Major gaps found in the governance of emerging technologies
Posted on 05 March 2014.
SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing - and in some instances mandating - the use of cloud and mobile technologies, they do not have IT controls in place to properly manage them.

Without the proper preventive and detective controls, those enterprises are ultimately putting themselves at an increased risk of fraud, theft, and privacy breaches.

Click the infographic for a complete, large version:


SailPoint's recent Market Pulse Survey found a complex IT landscape, where enterprises are still catching up to the required levels of oversight and control needed to govern new technologies as part of their overall security and risk management program. The infographic outlines key findings from the survey, including:
  • 63% of enterprises now require IT decision makers to evaluate cloud applications as part of every software procurement process. Already, 39% of mission-critical applications are currently stored in the cloud, which will increase to 59% by 2016.
  • 82% of respondents allow employees to use their personal devices to access company data or applications at work. However, cloud and bring-your-own-device (BYOD) trends are glaringly absent from most companies' security programs. In fact, as many as 41% of respondents admitted to an inability to manage cloud and BYOD as part of their identity and access management strategy.
  • Exacerbating the problem, less than half the respondents have a process in place to automatically remove mission-critical data from mobile devices, while 46% of respondents are not even confident in their ability to grant or revoke employee access to applications across their entire IT environment.
  • Because of the lack of visibility, 52% of respondents admit that employees have read or seen company documents that they should not have had access to, and 51% believe that it's "just a matter of time" before a security breach occurs.





Spotlight

Using Hollywood to improve your security program

Posted on 29 July 2014.  |  Tripwire CTO Dwayne Melancon spends a lot of time on airplanes, and ends up watching a lot of movies. Some of his favorite movies are adventures, spy stuff, and cunning heist movies. A lot of these movies provide great lessons that we can apply to information security.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Jul 30th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //