Major gaps found in the governance of emerging technologies
Posted on 05 March 2014.
SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing - and in some instances mandating - the use of cloud and mobile technologies, they do not have IT controls in place to properly manage them.

Without the proper preventive and detective controls, those enterprises are ultimately putting themselves at an increased risk of fraud, theft, and privacy breaches.

Click the infographic for a complete, large version:


SailPoint's recent Market Pulse Survey found a complex IT landscape, where enterprises are still catching up to the required levels of oversight and control needed to govern new technologies as part of their overall security and risk management program. The infographic outlines key findings from the survey, including:
  • 63% of enterprises now require IT decision makers to evaluate cloud applications as part of every software procurement process. Already, 39% of mission-critical applications are currently stored in the cloud, which will increase to 59% by 2016.
  • 82% of respondents allow employees to use their personal devices to access company data or applications at work. However, cloud and bring-your-own-device (BYOD) trends are glaringly absent from most companies' security programs. In fact, as many as 41% of respondents admitted to an inability to manage cloud and BYOD as part of their identity and access management strategy.
  • Exacerbating the problem, less than half the respondents have a process in place to automatically remove mission-critical data from mobile devices, while 46% of respondents are not even confident in their ability to grant or revoke employee access to applications across their entire IT environment.
  • Because of the lack of visibility, 52% of respondents admit that employees have read or seen company documents that they should not have had access to, and 51% believe that it's "just a matter of time" before a security breach occurs.





Spotlight

How to talk infosec with kids

Posted on 17 September 2014.  |  It's never too early to talk infosec with kids: you simply need the right story. In fact, as cyber professionals itís our duty to teach ALL the kids in our life about technology. If we are to make an impact, we must remember that children needed to be taught about technology on their terms.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Sep 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //