Shadow IT in the Enterprise

Similar documents
Consumer Opinions and Habits A XIRRUS STUDY

Mobile Security Trends in the Workplace

WHAT YOU NEED TO KNOW ABOUT THE EVOLVING WORKPLACE Adapting to new, advanced communications technology

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

Best Practices in Securing a Multicloud World

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Using Biometric Authentication to Elevate Enterprise Security

Evolve Your Security Operations Strategy To Account For Cloud

Mobile Internet & Smartphone Adoption

Next Generation Privilege Identity Management

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

Multicloud is the New Normal Cloud enables Digital Transformation (DX), but more clouds bring more challenges

IBM Cloud Internet Services: Optimizing security to protect your web applications

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director

ENTERPRISE MOBILITY TRENDS

Key Authentication Considerations for Your Mobile Strategy

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

THE NEW COLLABORATIVE WORKFORCE. Enterprise Communications, Advanced.

7 Reasons to Worry About Your Current Archiving Strategy

Taking Back Control of Your Network With SD-LAN

Security Solutions for Mobile Users in the Workplace

NEN The Education Network

SHADOW IT: DATA PROTECTION AND CLOUD SECURITY

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Storage Made Easy. Enterprise File Fabric for Unified Data Indexing, Auditing, e-compliance, and secure file sharing.

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT. August prevoty.com. August 2015

Modern Database Architectures Demand Modern Data Security Measures

DaaS Market Report Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective

Enterprise Mobility. BEYOND MDM: A MULTIDIMENSIONAL MOBILITY STRATEGY Why device-centric strategies no longer meet today s mobility needs

Securing Today s Mobile Workforce

Securing Health Data in a BYOD World

3-Part Guide to Developing a BYOD Strategy

SIEM: Five Requirements that Solve the Bigger Business Issues

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016

BACKUP TO THE FUTURE A SPICEWORKS SURVEY

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

THE TOP 5 DEVOPS CHALLENGES

BYOD: A Global Perspective

MULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH

Trends in Next Generation Data Center Infrastructure. Summary Results January 2018

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

BroadSoft UC-One User Experience Apps for the Anywhere Workplace

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

SoftNAS Cloud Data Management Products for AWS Add Breakthrough NAS Performance, Protection, Flexibility

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

The Next Generation of Mobile Learning. Tamar Elkeles, Qualcomm Kevin Oakes, i4cp

Preparing your network for the next wave of innovation

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Cisco Exam Questions & Answers

Keep the Door Open for Users and Closed to Hackers

Networking for a smarter data center: Getting it right

The State of Cloud Monitoring

Number: Passing Score: 825 Time Limit: 120 min File Version: Vendor: Cisco. Exam Code:

The Data Protection Rule and Hybrid Cloud Backup

Storage Area Network IV, II Sem

Mobile Devices prioritize User Experience

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

People risk. Capital risk. Technology risk

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

How to Evaluate a Next Generation Mobile Platform

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Portnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview

Enterprise Mobility Management: Why Size Doesn t Matter

Security Awareness Training Courses

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure

5 Pillars of API. management

Investing in a Better Storage Environment:

GLOBAL PKI TRENDS STUDY

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

Make security part of your client systems refresh

Why Enterprises Need to Optimize Their Data Centers

A Guide to Closing All Potential VDI Security Gaps

THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS

Data Sheet Instant Connect Mobile Client When your business is on the line, Instant Connect is here for your most critical communications needs. Welco

TRUSTED MOBILITY INDEX

Borderless Networks - Enabling the Borderless Organization. Michael Rau Vice President, CTO Worldwide Borderless Networks Sales

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Cloud Computing: Making the Right Choice for Your Organization

The Changing Role of Wi-Fi Are You Ready for the Wireless. Ron Groulx Empowered Networks

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

IBM smarter Business Resilience in the Cloud

Enabling the Always-On Enterprise

Contents. Enterprise Solution 04. Why Samsung? 05 WLAN 06. Voice Solution 08. Mobile Unified Communications 09. Enterprise Security 10

How Your Organization Can Drive Success in the Age of Digital Disruption

State of Office 365 Adoption & Risk A Dive into the Data. Jim Reavis, CEO, Cloud Security Alliance Brandon Cook, VP, Marketing, Skyhigh Networks

Cisco Borderless Networks Value Proposition

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

EMC ACADEMIC ALLIANCE

Choosing the Right Security Assessment

T he Inbox Report 2017

HOW TO ENABLE AFFORDABLE ENTERPRISE VIDEO FOR EVERYONE

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

The Problem with Privileged Users

Microsoft Skype for Business

Transcription:

Confessions from More than 1,000 Enterprise Users

Introduction In today s work environment, the proliferation of smartphones and tablets is driving mobility and a corresponding culture of convenient, always on access to information. More than ever before, employees are demanding access to their files at any time and from any device. Furthermore, this culture of access is contributing to more distributed environments, with teams in multiple offices needing to work together across the boundaries of physical locations. Oftentimes, the expectation for convenient access from anywhere is outpacing IT s ability to deliver. Consequently, users are turning to filesharing solutions geared toward consumers, such as Dropbox, to fill this gap. This concept of using software solutions without IT approval is referred to as Shadow IT. Solutions in Shadow IT are unmanaged, unmonitored and unsupported by IT, putting the data stored in these solutions at risk of loss and exposure to unauthorized users. Companies aware of the risks associated with Shadow IT work to eliminate, or at least mitigate, this risk by implementing policies prohibiting the use of unapproved solutions. However, policies alone are not effective; organizations must consider providing solutions that are approved by IT and deliver the functionality that users demand. In September 2012, Nasuni conducted a survey of more than 1,300 corporate IT users to better understand employee habits regarding Shadow IT and their impact on corporate IT systems and security. This paper presents the survey results, including what users revealed about their use of consumer file sharing solutions and personal devices. Who Uses Dropbox at Work? Dropbox is one of the most commonly employed file sharing services in Shadow IT, offering a simple tool for file storage and sharing. According to Dropbox, the number of registered users is growing exponentially and is currently at 100 million users worldwide 1. Shadow IT (File Sharing) Usage by Industry 1 http://www.forbes.com/sites/victoriabarret/2012/11/13/dropbox-hits-100-million-users-says-drew-houston 2

It is commonly understood that people use Dropbox to share personal photos, videos and documents. The question is how many people are using Dropbox for work? And, perhaps more importantly, do organizations have a clear view into who is using Dropbox? After an organization identifies who is leveraging Dropbox, the next step is to understand what type of files reside in it are they public or private files? While it is possible that the files stored in Dropbox contain non-sensitive information, it is more likely that users have become accustomed to using these services for all files, including sensitive content. The sensitive data stored in Dropbox is not secure and just as importantly, not controlled by IT. This means that if an employee leaves the company, the information that user has stored goes with them, creating a significant risk of data loss or exposure. Furthermore, as the amount of sensitive corporate data stored in Dropbox increases, the online filesharing service will become a more attractive target for hackers and other malicious groups. Dropbox Usage by Department According to the survey, 1 out of every 5 respondents is placing work files at risk in a personal Dropbox account. In the process of leveraging filesharing services users are storing files outside of the managed IT infrastructure in a solution that does not provide enterprise class security or control. The frequent use of Dropbox at work, combined with the security concerns, is one of the most troubling aspects of Shadow IT. A critical step in addressing the risks is understanding who in the organization is leveraging this tool. Dropbox Usage by title 3

The Move to Mobile Beyond using file-sharing services on desktops and laptops, users are leveraging smart phones and tablets to access work files, attaining the speed and flexibility they need for high productivity in a mobile world. growth of mobile devices will naturally drive demand for accessing work files; 73% of respondents who are planning to acquire a new device say they will use the device to access work files. 3 out of 5 users with a personal mobile device resort to using their own device to access work files because the company does not provide the tools they require. Dropbox usage is prevalent in the mobile world as well; after e-mail, it is the most common tool used for accessing work files on a mobile device. Increasing Mobile Devices in the Workplace Tools Used to Access Work Files on Personal Mobile Devices As the number of devices grows, the use of Dropbox and Shadow IT will simultaneously increase to meet the demands of new users. 1 out of 4 survey respondents plan to have an additional smart phone or tablet before the end of the year. This rapid Policies for Protection A critical part of implementing an effective IT policy is raising awareness of the policy among users. The survey data shows that almost half of all respondents do not know the company policy on accessing file-sharing services, indicating that these companies either do not have policies or have not effectively communicated the policy to the users. However, companies that have educated their users about corporate IT policies have not fully addressed the problem with Shadow IT either. Our survey suggests that 49% of users do not follow IT policies even when educated about the policy. Are you wondering who your Dropbox users are? Survey data shows that a smart phone or tablet user is 3x more likely to use Dropbox. 4

What is the policy access or no access? 54% of respondents work at organizations that do not allow access to file sharing services, while 46% work at organizations that do allow access to file sharing services. An effective IT policy requires both education and participation. Without sufficient knowledge and user participation, IT will continue to face challenges with Shadow IT. Conclusion As smart phone and tablet usage grows in adoption, the growth of Shadow IT will likely continue, fueled by users requirements for anytime, anywhere access to files. Furthermore, policy and education alone do not address the emergence of Shadow IT and resulting unmanaged file sharing and data exposure. In order to fully address this issue, organizations must consider providing the tools that deliver the convenient and flexible access to information that users want. Without the proper tools provided, managed, and supported by IT, users will continue to find alternative solutions and work around existing policies, leaving IT in the dark. Company Policy for File Sharing Services and User Behavior 5

The Respondents More than 1,300 corporate IT users responded to the survey from a range of industries, departments and levels in the organization. In some cases, data was analyzed to compare IT vs. non-it users to better understand the unique behaviors of the different groups. The demographic breakdown of respondents is: Survey Demographics 6

About Nasuni Nasuni is an enterprise storage company that provides distributed organizations with a powerful Cloud NAS service. By combining on-premises hardware and software with cloud storage, Nasuni delivers a secure file storage solution that provides high performance for users, simplified and centralized management for IT, and an easily scalable, complete storage service for the global enterprise. Nasuni Corporation 2015, All Rights Reserved NAS_WP_10.14