Latest Netskope Report: Security Nightmare For IT Departments

Latest Netskope Report: Security Nightmare For IT Departments

Latest Netskope Report: Security Nightmare For IT Departments

Netskope have today released the findings of their quarterly ‘Cloud Report’. The report, which complies the foremost trends on cloud app adoption and usage, discovered the emergence of several new trends. Chief among them was the ever-increasing number of apps that enable some kind of sharing and the security concerns which accompany them.

Sharing has traditionally been considered as something primarily done through cloud storage apps (where for every one upload there are three shares), however, the report notes that one out of every five apps in used on Netskope’s cloud app analytics platform (the ‘Netskope Active Platform’) now has sharing enabled. Additionally, forty nine of the fifty five app categories which the company track had sharing features.

The report found that top ten (non-storage) most frequently used apps for sharing were, in decreasing order, Facebook, Salesforce, Yammer, LinkedIn, Workday, Evernote, Zoho, QuickBooks, Trello and Concur. Sharing of this nature is a security nightmare for IT departments – although they are the ones who are responsible for protecting businesses against online threats, they often lack any useful insight into which apps are running in their environments, which of those apps allow sharing, and whether their data is being uploaded through those apps…

IT-Security-Report

 

The varying context and content of sharing means it can either be a very risky or very benign procedure. At the bottom end of the scale is something as simple as sharing a photograph, whereas at the more worrying end of the scale is company executives accidentally sharing confidential information, accountants giving an organisation’s financial details to media outlets or other company ‘insiders’ providing non-public data to unauthorised personnel.

Netskope CEO Sanjay Beri commented on this growth of sharing upon the release of the report, “There’s been a considerable increase in usage of apps that include sharing functionality – many of which are unsanctioned”. Adding, “this goes beyond traditional cloud storage apps; more and more, employees are sharing sensitive data through these apps and introducing new security and compliance challenges to enterprises. The good news here is that IT is increasingly aware of this phenomenon and taking steps to effectively monitor all apps being used in the network to neutralize these issues”.

Elsewhere, the report also found that enterprises are continuing to adopt cloud apps at a growing rate – the average number in use per business grew to 508 in this quarter, up from 461 last quarter. Despite the positive growth news, a more worrying fact to come to light was that a vast number of the apps in use were not enterprise ready (88.4 percent), and these apps accounted for 73.6 percent of total app usage. It’s something we looked at in detail at the start of June and it seems little has changed – in fact, both figures are up on last quarter.

Finally, it was noted that the most frequent cloud app activities that constituted policy violations were logins, downloads, edits, views and creating. Apps falling in the categories of CRM, HR, finance and storage the most regular offenders – though it was noted that what could constitute a policy violation could vary between categories.

What do you think about Netskope’s report? Let us know in the comments below.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

Find out more
View All Articles

Sorry, comments are closed for this post.

From Illusion To Reality: Up Personal On Cloud Computing Privacy

From Illusion To Reality: Up Personal On Cloud Computing Privacy

Cloud Computing Privacy We are under an illusion around the cloud computing. Without a doubt the benefits are incredible. However, cloud impacts personal user privacy and potentially exposes their private data in ways they may not have anticipated. Given that users don’t usually read the terms of service and privacy policies, it is unclear how…

5 Companies That Took On The Small Business Cloud – And Lost

5 Companies That Took On The Small Business Cloud – And Lost

5 Companies That Took On The Small Business Cloud The growth of cloud based business support systems has been staggering, and while some major software houses have quickly positioned themselves as forerunners in the move to the Cloud, there are several high-flying companies that have so far failed to provide small businesses with the level…

Is Windows 10 The Final Piece Of Microsoft’s Cloud Strategy?

Is Windows 10 The Final Piece Of Microsoft’s Cloud Strategy?

Windows 10 – Microsoft’s Cloud Strategy By all reports, Windows 10 is a resounding success. Microsoft reported that 14 million users downloaded the latest version of its operating system in its first 24 hours of availability. That number is ten times higher than launch-day downloads of Windows 8. Independent sources confirm that Windows 10 now…

Principles For Data Protection In The Cloud In 2016

Principles For Data Protection In The Cloud In 2016

Data Protection In The Cloud 2015 ushered in the start of a data economy. As organizations amass more detailed consumer profiles they have begun realizing that data could equal or surpass the value of the products and services they sell, especially in the Internet of Things era with its constant and very personal streams of…

The True Power And Potential Of Wearables

The True Power And Potential Of Wearables

The Power of Wearables The potential of wearable computing for efficiency and innovation is enormous. For business leaders and CIOs, wearable technology represents an opportunity to find more intelligent solutions to real problems and to leverage these devices for the benefit of the organization. But before wearables can successfully realize these expectations, there remain basic…

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise There is no longer any subjectivity in this statement: security is at the top of list for all CIOs. Every meeting I’ve attended over the last three months has been dominated by the topic of security and when it’s injected into the conversation, it’s not necessarily by my team, but the…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising