Attacks/Breaches
11/15/2012
02:59 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Symantec's Digital Information Index Reveals Half Of Business Information Resides Outside The Firewall

Cloud and mobile computing driving information sprawl

BARCELONA, Spain – Symantec Vision 2012 – November 13, 2012 – Symantec (Nasdaq: SYMC) today launched its first Digital Information Index highlighting the significant impact that cloud computing and mobility are having on businesses today. The 2012 State of Information Report reveals the benefits but also growing challenges of "information sprawl" as organizations increase the level of information stored and accessed outside of the firewall.

Read more detailed blog post: Mobility and Cloud Computing Are Driving Information Sprawl Blog

"Businesses are undergoing a transformation unlike anything we've seen before. With mobile devices and cloud giving employees access to information from nearly anywhere, we're also seeing more sensitive information living beyond the traditional IT boundaries," said Francis deSouza, group president, Enterprise Products and Services, Symantec Corp. "This is creating concern about how to best protect this information."

Click to Tweet: Symantec's Digital Information Index reveals half of business information resides outside the firewall:http://bit.ly/QSzjZh

Information Sprawl

Globally, almost half (46 percent) of an organisation's information is being stored outside of its own data center. At 53%, small and medium businesses (SMBs) outpace enterprises when it comes to information residing outside the firewall, when taking into account mobile devices and laptops. In some countries this number rises to more than half, such as India (83 percent), China (60 percent) and Singapore (60 percent).

Symantec has created a Digital Information Index to represent this information sprawl visually and provide a barometer of where information sits today in different parts of the world. The Index highlights markets experiencing high information sprawl – such as India and China where other markets are dealing with less information sprawl, such as Japan and France.

Modern technologies and information sprawl clearly has benefits, but over a quarter of businesses surveyed have experienced challenges as a result. More than one-third of businesses had experienced the exposure of confidential information as a result of lost or stolen mobile devices. Other issues arise from being unable to find what they need, with a large proportion of their information being unorganized or difficult to find. And even within the firewall, their storage utilization is at just 31%, dipping even lower outside the data center.

The Impact of Mobility and the Cloud

The surge in mobility is contributing to information sprawl. In fact, smartphones and tablets store 14% of business information globally. For enterprises, this is 14%, compared to 11% for SMBs. This number is much higher in countries including India (62 percent), Australia and New Zealand (46 percent) and Italy (38 percent). Information accessed on mobile devices is even higher at 28% globally. Here again we see enterprises leading with 31%, compared to 25% for SMBs. Once again India is higher than average, with 43% of its information being accessed on smartphones and tablets, joined by Brazil (42 percent), Singapore (39) percent and Malaysia (38 percent.)

In addition, the advantages in cost and agility presented by cloud computing are leading to significant use of the cloud to store business information. Globally, almost a quarter (23 percent) of business information is stored in the cloud, between public, private and hybrid deployments. This number is particularly high in Indonesia (45 percent), China (39 percent), Vietnam (34 percent) and Japan (32 percent).

Protecting Information in Today's Environment

In light of this shift beyond the data center, making information management a priority is more important than ever. To minimize information sprawl and its effects on the organization, Symantec has developed the following recommendations:

· Focus on the information, not the device or data center: With BYOD and cloud, information is no longer within the four walls of a company. Protection must focus on the information, not the device or data center.

· Not all information is equal: Business must be able to separate useless data from valuable business information and protect it accordingly.

· Be efficient: Deduplication and archiving help companies protect more, but store less to keep pace with exponential data growth.

· Consistency is key: It is important to set consistent policies for information that can be enforced wherever it's located... physical, mobile, virtual and cloud environments.

· Stay agile: Plan for your future information needs by implementing a flexible infrastructure to support continued growth.

About Symantec

Symantec protects the world's information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment – from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.