Search this website:


Varonis says leaky apps and cloud data insecurities are the new corporate norm

Commenting on a New York Times story about the governance issues that portable devices and their leaky apps create for companies, Varonis Systems says that mobile access to cloud-based data - and replication to the device itself - has become the new corporate norm. “Organisations are losing track of where their critical data is stored, so controlling, monitoring and auditing that data is becoming more and more difficult. IT must be able to offer the functionality that its end users need to collaborate, but without losing control”, says David Gibson, VP of Strategy with the data governance specialist.

 

Date: 6 Mar 2013

"I've actually lost count of the number of times this New York Times business editorial references leading edge IT concepts such as apps and cloud services, but the reality is that - as witnessed by the business pages this article appears - this really is the new norm. This creates a raft of security headaches in the shape of unsecured devices, as well as the aforementioned leak apps and cloud services. And it's against this backdrop that critical data needs to be identified, managed and protected with an effective data governance platform - without hindering employees’ work," he says.


"I think it's very revealing that the NYT feature notes that, even without proof of compromised accounts, data losses can prove costly in terms of money and reputation - especially given that the US Securities and Exchange Commission mandates that data leaks caused by unsecured devices, leaky apps or poor cloud security, must be announced publicly if the information potentially affects a company’s share price," he added.
 



ShareThis

« Previous article

Next article »

Tags: Security

More Exclusive News

Protecting your business against a DDoS attack  

28 Sep 2015
By Wieland Alge, VP and GM, EMEA at Barracuda Networks.

Losing your data – forever

28 Sep 2015
By Nik Stanbridge, VP Marketing, Arkivum.

Don’t let information ignorance turn your data dream into a nightmare  

28 Sep 2015
By Cindy Truyens, Managing Director at SQS.

Shielded or Unshielded cabling for future networks

28 Sep 2015
By Matthias Gerber, Market Manager Office Cabling Reichle & De Massari.

Why leveraging converged infrastructure will drive business agility

28 Sep 2015
By Nigel Moulton, CTO, EMEA – VCE.

The Goldilocks scenario of multiple Clouds  

28 Sep 2015
By Kevin Linsell, Director of Strategy and Architecture, Adapt.

It’s not just what’s on the outside that counts

21 Sep 2015
Chris Marrison, consulting solutions architect at Infoblox, discusses the importance of checking inside the network for security threats as well as looking out for those trying to get in.

Thinking about privacy in the age of workforce mobility

21 Sep 2015
Protecting critical information is a growing concern in the modern age of mobile business. With the rise of the mobile workforce, organisations have to rethink how they approach data protection: wo...

HCA International achieves seamless data centre move

21 Sep 2015
HCA International is a leading private healthcare provider, specialising in acute and complex medical care. Through a network of six hospitals and 13 clinics in London and Manchester they provide c...

Mobility in the enterprise: a true enterprise disruptor

21 Sep 2015
As more and more enterprises embrace mobile platforms and the applications that this revolution in computing is spawning, the route to success is littered with failure. This is due to the fact that...

An overview of DAAS

21 Sep 2015
By Giorgio Bonuccelli, Marketing Director at Parallels.

When it comes to storage is it RIP for DIY and time for MSP?

21 Sep 2015
asks Jeff Boling, Principal Systems Engineer at X-IO Technologies.

Protect your data: Top Ten “Need to Know” tips

14 Sep 2015
By Dietrich Benjes, VP UK, Ireland and Middle East, Varonis.

Virtual Sanity: Ensuring digital performance monitoring is fit for virtualized infrastructures

14 Sep 2015
By Tom Griffin, Director of Systems Engineering for EMEA for SevOne.

Helping Chester Zoo IT staff ferret out network and application issues fast

14 Sep 2015
The network and application infrastructure at Chester Zoo is just as complex and vital to operations as the enclosure environments that house their wildlife. Therefore, when problems arise, IT staf...

Recruitment

Latest IT jobs from leading companies.

 

Click here for full listings»