Vulnerabilities / Threats
7/2/2009
02:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Survey: More Than Half Of Firms Plan To Secure Social Networking Use

Compared with a related survey last fall 2008, many more IT pros are reporting use of social media at their companies, according to FaceTime survey's of more than 1,100 IT respondents

BELMONT, Calif., July 1, 2009 " FaceTime Communications " the leading provider of solutions enabling the safe use of Web 2.0 and unified communications in the enterprise " found in a survey that Social Networking is widely accepted by IT respondents, and 51 percent plan to beef up security within the next 12 months.

Compared with a related survey in fall 2008 ("The Collaborative Internet: Usage Trends, IT Attitudes and End User Impact"), many more IT professionals are reporting that social media is in use at their companies, up from 60 percent six months ago to 85 percent now.

FaceTime surveyed more than 1,100 prospects, customers and other IT professionals identified through Twitter, Facebook, Plaxo and LinkedIn between May 21 and June 1.

"The widespread acceptance of social networking as a reality for the corporate network is a relatively new phenomenon," said Nishant Jadhav, director of Product Management for FaceTime Communications. "However, managers are already recognizing the business value of social networking with 31 percent of respondents seeing significant business value and only 21 percent seeing no business value."

More than half of respondents would like to see specific support for Web2.0 integrated into their Web security platform and nearly 20 percent would deploy dedicated solutions to control Web2.0.

"The reality that real-time communications and Web 2.0 applications are highly evasive is sinking in." continued Nishant Jadhav, "These applications are designed to get around Web filtering, firewalls and other traditional security measures through port crawling, tunneling and onion routing."

Other findings:

  • 30 percent would not consider a Web security platform that did not have the ability to secure and manage social networking and Web 2.0 applications
  • 32 percent said social networking is a critical business collaboration tool
  • 87 percent personally use social networks on the corporate network
  • 80 percent said information leakage is a primary concern with social networking use
  • 15 percent said social networking is "blocked" on the corporate network
  • 51 percent estimate that employees use social networks at work more than an hour per day

    Download the survey report Social Networking in the Enterprise: Working, or Not Working.

    About FaceTime's Unified Security Gateway FaceTime's Unified Security Gateway (USG) is a secure Web gateway appliance that integrates Web 2.0 application detection and control, gateway malware protection and Web filtering with FaceTime's best-in-class IM hygiene and archiving. With this single point of control, more than 2,100 Web and real-time applications and many thousands of social networking applications can be tracked, monitored and controlled to give organizations complete visibility into all Internet communications, and simplify administration.

    With USG, IT administrators can set time of day or usage policies across all applications and view detailed reports to gain complete visibility into employees use of the network " not only in terms of browsing but also specific Web 2.0 usage. This complete visibility and control provides IT with a distinct advantage in managing network resources in addition to securing against inbound malware and putting controls in place to prevent outbound data leakage.

    About FaceTime Communications FaceTime Communications enables the safe and productive use of instant messaging, Web usage and Unified Communications platforms. Ranked number one by IDC for five consecutive years, FaceTime's award-winning solutions are used by more than 1,000 customers for security, management and compliance of real-time communications. FaceTime supports or has strategic partnerships with all leading public and enterprise IM network providers, including AOL, Google, Microsoft, Yahoo!, Skype, IBM and Jabber.

    Comment  | 
    Print  | 
    More Insights
  • Register for Dark Reading Newsletters
    White Papers
    Cartoon
    Current Issue
    Dark Reading December Tech Digest
    Experts weigh in on the pros and cons of end-user security training.
    Flash Poll
    Video
    Slideshows
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2014-5314
    Published: 2014-11-23
    Buffer overflow in Cybozu Office 9 and 10 before 10.1.0, Mailwise 4 and 5 before 5.1.4, and Dezie 8 before 8.1.1 allows remote authenticated users to execute arbitrary code via e-mail messages.

    CVE-2014-5325
    Published: 2014-11-23
    The (1) DOMConverter, (2) JDOMConverter, (3) DOM4JConverter, and (4) XOMConverter functions in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allow remote attackers to read arbitrary files via DOM data containing an XML external entity declaration in conjunction with an entity refe...

    CVE-2014-5326
    Published: 2014-11-23
    Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

    CVE-2014-6477
    Published: 2014-11-23
    Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4...

    CVE-2014-4807
    Published: 2014-11-22
    Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

    Best of the Web
    Dark Reading Radio
    Archived Dark Reading Radio
    Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?