Welcome!

News Feed Item

Organizations See Public Cloud Sharing Tools as Primary Security Risk

Organizations consider public cloud sharing tools as a primary security risk according to a survey of 621 IT professional conducted by Axway (NYSE Euronext: AXW.PA), a market leader in governing the flow of data, and Ponemon Institute. The research, “Achieving Security in Workplace File Sharing,” found that nearly 50 percent of organizations believe that popular cloud-sharing services such as DropBox, Google Docs and Box are not suitable for business use. Key concerns highlighted by respondents included the inability to determine if sensitive data was lost or stolen due to a data breach in the cloud and fears over the negative consequences of public cloud tools due to the potential loss of intellectual property.

“The results of this study definitively illustrate that organizations are highly concerned about the security risks posed by both public cloud and on-premise file sharing tools, and they’re absolutely right to be wary of them,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. “We’re acutely aware of the potentially catastrophic consequences that can occur as a result of security breaches of these tools. However, it’s our hope that these findings encourage organizations to take a close look at their security strategies related to file sharing, and in turn implement a comprehensive set of policies and technologies to help ensure the secure transfer of sensitive information across their workforce.”

The study detailed and analyzed survey responses from 621 IT and IT security practitioners on public cloud file sharing in the workplace, threats to corporate information, and features most desirable in achieving security in the sharing of files and documents. Key findings included:

  • 89% of organizations are highly unlikely to know if sensitive or confidential data was lost or stolen due to a data breach in the public cloud
  • 80% are concerned about the negative consequences of public cloud tools due to the potential loss of intellectual property
  • 69% are not likely to know whether employees are using unapproved and risky file sharing tools
  • 66% rank file sharing high or very high risk to their organization
  • Nearly 50% believe popular cloud-sharing services are not suitable for business use

“In recent years, employees have been increasingly adopting public cloud tools, such as DropBox, Box and Google Docs, to exchange and share documents and company information in the workplace,” said Dave Butcher, senior director, product portfolio management, Axway. “These tools provide a great user experience, but there are serious question marks about their enterprise-class security credentials, illustrated by the fact that many financial and healthcare organizations block their use. This survey highlighted those concerns and points to the need for a solution that can address the usability, security and policy management requirements of users and IT departments.”

To read Ponemon’s full research report visit: http://www.axway.com/sites/default/files/repository/Axway_Whitepaper_Ponemon-Report_EN.pdf

For more information about Axway visit: http://www.axway.com

Follow Axway on Twitter @Axway

About Axway

Axway (NYSE Euronext: AXW.PA), a market leader in governing the flow of data, is a global software company with more than 11,000 public- and private-sector customers in 100 countries. For more than a decade, Axway has empowered leading organizations around the world with proven solutions that help manage business-critical interactions through the exchange of data flowing across the enterprise, among B2B communities, cloud and mobile devices. Our award-winning solutions span business-to-business integration, managed file transfer, API and identity management, and email security– offered on premise and in the Cloud with professional and managed services. Axway is registered in France with headquarters in the United States and offices in 19 countries. www.axway.com

About Axway 5 Suite

Axway 5 Suite offers control and optimization of the flow of data through integration, visibility, policy, security and reliability to govern business-to-business interactions, communities, systems and data types — within and beyond the enterprise edge.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In his session at @DevOpsSummit at 19th Cloud Expo, Yoseph Reuveni, Director of Software Engineering at Jet.com, will discuss Jet.com's journey into containerizing Microsoft-based technologies like C# and F# into Docker. He will talk about lessons learned and challenges faced, the Mono framework tryout and how they deployed everything into Azure cloud. Yoseph Reuveni is a technology leader with unique experience developing and running high throughput (over 1M tps) distributed systems with extre...
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"We provide DevOps solutions. We also partner with some key players in the DevOps space and we use the technology that we partner with to engineer custom solutions for different organizations," stated Himanshu Chhetri, CTO of Addteq, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Actian Corporation has announced the latest version of the Actian Vector in Hadoop (VectorH) database, generally available at the end of July. VectorH is based on the same query engine that powers Actian Vector, which recently doubled the TPC-H benchmark record for non-clustered systems at the 3000GB scale factor (see tpc.org/3323). The ability to easily ingest information from different data sources and rapidly develop queries to make better business decisions is becoming increasingly importan...
The IoT has the potential to create a renaissance of manufacturing in the US and elsewhere. In his session at 18th Cloud Expo, Florent Solt, CTO and chief architect of Netvibes, discussed how the expected exponential increase in the amount of data that will be processed, transported, stored, and accessed means there will be a huge demand for smart technologies to deliver it. Florent Solt is the CTO and chief architect of Netvibes. Prior to joining Netvibes in 2007, he co-founded Rift Technologi...
"Operations is sort of the maturation of cloud utilization and the move to the cloud," explained Steve Anderson, Product Manager for BMC’s Cloud Lifecycle Management, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, gave users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion with b...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
What are the successful IoT innovations from emerging markets? What are the unique challenges and opportunities from these markets? How did the constraints in connectivity among others lead to groundbreaking insights? In her session at @ThingsExpo, Carmen Feliciano, a Principal at AMDG, will answer all these questions and share how you can apply IoT best practices and frameworks from the emerging markets to your own business.
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...