Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

7/24/2012
12:29 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

WatchDox, Ponemon Institute Expose Enterprise Document Security Risks

Study examines state of document-centric security in today’s corporate environment; identifies top risks

MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--WatchDox, a provider of secure access and collaboration solutions, today announced the results of the Ponemon Institute’s 2012 Confidential Documents at Risk Study. The study focuses on the security threats associated with inadequate management of confidential business information contained in files such as spreadsheets, presentations and documents, especially when shared or synced. The study also identifies best practices for achieving stronger document-centric security.

“WatchDox provides businesses with an enterprise-grade alternative to consumer services like Dropbox, providing control over and visibility into what happens to data, even when it travels to mobile devices or is shared with third parties.”

The growing popularity of consumer-grade, browser-based file sharing applications, such as YouSendIt and Dropbox, has improved productivity within the enterprise, but at what cost? This study, which surveyed 622 IT and security practitioners with an average of more than 11 years of experience, answers this question.

The Ponemon Institute highlighted the following findings in its research:

Ninety percent of organizations represented in the study experienced leakage or loss of sensitive or confidential documents over the past 12-month period. Seventy-one percent of respondents say that controlling sensitive or confidential documents is more difficult than controlling records in databases. Seventy percent say documents accessed by mobile data-bearing devices such as smartphones and tablets present a significant security risk. Seventy percent of respondents say that employees, contractors or business partners have very frequent or frequent access to sensitive or confidential documents, even though access to this information is not a job or role-related requirement. Fifty-nine percent say their organizations’ controls are ineffective at monitoring employees, contractors or other insiders who access these confidential documents. An even higher percentage (63 percent) do not believe they are effective at assigning privilege to employees, contractors and other insiders whose jobs or roles requires access to sensitive or confidential documents.

“While users today expect on-demand access to all personal and company documents from any device, at any time, this study confirms that IT professionals are struggling to deliver on that expectation securely,” said Ryan Kalember, chief product officer at WatchDox. “WatchDox provides businesses with an enterprise-grade alternative to consumer services like Dropbox, providing control over and visibility into what happens to data, even when it travels to mobile devices or is shared with third parties.”

The WatchDox platform, which can be deployed on premise or in the cloud, allows companies to control the lifecycle of a document, track views, prevent recipients from forwarding, printing or downloading confidential information and revoke access to any document at any time. With features like sync, annotations, search and a consumer-style interface, WatchDox provides IT professionals with the control and visibility they require and gives employees the instant access they demand.

View the 2012 Confidential Documents at Risk Study whitepaper here.

About Ponemon Institute

The Ponemon Institute is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.

About WatchDox

WatchDox enables organizations to provide secure access to their documents wherever they go: on any tablet, smartphone, laptop or PC, even those beyond the IT department’s control. With WatchDox technology, organizations can collaborate securely with partners, safely adopt bring-your-own-device (BYOD) initiatives, and destroy their documents remotely if a device goes missing. More than 500 enterprises worldwide – including top-10 financial institutions, government agencies, and many of the Fortune 500 – depend on WatchDox solutions. For more information, please visit http://www.watchdox.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20203
PUBLISHED: 2021-02-25
An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS s...
CVE-2021-3406
PUBLISHED: 2021-02-25
A flaw was found in keylime 5.8.1 and older. The issue in the Keylime agent and registrar code invalidates the cryptographic chain of trust from the Endorsement Key certificate to agent attestations.
CVE-2021-20327
PUBLISHED: 2021-02-25
A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node....
CVE-2021-20328
PUBLISHED: 2021-02-25
Specific versions of the Java driver that support client-side field level encryption (CSFLE) fail to perform correct host name verification on the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in inte...
CVE-2020-27543
PUBLISHED: 2021-02-25
The restify-paginate package 0.0.5 for Node.js allows remote attackers to cause a Denial-of-Service by omitting the HTTP Host header. A Restify-based web service would crash with an uncaught exception.