundreds of thousands or millions of dollars. Have you established a plan for managing access to cloud-based applications? In short, have you answered all of the questions above to the satisfaction of your senior IT management, senior business decision makers, internal legal counsel and other key stakeholders and then created a plan to address the risks and costs you face from unmanaged use of cloud-based applications? RECOMMENDATIONS Osterman Research offers the following recommendations to organizations that must address the growing use of cloud-based applications in their organizations: Understand how and why cloud-based applications are being used in your organization in the context of what they offer that IT does not provide and other reasons that users employ them. Refrain from the temptation to impose draconian controls prohibiting the use of these applications. These controls are unlikely to be effective anyway, and imposing them will simply discourage employees and make their work more difficult. Implement detailed and thorough policies focused on how cloud-based applications are to be used, the controls that IT should have over them, and how employees should use them. Implement detailed and thorough policies focused on how cloud-based applications are to be used, the controls that IT should have over them, and how employees should use them. Educate users about best practices when using cloud-based applications. This might include not storing highly sensitive data in non-secure repositories, not using personal Webmail during email outages to send data that must be archived or encrypted, or optimal methods for sending very large files that cannot be sent through email. Finally, deploy robust access management technologies that will enable IT to control access to cloud-based applications and the data sent through and stored in them. 2013 Osterman Research, Inc. 3

ABOUT McAFEE SOLUTIONS Integrated Web and Identity solutions from McAfee provide improved security at every phase of the web experience. Organizations can easily manage cloud application access through a user-friendly single-sign-on portal. Strong authentication through one-time-passwords ensures added security for select or all applications. Granular control of data exiting the organization through cloud applications using DLP rules along with granular application control ensures consistent policy enforcement across the broad and growing spectrum of cloud applications and providers. Detailed logging and reporting enables visibility of application use and helps demonstrate compliance, regardless of device used or location of the user. For protection against advanced malware and other hidden threats in returned traffic, McAfee layers numerous threat technologies to provide the most in-depth web security available. From opening content and scanning active elements in real-time to comprehensive signature-based coverage and web reputation, McAfee s layered approach optimizes several technologies for the best combination of security and performance. Whether looking for the control of an onsite solution, the ease of Security-asa-Service (SaaS) management or a hybrid combination of the two, McAfee empowers organizations to deploy web access and security the way that best fits current and future needs. McAfee offers true deployment flexibility without forcing organizations to backhaul web traffic to a central location. Shared policy across Web Protection deployments enables the same security profile to be enforced no matter what device is used or the location of that user or device. 2013 Osterman Research, Inc. All rights reserved. No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without prior written authorization of Osterman Research, Inc. Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this document or any software product or other offering referenced herein serve as a substitute for the reader s compliance with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively, Laws )) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of the information contained in this document. THIS DOCUMENT IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL. 2013 Osterman Research, Inc. 4