1H 2016 Shadow Data Report

Thumb original bluecoat elastica shadowdatareport 1h 2016 digital

Blue Coat, einer der führenden Anbieter im Bereich Advanced Web Security für weltweit tätige Unternehmen und Einrichtungen der öffentlichen Hand, präsentiert die Ergebnisse des Shadow Data Threat Reports für das erste Halbjahr 2016.
Die Studie wurde von den Blue Coat Elastica Cloud Threat Labs durchgeführt und veröffentlicht. Sie basiert auf der datenwissenschaftlichen Analyse von über 15.000 in Unternehmen eingesetzten Cloud-Apps und von 108 Millionen darin gespeicherten und geteilten geschäftlichen Dokumenten.

Die Ergebnisse sind teils alarmierend:

- Fast 100 Prozent aller Business-Anwendungen in der Cloud sind unzureichend gesichert und nicht Compliance-konform.
- Auf jede von der IT genehmigte kommen fast 20 unerwünschte Cloud-Apps.
- Vertrauliche Daten sind für die Öffentlichkeit zugänglich.
- 98 Prozent der Apps entsprechen nicht den von der Datenschutz-Grundverordnung definierten Standards.

Lesen Sie die ausführlichen Ergebnisse der Studie im Shadow Data Report (1HJ 2016)

P.S.:
Zusätzlich zum Shadow Data Report, erhalten Sie die Möglichkeit, einen von 50 kostenlosen Risk Assessments zu erhalten. Diese sehr wertvolle Analyse zeigt Ihnen in einem persönlichen Report Ihre aktuelle Shadow IT Situation auf.

View study
Bluecoat logo
Provider: Blue Coat Systems GmbH   |   Size: 5.9 MB   |   Language: English
Keep Reading:
Thumb original bluecoatwp01

Top 5 critical capabilities for your malware sandboxing strategy

Malware is Evolving. So Should Your Defenses.

Malware authors are clever and persistent. More than 200,000 new malware samples are uncovered every day.

And new malware attacks are often successful: 90% of companies reported a security breach in the last 24 months, according to the 2013 Ponemon Report. Layered defenses can block the “known bad,” but malware continues to slip through. Today, you must also analyze and defend against “unknown” files and URLs with dynamic sandboxing. It’s the only way to methodically unmask zero-day exploits, ...

To access the Whitepaper
Thumb original mktg 18 0108 economics insecurity wp d

Economics of Insecurity

The information security field is economically inefficient. This is both good and bad. Bad, because it means billions of dollars are squandered on solutions which offer their buyers sub-optimal returns. Good, because the opportunities exist to operate more efficiently and thereby improve the quality of life for everyone.
This paper will examine how we know economic inefficiencies exist and why the industry seems unwilling to address them. By understanding these issues, companies will be better able to select effective IT security solutions tha ...

To access the Whitepaper
Thumb original en vmware forbes exec summary v6

Special Report: Enterprises Across Europe, the Middle East and Africa Slowly Embrace Cybersecurity Challenges

Enterprises across Europe, the Middle East and Africa are undergoing what is perhaps the most significant transformation in a generation, moving resources and relationships into the digital realm. Initiatives such as digital transformation and Industry 4.0—an intelligent network of manufacturers, suppliers and customers, which is taking shape around the world and is gaining ground across Europe—mean greater connectedness among businesses, customers and partners.

This report, which is based on a Forbes Insights survey of 451 enterprises acro ...

To access the Whitepaper
Thumb original en vmware forbes exec summary v6

SPECIAL REPORT: Enterprises Across Europe, the Middle East and Africa Slowly Embrace Cybersecurity Challenges

This report, which is based on a Forbes Insights survey of 451 enterprises across Europe, and another 200 within the Middle East and Africa, explores the state of cybersecurity in these regions and how the perceptions of business leaders and security practitioners vary on these issues. We focus primarily on the European findings but have noted where there are noticeable differences among the regions. We also provide recommendations on how companies in Europe and in the Middle East and Africa can better protect their businesses.
...

To access the Whitepaper
Thumb original idr infographic automation is essential for cyber resilience final july 2019  1

Why automation is essential for cyber resilience

Digital transformation makes today’s businesses more productive and more vulnerable to cyberattacks. Security professionals know that breaches are inevitable. To be successful, companies must establish cyber-resilient endpoints. Where do you turn when legacy approaches fail? In a word: Automation. ...

To access the Infographic