80% of IT, Security Pros Claim to Use Outmoded Collaboration Tools80% of IT, Security Pros Claim to Use Outmoded Collaboration Tools
New research from Intralinks and the Cloud Security Alliance identifies three key obstacles to content-driven digital transformation and data privacy compliance.
February 23, 2017
NEW YORK – New research from secure collaboration provider Intralinks and the Cloud Security Alliance (CSA) examines the progress towards content-driven digital transformation and data privacy compliance in the enterprise.
To stay competitive in an increasingly digital world, companies are either starting to or are currently in the process of transforming their digital environment to improve collaboration and information sharing. Meanwhile, data privacy legislation, such as the General Data Protection Regulation (GDPR), is redefining how data can be shared across country borders.
The report from Intralinks and the CSA, Collaboration in the Era of Digital Transformation: Barriers to Entry, expands on these trends and identifies three crucial barriers companies are facing as they look to achieve these dual goals and maintain their competitive edge:
Outmoded and clunky enterprise content management systems (ECMs)
Data siloes that inhibit collaboration between departments and stakeholders
Data privacy and compliance worries
The report sheds light on these barriers, as well as content sharing and data privacy trends. Key takeaways from the survey results include:
Of the IT and security professionals surveyed, a full 80% admit that their company is still using traditional file folders to organize and share content
57% of respondents think their company’s content tools like ECM, cloud storage and SharePoint are siloed and difficult to connect
74% of respondents are either “not very confident” or “not confident at all” that they will meet the compliance deadline for the GDPR in 2018
Intralinks’ latest initiative, the Intralinks Trust Perimeter, is designed to support its customers’ growing data protection challenges. This initiative allows Intralinks customers to ‘define your own perimeter,’ where companies decide how information is protected as it leaves the firewall and moves around the world, while meeting changing data privacy demands.
"Our research with the CSA sheds light on the barriers that enterprises continue to face as they try to meet the seemingly opposing goals of increased collaboration versus stricter security and regulatory compliance measures," said Daren Glenister, Field CTO at Intralinks. "Our goal at Intralinks is to show businesses how our platform allows them to collaborate securely while maintaining control over where their information travels."
Download the report
Find the full report from Intralinks and the CSA here.
Methodology and Demographics
The methodological approach in the report involved the analysis of studies and reports from relevant analysts and publications, as well as a survey of 440 security professionals across 23 countries during a span of 11 weeks. Respondents consisted of IT and security professionals across multiple industry verticals, job levels and company sizes. CSA had final editing rights of the survey questions before distribution to the public and the final report.
Intralinks is a global content collaboration company that provides cloud-based solutions to control the sharing, distribution and management of high value content within and across organizations according to the highest-level of security and the most stringent compliance regulations. Over 90,000 clients, 99% of the Fortune 1000 companies, have depended on Intralinks' to digitally transform and simplify critical business processes and secure high-value information. With a 20-year track record of enabling high-stakes transactions and business collaborations valued at $31.3 trillion, Intralinks is a trusted provider of easy-to-use, enterprise strength, cloud-based collaboration technology. Intralinks, Inc. is a subsidiary of Synchronoss Technologies, Inc. (NASDAQ: SNCR). For more information, visit www.intralinks.com.
Forward Looking Statements
This document may include certain "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. These forward-looking statements include, but are not limited to, plans, objectives, expectations and intentions and other statements contained in this press release that are not historical facts and statements identified by words such as "expects," "anticipates," "intends," "plans," "believes," "seeks," "estimates," “outlook” or words of similar meanings. These statements are based on our current beliefs or expectations and are inherently subject to various risks and uncertainties, including those set forth under the caption "Risk Factors" in Synchronoss’ Annual Report on Form 10-K for the year ended December 31, 2015 and other documents filed with the U.S. Securities and Exchange Commission. Actual results may differ materially from these expectations due to changes in global political, economic, business, competitive, market and regulatory factors. Synchronoss does not undertake any obligation to update any forward-looking statements contained in this document as a result of new information, future events or otherwise.
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023