Welcome!

News Feed Item

Organizations See Public Cloud Sharing Tools as Primary Security Risk

Organizations consider public cloud sharing tools as a primary security risk according to a survey of 621 IT professional conducted by Axway (NYSE Euronext: AXW.PA), a market leader in governing the flow of data, and Ponemon Institute. The research, “Achieving Security in Workplace File Sharing,” found that nearly 50 percent of organizations believe that popular cloud-sharing services such as DropBox, Google Docs and Box are not suitable for business use. Key concerns highlighted by respondents included the inability to determine if sensitive data was lost or stolen due to a data breach in the cloud and fears over the negative consequences of public cloud tools due to the potential loss of intellectual property.

“The results of this study definitively illustrate that organizations are highly concerned about the security risks posed by both public cloud and on-premise file sharing tools, and they’re absolutely right to be wary of them,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. “We’re acutely aware of the potentially catastrophic consequences that can occur as a result of security breaches of these tools. However, it’s our hope that these findings encourage organizations to take a close look at their security strategies related to file sharing, and in turn implement a comprehensive set of policies and technologies to help ensure the secure transfer of sensitive information across their workforce.”

The study detailed and analyzed survey responses from 621 IT and IT security practitioners on public cloud file sharing in the workplace, threats to corporate information, and features most desirable in achieving security in the sharing of files and documents. Key findings included:

  • 89% of organizations are highly unlikely to know if sensitive or confidential data was lost or stolen due to a data breach in the public cloud
  • 80% are concerned about the negative consequences of public cloud tools due to the potential loss of intellectual property
  • 69% are not likely to know whether employees are using unapproved and risky file sharing tools
  • 66% rank file sharing high or very high risk to their organization
  • Nearly 50% believe popular cloud-sharing services are not suitable for business use

“In recent years, employees have been increasingly adopting public cloud tools, such as DropBox, Box and Google Docs, to exchange and share documents and company information in the workplace,” said Dave Butcher, senior director, product portfolio management, Axway. “These tools provide a great user experience, but there are serious question marks about their enterprise-class security credentials, illustrated by the fact that many financial and healthcare organizations block their use. This survey highlighted those concerns and points to the need for a solution that can address the usability, security and policy management requirements of users and IT departments.”

To read Ponemon’s full research report visit: http://www.axway.com/sites/default/files/repository/Axway_Whitepaper_Ponemon-Report_EN.pdf

For more information about Axway visit: http://www.axway.com

Follow Axway on Twitter @Axway

About Axway

Axway (NYSE Euronext: AXW.PA), a market leader in governing the flow of data, is a global software company with more than 11,000 public- and private-sector customers in 100 countries. For more than a decade, Axway has empowered leading organizations around the world with proven solutions that help manage business-critical interactions through the exchange of data flowing across the enterprise, among B2B communities, cloud and mobile devices. Our award-winning solutions span business-to-business integration, managed file transfer, API and identity management, and email security– offered on premise and in the Cloud with professional and managed services. Axway is registered in France with headquarters in the United States and offices in 19 countries. www.axway.com

About Axway 5 Suite

Axway 5 Suite offers control and optimization of the flow of data through integration, visibility, policy, security and reliability to govern business-to-business interactions, communities, systems and data types — within and beyond the enterprise edge.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, discussed the best practices that will ensure a successful smart city journey.
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT depl...
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, discussed how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He also discussed how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors an...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, explained the best practices of continuous testing at high scale, which is rele...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.