Vulnerabilities / Threats
7/2/2009
02:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Survey: More Than Half Of Firms Plan To Secure Social Networking Use

Compared with a related survey last fall 2008, many more IT pros are reporting use of social media at their companies, according to FaceTime survey's of more than 1,100 IT respondents

BELMONT, Calif., July 1, 2009 " FaceTime Communications " the leading provider of solutions enabling the safe use of Web 2.0 and unified communications in the enterprise " found in a survey that Social Networking is widely accepted by IT respondents, and 51 percent plan to beef up security within the next 12 months.

Compared with a related survey in fall 2008 ("The Collaborative Internet: Usage Trends, IT Attitudes and End User Impact"), many more IT professionals are reporting that social media is in use at their companies, up from 60 percent six months ago to 85 percent now.

FaceTime surveyed more than 1,100 prospects, customers and other IT professionals identified through Twitter, Facebook, Plaxo and LinkedIn between May 21 and June 1.

"The widespread acceptance of social networking as a reality for the corporate network is a relatively new phenomenon," said Nishant Jadhav, director of Product Management for FaceTime Communications. "However, managers are already recognizing the business value of social networking with 31 percent of respondents seeing significant business value and only 21 percent seeing no business value."

More than half of respondents would like to see specific support for Web2.0 integrated into their Web security platform and nearly 20 percent would deploy dedicated solutions to control Web2.0.

"The reality that real-time communications and Web 2.0 applications are highly evasive is sinking in." continued Nishant Jadhav, "These applications are designed to get around Web filtering, firewalls and other traditional security measures through port crawling, tunneling and onion routing."

Other findings:

  • 30 percent would not consider a Web security platform that did not have the ability to secure and manage social networking and Web 2.0 applications
  • 32 percent said social networking is a critical business collaboration tool
  • 87 percent personally use social networks on the corporate network
  • 80 percent said information leakage is a primary concern with social networking use
  • 15 percent said social networking is "blocked" on the corporate network
  • 51 percent estimate that employees use social networks at work more than an hour per day

    Download the survey report Social Networking in the Enterprise: Working, or Not Working.

    About FaceTime's Unified Security Gateway FaceTime's Unified Security Gateway (USG) is a secure Web gateway appliance that integrates Web 2.0 application detection and control, gateway malware protection and Web filtering with FaceTime's best-in-class IM hygiene and archiving. With this single point of control, more than 2,100 Web and real-time applications and many thousands of social networking applications can be tracked, monitored and controlled to give organizations complete visibility into all Internet communications, and simplify administration.

    With USG, IT administrators can set time of day or usage policies across all applications and view detailed reports to gain complete visibility into employees use of the network " not only in terms of browsing but also specific Web 2.0 usage. This complete visibility and control provides IT with a distinct advantage in managing network resources in addition to securing against inbound malware and putting controls in place to prevent outbound data leakage.

    About FaceTime Communications FaceTime Communications enables the safe and productive use of instant messaging, Web usage and Unified Communications platforms. Ranked number one by IDC for five consecutive years, FaceTime's award-winning solutions are used by more than 1,000 customers for security, management and compliance of real-time communications. FaceTime supports or has strategic partnerships with all leading public and enterprise IM network providers, including AOL, Google, Microsoft, Yahoo!, Skype, IBM and Jabber.

    Comment  | 
    Print  | 
    More Insights
  • Register for Dark Reading Newsletters
    White Papers
    Cartoon
    Current Issue
    Flash Poll
    Video
    Slideshows
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2014-4774
    Published: 2015-05-25
    Cross-site request forgery (CSRF) vulnerability in the login page in IBM License Metric Tool 9 before 9.1.0.2 and Endpoint Manager for Software Use Analysis 9 before 9.1.0.2 allows remote attackers to hijack the authentication of arbitrary users via vectors involving a FRAME element.

    CVE-2014-4778
    Published: 2015-05-25
    IBM License Metric Tool 9 before 9.1.0.2 and Endpoint Manager for Software Use Analysis 9 before 9.1.0.2 do not send an X-Frame-Options HTTP header in response to requests for the login page, which allows remote attackers to conduct clickjacking attacks via vectors involving a FRAME element.

    CVE-2014-6190
    Published: 2015-05-25
    The log viewer in IBM Workload Deployer 3.1 before 3.1.0.7 allows remote attackers to obtain sensitive information via a direct request for the URL of a log document.

    CVE-2014-6192
    Published: 2015-05-25
    Cross-site scripting (XSS) vulnerability in IBM Curam Social Program Management 6.0 SP2 before EP26, 6.0.4 before 6.0.4.5 iFix10, 6.0.5 before 6.0.5.6, and 6.0.5.5a before 6.0.5.8 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

    CVE-2014-8146
    Published: 2015-05-25
    The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (hea...

    Dark Reading Radio
    Archived Dark Reading Radio
    Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.