ManagedMethods
  • Products
  • Free Trial
  • How It Works
  • Products
    • File Sharing
      • Google Drive
      • Microsoft OneDrive
      • Sharepoint
      • Dropbox
      • Citrix Sharefile
      • Box
    • Email & Messaging
      • Gmail
      • Office 365 Mail / Outlook
      • Slack
    • Cloud Suite
      • Google G Suite
      • Office 365
  • Solutions
    • Problems We Solve
      • Cloud Access Security Broker (CASB)
      • Cloud Compliance
      • Cloud Malware and Threat Protection
      • Data Loss Prevention (DLP)
      • Risk Management
    • Industries We Serve
      • K-12 Education
      • Higher Ed
      • Business
  • Resources
    • Blog
    • White Papers
    • Videos
    • Infographics
    • Data Sheets
    • Case Studies
  • Company
    • About
    • Partners
    • Leadership
    • Resellers
    • Careers
    • News
    • Events
Products Free Trial
  • 1 (303) 415-3640
  • Support
  • Contact

What did your corporate data do in the cloud last night?

David Waugh | September 1, 2016

As I was reading Ponemon Institute’s most recent report on data protection and information security, “Closing Security Gaps to Protect Corporate Data,” I was struck by the study’s most significant finding: 3 out of 4 companies have experienced loss or theft of important data. Three out of four?! That means that at recent meetings I’ve attended with other CEOs and corporate leaders that almost everyone has faced this significant challenge to their business and reputation! And that’s companies of all sizes, not just the big guys you hear about in the news. How did we get to a place where data insecurity is the norm?

To start, the pace of business today requires information to flow quickly and efficiently to those who need it to do their jobs; we need the data now! This critical flow of data is expedited by the rise of cloud collaboration apps like Office 365 and Google Apps. Now Jim in Finance in Boston can access key customer purchase data from Susan in Operations in Chicago, and Diane and George in Patient Accounts can work together on a report that shows a correlation between account delinquencies and insurance providers.  In fact, Ponemon found that 88% of end users say their jobs require them to access and use proprietary information. If everyone’s doing it, it must be ok, right? What could possibly go wrong?

Well, we all know the answer to that. Now that the data is so easily accessible, it’s also easily abused. And usually not with malicious intent. In fact, Ponemon found that it’s more than twice as likely to be due to innocent employee behavior than a crafty cybercriminal. A simple user error, like uploading a sensitive file to the wrong folder in Dropbox, can result in the accidental disclosure of client data, trade secrets, and even health records. So aside from removing all access to the cloud or firing all employees, what can you do to protect your company?

Cloud Access Security Brokers (CASBs) are the answer. This new segment of cloud security products provides visibility into the use of those collaborative cloud apps that, unmonitored, can wreak havoc with your company’s confidential data and reputation. CASBs can tell you who is using which apps and on what devices, even if they’re outside of the corporate security perimeter.

But that’s only half the equation. To be truly confident in your cloud security and determine if you are at risk, you need to know what data is being shared too. Is it credit card or social security numbers? Patient case info? Proprietary development code? To answer that you need a CASB with audit and control features that use cloud-native APIs to see deep into the shared data. Our CASB product, Cloud Access Monitor, provides these critical features, with APIs to Office 365, Google Apps, and other popular cloud collaboration apps. So you can detect suspicious data behavior before your company becomes another statistic.

Want to see how a CASB can protect against innocent insider security mistakes? Watch our brief video tour of Cloud Access Monitor in action.

Share this Post

CLOUD SECURITY INSIGHTS
Get the latest cloud security insights delivered straight to your mailbox
  • This field is for validation purposes and should be left unchanged.
30-DAY FREE TRIAL
TRY MANAGEDMETHODS

Categories

  • Cloud Access Security Broker (CASB) (25)
  • Cloud Risk Management (4)
  • Data Loss Prevention (4)
  • Higher Ed Cloud Security (2)
  • K-12 Cloud Security (9)
  • Partners (2)
  • Product Updates (2)
  • SaaS / Cloud Applications (14)
  • Shadow IT (12)
Popular Articles
K-12 Cloud Application Security Provides Critical Visibility and Control
October 25, 2018
Higher Education Cloud Security Is The Most Critical Topic of 2019
November 8, 2018
Time To Retire CASB And Adopt CASP
December 18, 2018
2018: The CASB Year Ahead
January 29, 2018

July 27, 2015

Getting IT Done in the Shadows Sateesh Narahari

August 11, 2015

3 Steps to Control and Embrace Shadow IT David Waugh

May 27, 2015

On-Premise Cloud Access Security David Waugh
  • How It Works
  • Products
  • Solutions
  • Partners
  • Resources
  • Company
  • Terms of Service
  • Privacy Policy
  • Twitter
  • Linkedin
  • Youtube
©2018 ManagedMethods - Enfold WordPress Theme by Kriesi
  • Twitter
  • Linkedin
  • Youtube
  • Instagram
  • How It Works
  • Products
  • Solutions
  • Partners
  • Resources
  • Company
  • Terms of Service
  • Privacy Policy
Who Takes the Blame for Shadow IT? The Right Cloud Security Tool for the Job
Scroll to top