Without the proper preventive and detective controls, those enterprises are ultimately putting themselves at an increased risk of fraud, theft, and privacy breaches.
Click the infographic for a complete, large version:
SailPoint's recent Market Pulse Survey found a complex IT landscape, where enterprises are still catching up to the required levels of oversight and control needed to govern new technologies as part of their overall security and risk management program. The infographic outlines key findings from the survey, including:
- 63% of enterprises now require IT decision makers to evaluate cloud applications as part of every software procurement process. Already, 39% of mission-critical applications are currently stored in the cloud, which will increase to 59% by 2016.
- 82% of respondents allow employees to use their personal devices to access company data or applications at work. However, cloud and bring-your-own-device (BYOD) trends are glaringly absent from most companies' security programs. In fact, as many as 41% of respondents admitted to an inability to manage cloud and BYOD as part of their identity and access management strategy.
- Exacerbating the problem, less than half the respondents have a process in place to automatically remove mission-critical data from mobile devices, while 46% of respondents are not even confident in their ability to grant or revoke employee access to applications across their entire IT environment.
- Because of the lack of visibility, 52% of respondents admit that employees have read or seen company documents that they should not have had access to, and 51% believe that it's "just a matter of time" before a security breach occurs.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.