Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

7/24/2012
12:29 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

WatchDox, Ponemon Institute Expose Enterprise Document Security Risks

Study examines state of document-centric security in today’s corporate environment; identifies top risks

MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--WatchDox, a provider of secure access and collaboration solutions, today announced the results of the Ponemon Institute’s 2012 Confidential Documents at Risk Study. The study focuses on the security threats associated with inadequate management of confidential business information contained in files such as spreadsheets, presentations and documents, especially when shared or synced. The study also identifies best practices for achieving stronger document-centric security.

“WatchDox provides businesses with an enterprise-grade alternative to consumer services like Dropbox, providing control over and visibility into what happens to data, even when it travels to mobile devices or is shared with third parties.”

The growing popularity of consumer-grade, browser-based file sharing applications, such as YouSendIt and Dropbox, has improved productivity within the enterprise, but at what cost? This study, which surveyed 622 IT and security practitioners with an average of more than 11 years of experience, answers this question.

The Ponemon Institute highlighted the following findings in its research:

Ninety percent of organizations represented in the study experienced leakage or loss of sensitive or confidential documents over the past 12-month period. Seventy-one percent of respondents say that controlling sensitive or confidential documents is more difficult than controlling records in databases. Seventy percent say documents accessed by mobile data-bearing devices such as smartphones and tablets present a significant security risk. Seventy percent of respondents say that employees, contractors or business partners have very frequent or frequent access to sensitive or confidential documents, even though access to this information is not a job or role-related requirement. Fifty-nine percent say their organizations’ controls are ineffective at monitoring employees, contractors or other insiders who access these confidential documents. An even higher percentage (63 percent) do not believe they are effective at assigning privilege to employees, contractors and other insiders whose jobs or roles requires access to sensitive or confidential documents.

“While users today expect on-demand access to all personal and company documents from any device, at any time, this study confirms that IT professionals are struggling to deliver on that expectation securely,” said Ryan Kalember, chief product officer at WatchDox. “WatchDox provides businesses with an enterprise-grade alternative to consumer services like Dropbox, providing control over and visibility into what happens to data, even when it travels to mobile devices or is shared with third parties.”

The WatchDox platform, which can be deployed on premise or in the cloud, allows companies to control the lifecycle of a document, track views, prevent recipients from forwarding, printing or downloading confidential information and revoke access to any document at any time. With features like sync, annotations, search and a consumer-style interface, WatchDox provides IT professionals with the control and visibility they require and gives employees the instant access they demand.

View the 2012 Confidential Documents at Risk Study whitepaper here.

About Ponemon Institute

The Ponemon Institute is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.

About WatchDox

WatchDox enables organizations to provide secure access to their documents wherever they go: on any tablet, smartphone, laptop or PC, even those beyond the IT department’s control. With WatchDox technology, organizations can collaborate securely with partners, safely adopt bring-your-own-device (BYOD) initiatives, and destroy their documents remotely if a device goes missing. More than 500 enterprises worldwide – including top-10 financial institutions, government agencies, and many of the Fortune 500 – depend on WatchDox solutions. For more information, please visit http://www.watchdox.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3272
PUBLISHED: 2021-01-27
jp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.
CVE-2021-3317
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
CVE-2013-2512
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
CVE-2021-3165
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
CVE-2021-1070
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...