SlideShare a Scribd company logo
1 of 1
Download to read offline
Cloud Storage
Collaboration
CRM and SFA
Finance/
Accounting
HR
Productivity
Social
Software
Development
Webmail
Dow
nload
Upload
Post
View
Login
Send
Share
View
All
APP CATEGORY
1 2 3 6 4 5
2
2
1
1
3 2 6 1 4 7 5
3 2
2
1
1
6 1 3 2 8 5 4 7
1 2
3 2
3 4
1 3 5 7 6 4
8 7
Delete
Edit
Indicates highest occurrence of
policy-violating activity for the category
Policy violation included in
data loss prevention profile
1
Policy Violations by App Category and Activity
CLOUD REPORT
of DLP violations are protected
health information (PHI)
healthcare and life sciences
of cloud DLP violations occur in
76.2%
68.5%
HEALTHCARE AND LIFE SCIENCES
76.2%
68.5%
JOHN SMITH
PATIENT NO. 234
LEAD IN FINDING AND PREVENTING SENSITIVE DATA LOSS
Healthcare &
Life Sciences
Technology
& IT Services
Financial
Services,
Banking,
& Insurance
Retail,
Restaurants,
& Hospitality
Manufacturing
21.1
14.2
5.7
2.5 1.7
WHICH INDUSTRIES ARE FINDING
SENSITIVE DATA IN CLOUD APPS
Percent of total files with a DLP violation
Note that a policy violation requires that a policy be both set and violated, so a high
number of violations isn’t necessarily an indicator that lots of sensitive data are present
in the app, and a low number the opposite. A high number of violations may indicate
proactive policy-setting, whereas a low one may indicate that the organisation isn’t
setting the right kinds of policies to find sensitive data.
?
CLOUD REPORT
CLOUD APP USAGE CONTINUES TO RISE
This quarter,
of these cloud apps
aren’t enterprise-ready.
OCTOBER JANUARY APRIL JULY OCTOBER
579
613
730
511 483
608
715 755
WORLDWIDE
400
450
500
550
600
700
800
91.2%
THE INDUSTRY YOU’RE IN MAKES A
DIFFERENCE IN CLOUD APP ADOPTION
400
500
600
700
800
900
1000
Technology
& IT Services
Healthcare &
Life Sciences
Retail,
Restaurants,
& Hospitality
Financial
Services,
Banking,
& Insurance
Manufacturing
1,157 1,017
853
690
418
Number of cloud apps per enterprise
1
2
quick wins FOR
enterprise IT
3
Based on this report’s findings, here are some quick wins
for enterprise IT to enable cloud apps while minimising risk:
Discover and secure sensitive content both at rest in and en route to
your cloud apps. Focus on the violations that carry penalties and can
result in negative press, including PHI, PII, and PCI.
In defining cloud app policies, consider not just popular cloud storage,
social, and webmail apps, but also focus on business-critical apps like
HR, finance/accounting, and business intelligence.
Go beyond coarse-grained “allow” or “block” decisions on cloud apps,
and enforce contextual policies on risky activities such as “download”
(e.g., to mobile), “share” (e.g., outside of the company), or “delete” (e.g.,
if you’re not in the enterprise directory group “HR Directors”).
THREETHREE
MOST-USED ENTERPRISE CLOUD APPS
Facebook
Twitter
Gmail
LinkedIn
Google Drive
Concur
Dropbox
Skype
YouTube
Microsoft Office
Live OneDrive
Social
Social
Webmail
Social
Cloud Storage
Finance / Accounting
Cloud Storage
Collaboration
Consumer
Cloud Storage
Cloud Storage
Webmail
Cloud Storage
Webmail
CRM / SFA
Productivity
Marketing
Cloud Storage
Collaboration
Software Development
iCloud
Salesforce.com
Evernote
Constant Contact
Citrix Sharefile
Yammer
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Microsoft Office
365 OneDrive
for Business
Microsoft Office
365 Outlook.com
Atlassian
App Suite
Microsoft Live
Outlook.com
©2015 Netskope, Inc. All rights reserved. Netskope is a registered trademark and Netskope Active,
Netskope Discovery, Cloud Confidence Index, and SkopeSights are trademarks of Netskope, Inc. 10/15 IG-94-1
VISIT WWW.NETSKOPE.COM TO GET YOUR
COMPLIMENTARY CLOUD RISK ASSESSMENT
Autumn 2015 EMEA
EDITION

More Related Content

What's hot

MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3
Carlos Villafane
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
Meg Weber
 
Control%27s+Force+Pitch+Deck (1)
Control%27s+Force+Pitch+Deck (1)Control%27s+Force+Pitch+Deck (1)
Control%27s+Force+Pitch+Deck (1)
SGB Media Group
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 

What's hot (20)

GFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetGFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business Datasheet
 
Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreThe Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t Ignore
 
Infographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusInfographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into Focus
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
То есть как это, мою информацию потеряно? Дмитрий Гадомский
То есть как это, мою информацию потеряно? Дмитрий ГадомскийТо есть как это, мою информацию потеряно? Дмитрий Гадомский
То есть как это, мою информацию потеряно? Дмитрий Гадомский
 
5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)
 
WeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance framework
 
Retail Industry Application Security Survey Insights
Retail Industry Application Security Survey InsightsRetail Industry Application Security Survey Insights
Retail Industry Application Security Survey Insights
 
Control%27s+Force+Pitch+Deck (1)
Control%27s+Force+Pitch+Deck (1)Control%27s+Force+Pitch+Deck (1)
Control%27s+Force+Pitch+Deck (1)
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 

Similar to Autumn 2015 EMEA Netskope Cloud Report

Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
SelectedPresentations
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker Dealers
Broadridge
 

Similar to Autumn 2015 EMEA Netskope Cloud Report (20)

5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014
 
Data Loss Prevention Market Growth, Demand and Challenges of the Key Industry...
Data Loss Prevention Market Growth, Demand and Challenges of the Key Industry...Data Loss Prevention Market Growth, Demand and Challenges of the Key Industry...
Data Loss Prevention Market Growth, Demand and Challenges of the Key Industry...
 
A Definitive Market Guide to Deception Technology
A Definitive Market Guide to Deception TechnologyA Definitive Market Guide to Deception Technology
A Definitive Market Guide to Deception Technology
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concerns
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker Dealers
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
Alberta's Approach To An Itm Control Framework
Alberta's Approach To An Itm Control FrameworkAlberta's Approach To An Itm Control Framework
Alberta's Approach To An Itm Control Framework
 

More from Netskope

Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
Netskope
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
Netskope
 

More from Netskope (20)

Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack Vector
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
 
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesDEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS Loopholes
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud Era
 
Defcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPDefcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCP
 
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - PresentationThe Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudCure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud Report
 
Summer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud ReportSummer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud Report
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Autumn 2015 EMEA Netskope Cloud Report

  • 1. Cloud Storage Collaboration CRM and SFA Finance/ Accounting HR Productivity Social Software Development Webmail Dow nload Upload Post View Login Send Share View All APP CATEGORY 1 2 3 6 4 5 2 2 1 1 3 2 6 1 4 7 5 3 2 2 1 1 6 1 3 2 8 5 4 7 1 2 3 2 3 4 1 3 5 7 6 4 8 7 Delete Edit Indicates highest occurrence of policy-violating activity for the category Policy violation included in data loss prevention profile 1 Policy Violations by App Category and Activity CLOUD REPORT of DLP violations are protected health information (PHI) healthcare and life sciences of cloud DLP violations occur in 76.2% 68.5% HEALTHCARE AND LIFE SCIENCES 76.2% 68.5% JOHN SMITH PATIENT NO. 234 LEAD IN FINDING AND PREVENTING SENSITIVE DATA LOSS Healthcare & Life Sciences Technology & IT Services Financial Services, Banking, & Insurance Retail, Restaurants, & Hospitality Manufacturing 21.1 14.2 5.7 2.5 1.7 WHICH INDUSTRIES ARE FINDING SENSITIVE DATA IN CLOUD APPS Percent of total files with a DLP violation Note that a policy violation requires that a policy be both set and violated, so a high number of violations isn’t necessarily an indicator that lots of sensitive data are present in the app, and a low number the opposite. A high number of violations may indicate proactive policy-setting, whereas a low one may indicate that the organisation isn’t setting the right kinds of policies to find sensitive data. ? CLOUD REPORT CLOUD APP USAGE CONTINUES TO RISE This quarter, of these cloud apps aren’t enterprise-ready. OCTOBER JANUARY APRIL JULY OCTOBER 579 613 730 511 483 608 715 755 WORLDWIDE 400 450 500 550 600 700 800 91.2% THE INDUSTRY YOU’RE IN MAKES A DIFFERENCE IN CLOUD APP ADOPTION 400 500 600 700 800 900 1000 Technology & IT Services Healthcare & Life Sciences Retail, Restaurants, & Hospitality Financial Services, Banking, & Insurance Manufacturing 1,157 1,017 853 690 418 Number of cloud apps per enterprise 1 2 quick wins FOR enterprise IT 3 Based on this report’s findings, here are some quick wins for enterprise IT to enable cloud apps while minimising risk: Discover and secure sensitive content both at rest in and en route to your cloud apps. Focus on the violations that carry penalties and can result in negative press, including PHI, PII, and PCI. In defining cloud app policies, consider not just popular cloud storage, social, and webmail apps, but also focus on business-critical apps like HR, finance/accounting, and business intelligence. Go beyond coarse-grained “allow” or “block” decisions on cloud apps, and enforce contextual policies on risky activities such as “download” (e.g., to mobile), “share” (e.g., outside of the company), or “delete” (e.g., if you’re not in the enterprise directory group “HR Directors”). THREETHREE MOST-USED ENTERPRISE CLOUD APPS Facebook Twitter Gmail LinkedIn Google Drive Concur Dropbox Skype YouTube Microsoft Office Live OneDrive Social Social Webmail Social Cloud Storage Finance / Accounting Cloud Storage Collaboration Consumer Cloud Storage Cloud Storage Webmail Cloud Storage Webmail CRM / SFA Productivity Marketing Cloud Storage Collaboration Software Development iCloud Salesforce.com Evernote Constant Contact Citrix Sharefile Yammer 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Microsoft Office 365 OneDrive for Business Microsoft Office 365 Outlook.com Atlassian App Suite Microsoft Live Outlook.com ©2015 Netskope, Inc. All rights reserved. Netskope is a registered trademark and Netskope Active, Netskope Discovery, Cloud Confidence Index, and SkopeSights are trademarks of Netskope, Inc. 10/15 IG-94-1 VISIT WWW.NETSKOPE.COM TO GET YOUR COMPLIMENTARY CLOUD RISK ASSESSMENT Autumn 2015 EMEA EDITION