Latest Netskope Report: Security Nightmare For IT Departments

Latest Netskope Report: Security Nightmare For IT Departments

Latest Netskope Report: Security Nightmare For IT Departments

Netskope have today released the findings of their quarterly ‘Cloud Report’. The report, which complies the foremost trends on cloud app adoption and usage, discovered the emergence of several new trends. Chief among them was the ever-increasing number of apps that enable some kind of sharing and the security concerns which accompany them.

Sharing has traditionally been considered as something primarily done through cloud storage apps (where for every one upload there are three shares), however, the report notes that one out of every five apps in used on Netskope’s cloud app analytics platform (the ‘Netskope Active Platform’) now has sharing enabled. Additionally, forty nine of the fifty five app categories which the company track had sharing features.

The report found that top ten (non-storage) most frequently used apps for sharing were, in decreasing order, Facebook, Salesforce, Yammer, LinkedIn, Workday, Evernote, Zoho, QuickBooks, Trello and Concur. Sharing of this nature is a security nightmare for IT departments – although they are the ones who are responsible for protecting businesses against online threats, they often lack any useful insight into which apps are running in their environments, which of those apps allow sharing, and whether their data is being uploaded through those apps…

IT-Security-Report

 

The varying context and content of sharing means it can either be a very risky or very benign procedure. At the bottom end of the scale is something as simple as sharing a photograph, whereas at the more worrying end of the scale is company executives accidentally sharing confidential information, accountants giving an organisation’s financial details to media outlets or other company ‘insiders’ providing non-public data to unauthorised personnel.

Netskope CEO Sanjay Beri commented on this growth of sharing upon the release of the report, “There’s been a considerable increase in usage of apps that include sharing functionality – many of which are unsanctioned”. Adding, “this goes beyond traditional cloud storage apps; more and more, employees are sharing sensitive data through these apps and introducing new security and compliance challenges to enterprises. The good news here is that IT is increasingly aware of this phenomenon and taking steps to effectively monitor all apps being used in the network to neutralize these issues”.

Elsewhere, the report also found that enterprises are continuing to adopt cloud apps at a growing rate – the average number in use per business grew to 508 in this quarter, up from 461 last quarter. Despite the positive growth news, a more worrying fact to come to light was that a vast number of the apps in use were not enterprise ready (88.4 percent), and these apps accounted for 73.6 percent of total app usage. It’s something we looked at in detail at the start of June and it seems little has changed – in fact, both figures are up on last quarter.

Finally, it was noted that the most frequent cloud app activities that constituted policy violations were logins, downloads, edits, views and creating. Apps falling in the categories of CRM, HR, finance and storage the most regular offenders – though it was noted that what could constitute a policy violation could vary between categories.

What do you think about Netskope’s report? Let us know in the comments below.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

View Website
View All Articles

Sorry, comments are closed for this post.

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…