Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

11/15/2012
02:59 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Symantec's Digital Information Index Reveals Half Of Business Information Resides Outside The Firewall

Cloud and mobile computing driving information sprawl

BARCELONA, Spain – Symantec Vision 2012 – November 13, 2012 – Symantec (Nasdaq: SYMC) today launched its first Digital Information Index highlighting the significant impact that cloud computing and mobility are having on businesses today. The 2012 State of Information Report reveals the benefits but also growing challenges of "information sprawl" as organizations increase the level of information stored and accessed outside of the firewall.

Read more detailed blog post: Mobility and Cloud Computing Are Driving Information Sprawl Blog

"Businesses are undergoing a transformation unlike anything we've seen before. With mobile devices and cloud giving employees access to information from nearly anywhere, we're also seeing more sensitive information living beyond the traditional IT boundaries," said Francis deSouza, group president, Enterprise Products and Services, Symantec Corp. "This is creating concern about how to best protect this information."

Click to Tweet: Symantec's Digital Information Index reveals half of business information resides outside the firewall:http://bit.ly/QSzjZh

Information Sprawl

Globally, almost half (46 percent) of an organisation's information is being stored outside of its own data center. At 53%, small and medium businesses (SMBs) outpace enterprises when it comes to information residing outside the firewall, when taking into account mobile devices and laptops. In some countries this number rises to more than half, such as India (83 percent), China (60 percent) and Singapore (60 percent).

Symantec has created a Digital Information Index to represent this information sprawl visually and provide a barometer of where information sits today in different parts of the world. The Index highlights markets experiencing high information sprawl – such as India and China where other markets are dealing with less information sprawl, such as Japan and France.

Modern technologies and information sprawl clearly has benefits, but over a quarter of businesses surveyed have experienced challenges as a result. More than one-third of businesses had experienced the exposure of confidential information as a result of lost or stolen mobile devices. Other issues arise from being unable to find what they need, with a large proportion of their information being unorganized or difficult to find. And even within the firewall, their storage utilization is at just 31%, dipping even lower outside the data center.

The Impact of Mobility and the Cloud

The surge in mobility is contributing to information sprawl. In fact, smartphones and tablets store 14% of business information globally. For enterprises, this is 14%, compared to 11% for SMBs. This number is much higher in countries including India (62 percent), Australia and New Zealand (46 percent) and Italy (38 percent). Information accessed on mobile devices is even higher at 28% globally. Here again we see enterprises leading with 31%, compared to 25% for SMBs. Once again India is higher than average, with 43% of its information being accessed on smartphones and tablets, joined by Brazil (42 percent), Singapore (39) percent and Malaysia (38 percent.)

In addition, the advantages in cost and agility presented by cloud computing are leading to significant use of the cloud to store business information. Globally, almost a quarter (23 percent) of business information is stored in the cloud, between public, private and hybrid deployments. This number is particularly high in Indonesia (45 percent), China (39 percent), Vietnam (34 percent) and Japan (32 percent).

Protecting Information in Today's Environment

In light of this shift beyond the data center, making information management a priority is more important than ever. To minimize information sprawl and its effects on the organization, Symantec has developed the following recommendations:

· Focus on the information, not the device or data center: With BYOD and cloud, information is no longer within the four walls of a company. Protection must focus on the information, not the device or data center.

· Not all information is equal: Business must be able to separate useless data from valuable business information and protect it accordingly.

· Be efficient: Deduplication and archiving help companies protect more, but store less to keep pace with exponential data growth.

· Consistency is key: It is important to set consistent policies for information that can be enforced wherever it's located... physical, mobile, virtual and cloud environments.

· Stay agile: Plan for your future information needs by implementing a flexible infrastructure to support continued growth.

About Symantec

Symantec protects the world's information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment – from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24498
PUBLISHED: 2021-08-02
The Calendar Event Multi View WordPress plugin before 1.4.01 does not sanitise or escape the 'start' and 'end' GET parameters before outputting them in the page (via php/edit.php), leading to a reflected Cross-Site Scripting issue.
CVE-2021-24503
PUBLISHED: 2021-08-02
The Popular Brand Icons – Simple Icons WordPress plugin before 2.7.8 does not sanitise or validate some of its shortcode parameters, such as "color", "size" or "class", allowing users with a role as low as Contributor ...
CVE-2021-24504
PUBLISHED: 2021-08-02
The WP LMS – Best WordPress LMS Plugin WordPress plugin through 1.1.2 does not properly sanitise or validate its User Field Titles, allowing XSS payload to be used in them. Furthermore, no CSRF and capability checks were in place, allowing such att...
CVE-2021-33526
PUBLISHED: 2021-08-02
In MB connect line mbDIALUP versions <= 3.9R0.0 a low privileged local attacker can send a command to the service running with NT AUTHORITY\SYSTEM instructing it to execute a malicous OpenVPN configuration resulting in arbitrary code execution with the privileges of the service.
CVE-2021-33527
PUBLISHED: 2021-08-02
In MB connect line mbDIALUP versions <= 3.9R0.0 a low privileged local attacker can send a command to the service running with NT AUTHORITY\SYSTEM that won't be validated correctly and allows for an arbitrary code execution with the privileges of the service.