Attacks/Breaches
11/15/2012
02:59 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Symantec's Digital Information Index Reveals Half Of Business Information Resides Outside The Firewall

Cloud and mobile computing driving information sprawl

BARCELONA, Spain – Symantec Vision 2012 – November 13, 2012 – Symantec (Nasdaq: SYMC) today launched its first Digital Information Index highlighting the significant impact that cloud computing and mobility are having on businesses today. The 2012 State of Information Report reveals the benefits but also growing challenges of "information sprawl" as organizations increase the level of information stored and accessed outside of the firewall.

Read more detailed blog post: Mobility and Cloud Computing Are Driving Information Sprawl Blog

"Businesses are undergoing a transformation unlike anything we've seen before. With mobile devices and cloud giving employees access to information from nearly anywhere, we're also seeing more sensitive information living beyond the traditional IT boundaries," said Francis deSouza, group president, Enterprise Products and Services, Symantec Corp. "This is creating concern about how to best protect this information."

Click to Tweet: Symantec's Digital Information Index reveals half of business information resides outside the firewall:http://bit.ly/QSzjZh

Information Sprawl

Globally, almost half (46 percent) of an organisation's information is being stored outside of its own data center. At 53%, small and medium businesses (SMBs) outpace enterprises when it comes to information residing outside the firewall, when taking into account mobile devices and laptops. In some countries this number rises to more than half, such as India (83 percent), China (60 percent) and Singapore (60 percent).

Symantec has created a Digital Information Index to represent this information sprawl visually and provide a barometer of where information sits today in different parts of the world. The Index highlights markets experiencing high information sprawl – such as India and China where other markets are dealing with less information sprawl, such as Japan and France.

Modern technologies and information sprawl clearly has benefits, but over a quarter of businesses surveyed have experienced challenges as a result. More than one-third of businesses had experienced the exposure of confidential information as a result of lost or stolen mobile devices. Other issues arise from being unable to find what they need, with a large proportion of their information being unorganized or difficult to find. And even within the firewall, their storage utilization is at just 31%, dipping even lower outside the data center.

The Impact of Mobility and the Cloud

The surge in mobility is contributing to information sprawl. In fact, smartphones and tablets store 14% of business information globally. For enterprises, this is 14%, compared to 11% for SMBs. This number is much higher in countries including India (62 percent), Australia and New Zealand (46 percent) and Italy (38 percent). Information accessed on mobile devices is even higher at 28% globally. Here again we see enterprises leading with 31%, compared to 25% for SMBs. Once again India is higher than average, with 43% of its information being accessed on smartphones and tablets, joined by Brazil (42 percent), Singapore (39) percent and Malaysia (38 percent.)

In addition, the advantages in cost and agility presented by cloud computing are leading to significant use of the cloud to store business information. Globally, almost a quarter (23 percent) of business information is stored in the cloud, between public, private and hybrid deployments. This number is particularly high in Indonesia (45 percent), China (39 percent), Vietnam (34 percent) and Japan (32 percent).

Protecting Information in Today's Environment

In light of this shift beyond the data center, making information management a priority is more important than ever. To minimize information sprawl and its effects on the organization, Symantec has developed the following recommendations:

· Focus on the information, not the device or data center: With BYOD and cloud, information is no longer within the four walls of a company. Protection must focus on the information, not the device or data center.

· Not all information is equal: Business must be able to separate useless data from valuable business information and protect it accordingly.

· Be efficient: Deduplication and archiving help companies protect more, but store less to keep pace with exponential data growth.

· Consistency is key: It is important to set consistent policies for information that can be enforced wherever it's located... physical, mobile, virtual and cloud environments.

· Stay agile: Plan for your future information needs by implementing a flexible infrastructure to support continued growth.

About Symantec

Symantec protects the world's information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment – from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio