Shadow IT in the Enterprise



Similar documents
Shadow IT in the Enterprise

Storage Infrastructure as a Service

Top 10 Storage Headaches in the Distributed Enterprise

White Paper: 5 Ways Cloud-integrated Storage Reduces Costs

Eliminating the Need for WAN Acceleration Using the Cloud

White Paper: Nasuni Cloud NAS. Nasuni Cloud NAS. Combining the Best of Cloud and On-premises Storage

UniFS A True Global File System

Module 1: Facilitated e-learning

Accelerate your sales with SuiteBox

Introduction to Dropbox. Jim Miller, LCITO Office Mobile

The Security Impact of Mobile Device Use by Employees

The Importance of Collaboration in Today's S Business Environment

1 Executive Summary Document Structure Business Context... 6

Getting Started with BYOD

How cloud computing can transform your business landscape

Cloud Computing. Orcas Island Chamber of Commerce Presentation November 7, 2012 Tony P Ghazel

Eversheds enhances agility and competitive advantage with Computacenter managed service

Key Authentication Considerations for Your Mobile Strategy

How To Protect Your Mobile Devices From Security Threats

Global Headquarters: 5 Speen Street Framingham, MA USA P F

COLLABORATION TRENDS AND TECHNOLOGY

How cloud computing can transform your business landscape.

CIO survey: All s not well at endpoints

Consumerization Survey Report The Consumerization of IT

Internet Security for Remote Users

Secure Mobile Content Management for the Enterprise

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution

Managing the Healthcare Information Stream

The Changing Dynamics of Mobility in the Workplace

WEBREZPRO. A Property Management System for Vacation Rentals. A WebRezPro Product Report

Evolving your network for the BYOD Era

Moving your business to the Cloud Fact or Fiction?

File Sync And Share And The Future Of Work

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

CA Enterprise Mobility Management MSO

Mobility-as-a-Service: Cost-Effectively Enable and Manage Enterprise Mobility in the Cloud

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Effective Storage Management for Cloud Computing

Trust No One Encrypt Everything!

APP DEV. We build your ideas into web and mobile applications. steicho. Technological Solutions

File Sync And Share Grows In The Enterprise: Capture The Benefits And Manage The Risks

EMBRACING SECURE BYOD

Mobile Analytics Report November 2013

BYOD & Virtualization: Managing Mobile

Is Your BYOD Plan Exposing You to Risk?

Is Cloud Communications Right for Your Business?

The Big Deal About Big Data Research Study

Why Data Management Matters Right Now

Solve the Dropbox Problem with Enterprise Content Connectors. Whitepaper Solve the Dropbox Problem with Enterprise Content Connectors

RUNNING HEAD: BRING YOUR OWN DEVICE 1

Connecting to Compete: The Case for Upgrading Your Network

Top Talent is Mobile. Are You?

SAP White Paper Enterprise Mobility

About me & Submission details

Big Data and Collaboration: Security Solutions from On-Premises to Cloud and Mobile

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology

Sta t te of ark ansas Video e Str ateg e y

Governance Takes A Central Role As Enterprises Shift To Mobile

The Holistic Guide to BYOD in Your Business Jazib Frahim

Secure Data Sharing in the Enterprise

Man vs. Mobile. Mobile Business Intelligence is Here to Stay

Research Report. Abstract: Endpoint Device Backup Trends. December By Lauren Whitehouse With Bill Lundell and John McKnight

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy

Online File Sharing and Collaboration: Deployment Model Trends

WhitePaper. Private Cloud Computing Essentials

Wie finde ich die beste The State of VPN-Lösung für mein Unternehmen? Remote Access Security in the U.S. Remote Access

Acronis BRING YOUR OWN DEVICE

SMALL BUSINESS. the basics. in telecommunications solutions

The Genealogy Cloud: Which Online Storage Program is Right For You Page , copyright High-Definition Genealogy. All rights reserved.

Top Five Reasons to Implement Unified Communications Now

The State of Cloud Storage

Feature. Leveraging and Securing the Bring Your Own Device and Technology Approach

A Guide to Hybrid Cloud An inside-out approach for extending your data center to the cloud

Effective storage management and data protection for cloud computing

The Copy Data Problem: An Order of Magnitude Analysis

Below are several selections from Fridman s list.

How To Make Money From Insurance

The Top 7 Ways to Protect Your Data in the New World of

When Enterprise Content Goes Mobile

RSA SECURITY SOLUTIONS. Secure Mobile & Remote Access

How Desktop-as-a-Service Can Solve Higher Education s End-User Computing Challenges

T H E E D U C A T I O N C L O U D. Freedom... a true Cloud based solution for education!

Business Case for Voltage Secur Mobile Edition

12 Key File Sync and Share Advantages of Transporter Over Box for Enterprise

The Tablet Evolution 2013

Mobile First Strategy

Bring Your Own Device (BYOD) and Mobile Device Management.

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

UIT USpace Flexible and Secure File Manager for Cloud Storage

Enterprise Mobility Management: A Data Security Checklist. Whitepaper Enterprise Mobility Management: A Checklist for Securing Content

DesktopDirect. White Paper. Tablet Access to Business Applications

VDI Security for Better Protection and Performance

Cloud Computing; is it right for my business?

VDI can reduce costs, simplify systems and provide a less frustrating experience for users.

SCADA Cloud Computing

How To Make Files Share Secure (Fss) Work For Corporate Use

White. Paper. Evaluating Sync and Share Solutions. Balancing Security, Control, and Productivity. September, 2014

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

BDO S CLOUD ACCOUNTING SOLUTIONS Another helping hand to grow your business START

Vodafone Video Conferencing Making businesses ready for collaboration. Vodafone Power to you

Transcription:

Confessions from More Than 1,000 Enterprise Users

Introduction In today s work environment, the proliferation of smartphones and tablets is driving mobility and a corresponding culture of convenient, always on access to information. More than ever before, employees are demanding access to their files at any time and from any device. Furthermore, this culture of access is contributing to more distributed environments, with teams in multiple offices needing to work together across the boundaries of physical locations. Oftentimes, the expectation for convenient access from anywhere is outpacing IT s ability to deliver. Consequently, users are turning to filesharing solutions geared toward consumers, such as Dropbox, to fill this gap. This concept of using software solutions without IT approval is referred to as Shadow IT. Solutions in Shadow IT are unmanaged, unmonitored and unsupported by IT, putting the data stored in these solutions at risk of loss and exposure to unauthorized users. Companies aware of the risks associated with Shadow IT work to eliminate, or at least mitigate, this risk by implementing policies prohibiting the use of unapproved solutions. However, policies alone are not effective; organizations must consider providing solutions that are approved by IT and deliver the functionality that users demand. In September 2012, Nasuni conducted a survey of more than 1,300 corporate IT users to better understand employee habits regarding Shadow IT and their impact on corporate IT systems and security. This paper presents the survey results, including what users revealed about their use of consumer file sharing solutions and personal devices. Who Uses Dropbox at Work? Dropbox is one of the most commonly employed file sharing services in Shadow IT, offering a simple tool for file storage and sharing. According to Dropbox, the number of registered users is growing exponentially and is currently at 100 million users worldwide 1. Shadow IT (File Sharing) Usage by Industry 1 http://www.forbes.com/sites/victoriabarret/2012/11/13/dropbox-hits-100-million-users-says-drew-houston 2

It is commonly understood that people use Dropbox to share personal photos, videos and documents. The question is how many people are using Dropbox for work? And, perhaps more importantly, do organizations have a clear view into who is using Dropbox? After an organization identifies who is leveraging Dropbox, the next step is to understand what type of files reside in it are they public or private files? While it is possible that the files stored in Dropbox contain non-sensitive information, it is more likely that users have become accustomed to using these services for all files, including sensitive content. The sensitive data stored in Dropbox is not secure and just as importantly, not controlled by IT. This means that if an employee leaves the company, the information that user has stored goes with them, creating a significant risk of data loss or exposure. Furthermore, as the amount of sensitive corporate data stored in Dropbox increases, the online filesharing service will become a more attractive target for hackers and other malicious groups. Dropbox Usage by Department According to the survey, 1 out of every 5 respondents is placing work files at risk in a personal Dropbox account. In the process of leveraging filesharing services users are storing files outside of the managed IT infrastructure in a solution that does not provide enterprise class security or control. The frequent use of Dropbox at work, combined with the security concerns, is one of the most troubling aspects of Shadow IT. A critical step in addressing the risks is understanding who in the organization is leveraging this tool. Dropbox Usage by title 3

The Move to Mobile Beyond using file-sharing services on desktops and laptops, users are leveraging smart phones and tablets to access work files, attaining the speed and flexibility they need for high productivity in a mobile world. growth of mobile devices will naturally drive demand for accessing work files; 73% of respondents who are planning to acquire a new device say they will use the device to access work files. 3 out of 5 users with a personal mobile device resort to using their own device to access work files because the company does not provide the tools they require. Dropbox usage is prevalent in the mobile world as well; after e-mail, it is the most common tool used for accessing work files on a mobile device. Increasing Mobile Devices in the Workplace Tools Used to Access Work Files on Personal Mobile Devices As the number of devices grows, the use of Dropbox and Shadow IT will simultaneously increase to meet the demands of new users. 1 out of 4 survey respondents plan to have an additional smart phone or tablet before the end of the year. This rapid Policies for Protection A critical part of implementing an effective IT policy is raising awareness of the policy among users. The survey data shows that almost half of all respondents do not know the company policy on accessing file-sharing services, indicating that these companies either do not have policies or have not effectively communicated the policy to the users. However, companies that have educated their users about corporate IT policies have not fully addressed the problem with Shadow IT either. Our survey suggests that 49% of users do not follow IT policies even when educated about the policy. Are you wondering who your Dropbox users are? Survey data shows that a smart phone or tablet user is 3x more likely to use Dropbox. 4

What is the policy access or no access? 54% of respondents work at organizations that do not allow access to file sharing services, while 46% work at organizations that do allow access to file sharing services. An effective IT policy requires both education and participation. Without sufficient knowledge and user participation, IT will continue to face challenges with Shadow IT. Conclusion As smart phone and tablet usage grows in adoption, the growth of Shadow IT will likely continue, fueled by users requirements for anytime, anywhere access to files. Furthermore, policy and education alone do not address the emergence of Shadow IT and resulting unmanaged file sharing and data exposure. In order to fully address this issue, organizations must consider providing the tools that deliver the convenient and flexible access to information that users want. Without the proper tools provided, managed, and supported by IT, users will continue to find alternative solutions and work around existing policies, leaving IT in the dark. Company Policy for File Sharing Services and User Behavior 5

The Respondents More than 1,300 corporate IT users responded to the survey from a range of industries, departments and levels in the organization. In some cases, data was analyzed to compare IT vs. non-it users to better understand the unique behaviors of the different groups. The demographic breakdown of respondents is: Survey Demographics 6

About Nasuni Nasuni offers a powerful Storage Infrastructure as a Service: a uniform, complete storage solution delivered as a service, enabling distributed organizations to offload the management of the storage infrastructure (including backup, replication and offsite protection) and consume storage on-demand, without any change to the way users access information. With Nasuni, corporate data is uniformly available in all locations, enabling organizations to increase user productivity, streamline costs and improve business agility. Our team is made up of enterprise storage, security and networking industry veterans with a shared vision of transforming the way enterprise organizations view data storage. We believe that storage should be as easy to purchase, consume and manage as the electricity that keeps the lights on. Nasuni Corporation 2014, All Rights Reserved 313 Speen Street, Natick, MA 01760-1538 1.508.433.6200 WP_2.14