As enterprises implement collaboration applications to increase staff productivity and cut costs, they are increasing the risk of security breaches, according to a survey conducted for Rohati Systems that was released today.
The 117 respondents, all high-level IT executives from enterprises of various sizes, have deployed applications such as Web-based Intranet portals, Web 2.0 applications, Common Internet File Systems, IBM (NYSE: IBM) Lotus Notes, content management systems and Microsoft (NASDAQ: MSFT) SharePoint to communicate and collaborate internally and with external partners.
Seventy-one percent of the respondents said their organizations have not implemented adequate security to protect data in a collaborative environment.
Unauthorized user access to and use of applications, data, information and files and the risk of data loss or data breaches are among their greatest security concerns.
“Collaboration is necessary to drive productivity and revenues, but you
need to ensure that you understand who is accessing what,” Shane Buckley,
CEO of Rohati, told InternetNews.com. “It’s amazing how many
enterprises don’t know that and are just making assumptions.”
Once they know who is touching what application, enterprises must put controls in place. “Controls don’t exist in collaboration applications, which, by their very nature are almost viral,” Buckley said. “You must either get developers to recode your applications, which takes millions of dollars and up to 24 months, or you put in something like a datacenter firewall on steroids.”
Basic authentication, consisting of the user name and password, was used to secure collaborative applications by 79 percent of the respondents’ companies. Another 31 percent used secure sign-on applications such as Kerberos; 26 percent used enhanced authentication and authorization systems such as tokens and smart cards.
Despite this, the respondents were bothered that IT cannot exert enough
control over collaborative applications to ensure security.
Forty-nine percent of the respondents said their greatest concern is that they cannot enforce consistent access policies across all the applications and data. Another 16 percent were worried about their inability to audit and report on access and usage to meet compliance requirements, and 13 percent feared the lack of visibility into users’ actions.
Unauthorized user access to applications, data and information bothered
40 percent of the respondents. Another 29 percent feared data losses or
breaches, 14 percent were concerned about unauthorized or malicious user of
files stored in information repositories, and 13 percent feared that users
would make unauthorized changes to data.
When it came to who might get unauthorized access to sensitive data, 50
percent of the respondent cited employees. Respondents were more concerned
about domestic contractors than foreign contractors — 33 percent worried
about domestic contractors and 28 percent were concerned with foreign contractors.
Partners were also an area of concern, with 29 percent of the respondents
fearing partners might get unauthorized access to sensitive data.
This article was first published on InternetNews.com. To read the full article, click here.
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.