Vulnerabilities / Threats
7/2/2009
02:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Survey: More Than Half Of Firms Plan To Secure Social Networking Use

Compared with a related survey last fall 2008, many more IT pros are reporting use of social media at their companies, according to FaceTime survey's of more than 1,100 IT respondents

BELMONT, Calif., July 1, 2009 " FaceTime Communications " the leading provider of solutions enabling the safe use of Web 2.0 and unified communications in the enterprise " found in a survey that Social Networking is widely accepted by IT respondents, and 51 percent plan to beef up security within the next 12 months.

Compared with a related survey in fall 2008 ("The Collaborative Internet: Usage Trends, IT Attitudes and End User Impact"), many more IT professionals are reporting that social media is in use at their companies, up from 60 percent six months ago to 85 percent now.

FaceTime surveyed more than 1,100 prospects, customers and other IT professionals identified through Twitter, Facebook, Plaxo and LinkedIn between May 21 and June 1.

"The widespread acceptance of social networking as a reality for the corporate network is a relatively new phenomenon," said Nishant Jadhav, director of Product Management for FaceTime Communications. "However, managers are already recognizing the business value of social networking with 31 percent of respondents seeing significant business value and only 21 percent seeing no business value."

More than half of respondents would like to see specific support for Web2.0 integrated into their Web security platform and nearly 20 percent would deploy dedicated solutions to control Web2.0.

"The reality that real-time communications and Web 2.0 applications are highly evasive is sinking in." continued Nishant Jadhav, "These applications are designed to get around Web filtering, firewalls and other traditional security measures through port crawling, tunneling and onion routing."

Other findings:

  • 30 percent would not consider a Web security platform that did not have the ability to secure and manage social networking and Web 2.0 applications
  • 32 percent said social networking is a critical business collaboration tool
  • 87 percent personally use social networks on the corporate network
  • 80 percent said information leakage is a primary concern with social networking use
  • 15 percent said social networking is "blocked" on the corporate network
  • 51 percent estimate that employees use social networks at work more than an hour per day

    Download the survey report Social Networking in the Enterprise: Working, or Not Working.

    About FaceTime's Unified Security Gateway FaceTime's Unified Security Gateway (USG) is a secure Web gateway appliance that integrates Web 2.0 application detection and control, gateway malware protection and Web filtering with FaceTime's best-in-class IM hygiene and archiving. With this single point of control, more than 2,100 Web and real-time applications and many thousands of social networking applications can be tracked, monitored and controlled to give organizations complete visibility into all Internet communications, and simplify administration.

    With USG, IT administrators can set time of day or usage policies across all applications and view detailed reports to gain complete visibility into employees use of the network " not only in terms of browsing but also specific Web 2.0 usage. This complete visibility and control provides IT with a distinct advantage in managing network resources in addition to securing against inbound malware and putting controls in place to prevent outbound data leakage.

    About FaceTime Communications FaceTime Communications enables the safe and productive use of instant messaging, Web usage and Unified Communications platforms. Ranked number one by IDC for five consecutive years, FaceTime's award-winning solutions are used by more than 1,000 customers for security, management and compliance of real-time communications. FaceTime supports or has strategic partnerships with all leading public and enterprise IM network providers, including AOL, Google, Microsoft, Yahoo!, Skype, IBM and Jabber.

    Comment  | 
    Print  | 
    More Insights
  • Register for Dark Reading Newsletters
    White Papers
    Cartoon
    Current Issue
    Flash Poll
    Video
    Slideshows
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2013-7437
    Published: 2015-03-29
    Multiple integer overflows in potrace 1.11 allow remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow.

    CVE-2013-7438
    Published: 2015-03-29
    Multiple buffer overflows in pbm212030 allow remote attackers to cause a denial of service (crash) or possible execute arbitrary code via a crafted PBM image, related to (1) stream line data, which triggers a heap-based buffer overflow, or (2) vectors related to an "internal intermediate heap-based ...

    CVE-2014-5427
    Published: 2015-03-29
    Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integration Engine (NIE) 5xxx-x, and NxE8500, allows remote attackers to read pa...

    CVE-2014-5428
    Published: 2015-03-29
    Unrestricted file upload vulnerability in unspecified web services in Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integratio...

    CVE-2014-9205
    Published: 2015-03-29
    Stack-based buffer overflow in the PmBase64Decode function in an unspecified demonstration application in MICROSYS PROMOTIC stable before 8.2.19 and PROMOTIC development before 8.3.2 allows remote attackers to execute arbitrary code by providing a large amount of data.

    Dark Reading Radio
    Archived Dark Reading Radio
    Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.