Attacks/Breaches
11/15/2012
02:59 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Symantec's Digital Information Index Reveals Half Of Business Information Resides Outside The Firewall

Cloud and mobile computing driving information sprawl

BARCELONA, Spain – Symantec Vision 2012 – November 13, 2012 – Symantec (Nasdaq: SYMC) today launched its first Digital Information Index highlighting the significant impact that cloud computing and mobility are having on businesses today. The 2012 State of Information Report reveals the benefits but also growing challenges of "information sprawl" as organizations increase the level of information stored and accessed outside of the firewall.

Read more detailed blog post: Mobility and Cloud Computing Are Driving Information Sprawl Blog

"Businesses are undergoing a transformation unlike anything we've seen before. With mobile devices and cloud giving employees access to information from nearly anywhere, we're also seeing more sensitive information living beyond the traditional IT boundaries," said Francis deSouza, group president, Enterprise Products and Services, Symantec Corp. "This is creating concern about how to best protect this information."

Click to Tweet: Symantec's Digital Information Index reveals half of business information resides outside the firewall:http://bit.ly/QSzjZh

Information Sprawl

Globally, almost half (46 percent) of an organisation's information is being stored outside of its own data center. At 53%, small and medium businesses (SMBs) outpace enterprises when it comes to information residing outside the firewall, when taking into account mobile devices and laptops. In some countries this number rises to more than half, such as India (83 percent), China (60 percent) and Singapore (60 percent).

Symantec has created a Digital Information Index to represent this information sprawl visually and provide a barometer of where information sits today in different parts of the world. The Index highlights markets experiencing high information sprawl – such as India and China where other markets are dealing with less information sprawl, such as Japan and France.

Modern technologies and information sprawl clearly has benefits, but over a quarter of businesses surveyed have experienced challenges as a result. More than one-third of businesses had experienced the exposure of confidential information as a result of lost or stolen mobile devices. Other issues arise from being unable to find what they need, with a large proportion of their information being unorganized or difficult to find. And even within the firewall, their storage utilization is at just 31%, dipping even lower outside the data center.

The Impact of Mobility and the Cloud

The surge in mobility is contributing to information sprawl. In fact, smartphones and tablets store 14% of business information globally. For enterprises, this is 14%, compared to 11% for SMBs. This number is much higher in countries including India (62 percent), Australia and New Zealand (46 percent) and Italy (38 percent). Information accessed on mobile devices is even higher at 28% globally. Here again we see enterprises leading with 31%, compared to 25% for SMBs. Once again India is higher than average, with 43% of its information being accessed on smartphones and tablets, joined by Brazil (42 percent), Singapore (39) percent and Malaysia (38 percent.)

In addition, the advantages in cost and agility presented by cloud computing are leading to significant use of the cloud to store business information. Globally, almost a quarter (23 percent) of business information is stored in the cloud, between public, private and hybrid deployments. This number is particularly high in Indonesia (45 percent), China (39 percent), Vietnam (34 percent) and Japan (32 percent).

Protecting Information in Today's Environment

In light of this shift beyond the data center, making information management a priority is more important than ever. To minimize information sprawl and its effects on the organization, Symantec has developed the following recommendations:

· Focus on the information, not the device or data center: With BYOD and cloud, information is no longer within the four walls of a company. Protection must focus on the information, not the device or data center.

· Not all information is equal: Business must be able to separate useless data from valuable business information and protect it accordingly.

· Be efficient: Deduplication and archiving help companies protect more, but store less to keep pace with exponential data growth.

· Consistency is key: It is important to set consistent policies for information that can be enforced wherever it's located... physical, mobile, virtual and cloud environments.

· Stay agile: Plan for your future information needs by implementing a flexible infrastructure to support continued growth.

About Symantec

Symantec protects the world's information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment – from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-0889
Published: 2014-07-29
Multiple cross-site scripting (XSS) vulnerabilities in IBM Atlas Suite (aka Atlas Policy Suite), as used in Atlas eDiscovery Process Management through 6.0.3, Disposal and Governance Management for IT through 6.0.3, and Global Retention Policy and Schedule Management through 6.0.3, allow remote atta...

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3020
Published: 2014-07-29
install.sh in the Embedded WebSphere Application Server (eWAS) 7.0 before FP33 in IBM Tivoli Integrated Portal (TIP) 2.1 and 2.2 sets world-writable permissions for the installRoot directory tree, which allows local users to gain privileges via a Trojan horse program.

Best of the Web
Dark Reading Radio