Search this website:


Conditions Change. Adapt Faster. Learn more > Conditions Change. Adapt Faster. Learn more >

Varonis says leaky apps and cloud data insecurities are the new corporate norm

Commenting on a New York Times story about the governance issues that portable devices and their leaky apps create for companies, Varonis Systems says that mobile access to cloud-based data - and replication to the device itself - has become the new corporate norm. “Organisations are losing track of where their critical data is stored, so controlling, monitoring and auditing that data is becoming more and more difficult. IT must be able to offer the functionality that its end users need to collaborate, but without losing control”, says David Gibson, VP of Strategy with the data governance specialist.

 

Date: 6 Mar 2013

"I've actually lost count of the number of times this New York Times business editorial references leading edge IT concepts such as apps and cloud services, but the reality is that - as witnessed by the business pages this article appears - this really is the new norm. This creates a raft of security headaches in the shape of unsecured devices, as well as the aforementioned leak apps and cloud services. And it's against this backdrop that critical data needs to be identified, managed and protected with an effective data governance platform - without hindering employees’ work," he says.


"I think it's very revealing that the NYT feature notes that, even without proof of compromised accounts, data losses can prove costly in terms of money and reputation - especially given that the US Securities and Exchange Commission mandates that data leaks caused by unsecured devices, leaky apps or poor cloud security, must be announced publicly if the information potentially affects a company’s share price," he added.
 



ShareThis

« Previous article

Next article »

Tags: Security

More Exclusive News

Clear outlooks from the Cloud - Giving CFOs assured enterprise visibility

29 Jun 2015
By Mario Spanicciati, Executive Vice President of BlackLine, a provider of automated financial processing software and solutions. He is also the firm’s Executive Director EMEA. 

Not all storage is created equal

29 Jun 2015
By Gavin McLaughlin VP Strategy and Communications.

The keys to preserving information security and risk management

29 Jun 2015
By Chris Sigley, General Manager of Redstor.

Making finance lead the way

29 Jun 2015
By Zahl Limbuwala, CEO, Romonet.

How to avoid ransomware attacks

29 Jun 2015
By Steve Harcourt, Senior Information Security Consultant, Redstor.

Leveraging the Internet of Things to create new opportunities for Real Time Communications

29 Jun 2015
By Federico Descalzo, Italtel Vice President and Chief Marketing Technology Officer.

Key considerations when moving data backup from tape to disk with data deduplication

22 Jun 2015
For decades, IT organisations have performed nightly backup of all their data to tape, which has been used primarily due to low cost. The retention of most organisations is typically 12 weeks onsit...

How do you avoid cloud evaporation?

22 Jun 2015
Written by William Rabie, Head of Cloud, EMEA & APAC, iland.

Content providers are winning - why not do the same?

22 Jun 2015
The latest blog from Willy Rietveld, TE Connectivity. (W.Rietveld@TE.com)

Finding the ‘big data’ balance

22 Jun 2015
How UK organisations can apply a data-centric approach to cybersecurity, privacy and other enterprise information challenges. By Lee Meyrick, Director of Information Management at Nuix.

Assessing cyber risk in business is about more than just counting vulnerabilities

22 Jun 2015
By Matt Alderman, VP of Strategy at Tenable Network Security.

Flash – are you buying a solution or just buying time?

22 Jun 2015
By Kieran Harty, CTO & co-founder at Tintri.

Barracuda Networks helps Papergraphics see the writing on the wall

15 Jun 2015
Deploys integrated backup, recovery, archiving and network security.

Hibberts Solicitors looks to the future with Quorum’s simple and effective DR

15 Jun 2015
Tracing its origins back to 1799, long-established legal firm Hibberts Solicitors has five offices in Cheshire and 100 employees. The firm offers a wide variety of legal services to clients in the ...

Security and compliance pragmatism: How to get both in Cloud Storage environments

15 Jun 2015
By Sol Cates, CSO, Vormetric.

Recruitment

Latest IT jobs from leading companies.

 

Click here for full listings»