SlideShare a Scribd company logo
1 of 25
Download to read offline
THE DATA 
FACTORY 
12 Essential Facts on 
Enterprise Cloud 
Usage & Risk
The cloud is growing exponentially
AND 33% OF COMPANIES HAVE A 
“FULL STEAM AHEAD” 
attitude toward cloud adoption 
Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities”
They’re investing heavily in 
enterprise-grade cloud services
TOP 20 
ENTERPRISE 
CLOUD 
SERVICES 
1. Amazon Web Services 
2. Microsoft Office 365 
3. Salesforce 
4. Cisco WebEx 
5. Concur 
6. ServiceNow 
7. Box 
8. LivePerson 
9. Zendesk 
10. Yammer 
11. 
BMC Service 
Management 
12. Workday 
13. OpenText BPM 
14. OneDrive 
15. GoToMeeting 
16. NetSuite 
17. SuccessFactors 
18. SAS OnDemand 
19. Oracle Taleo 
20. Host Analytics
Meanwhile, there’s an explosion of 
apps employees are bringing to work 
with them
Meanwhile, there’s an explosion of 
apps employees are bringing to work 
with them 
This is called
72% of companies don’t 
of companies don’t 
know the scope of 
know the scope of 
Shadow IT in their 
in their organizations, 
organizations, but 
but want to know 
want to know 
Source: 2014 Cloud Security Alliance Survey 
“Cloud Adoption Practices and Priorities”
Consumer services may have a 
legitimate business use for some 
employees, but in many instances 
their use is unsanctioned
TOP 20 
CONSUMER 
CLOUD 
SERVICES 
in the workplace 
1. Facebook 
2. Twitter 
3. YouTube 
4. Linkedin 
5. Pinterest 
6. Gmail 
7. Instagram 
8. Tumblr 
9. Flickr 
10. Myspace 
11. Dropbox 
12. Yahoo! Mail 
13. Apple iCloud 
14. Google Drive 
15. Photobucket 
16. Spotify 
17. Shutterfly 
18. Slideshare 
19. Smugmug 
20. VK
REQUEST COMPLIMENTARY CLOUD AUDIT 
“With Skyhigh we 
discovered a wide 
range of services, 
allowing us to 
understand their 
associated risks 
and put in place 
policies to protect 
corporate data.” 
Steve Martino 
VP Information Security 
Tip: To learn what cloud apps 
are in use at your company, get a 
complimentary cloud audit
While many cloud services drive 
productivity and growth in the 
business, not all of them are secure
In response, 
IT tries to block them
However, you may not be 
blocking these apps as effectively 
as you think…
CLOUD ENFORCEMENT GAP 
Apple iCloud 
Dropbox 
Facebook 
Instagram 
Netflix 
Pandora 
Skype 
Tumblr 
Twitter 
YouTube 
The gap between 
what companies 
think they’re blocking 
and the actual 
block rates 
Intended Block Rate 
Source: 2014 Cloud Security Alliance Survey “Cloud 
Adoption Practices and Priorities” and Skyhigh Networks 
80% 
50% 
48% 
Cloud Enforcement Gap 
40% 
35% 
40% 
50% 
45% 
35% 
40% 
Actual Block Rate 
21% 
31% 
4% 
4% 
3% 
9% 
7% 
3% 
11% 
17%
Even if you want to block certain 
apps, it can be difficult to say no
49% Source: 2014 Cloud Security Alliance Survey “Cloud 
of IT professionals said they had 
been pressured into approving 
an unsecure app 
Adoption Practices and Priorities”
And even secure, sanctioned cloud 
services can be used in risky ways
Just 17% 
of companies surveyed 
reported an insider threat 
incident in the last year 
perception 
NO 52% 
NOT SURE 31% 
YES 17% 
Source: 2014 Cloud Security Alliance Survey “Cloud 
Adoption Practices and Priorities” and Skyhigh Networks 
Have you had an 
INSIDER THREAT 
INCIDENT?
Just 17% 
of companies surveyed 
reported an insider threat 
incident in the last year 
Have you had an 
INSIDER THREAT 
INCIDENT? 
But 85% 
of companies actually had 
an insider threat 
perception reality 
Source: 2014 Cloud Security Alliance Survey “Cloud 
Adoption Practices and Priorities” and Skyhigh Networks 
YES 
85% 
NO 52% 
NOT SURE 31% 
YES 17%
There will always be outliers, like this 
actual employee who may be the 
world’s worst cloud user
INTRODUCING THE CLOUD’S 
DR. EVIL 
(actual name changed to protect the accused) 
This employee used 182 high-risk 
cloud services at work, and uploaded 
data to each of these: 
SERVICE CATEGORY DATA UPLOAD RISK LEVEL 
SourceForge 
LiveLeak 
4Shared 
Codehaus 
ZippyShare 
Development 
Social Media 
File Sharing 
Development 
File Sharing 
9.3 GB 
557.7 MB 
2.6 GB 
199.6 MB 
3.0 GB 
HIGH 
HIGH 
HIGH 
HIGH 
HIGH
The good news is you can make 
progress by focusing on the top 
destinations of corporate data
Box 
Dropbox 
YouTube 
Microsoft Office 365 
Jive 
Cisco WebEx 
Facebook 
Salesforce 
Gmail 
Apple iCloud 
Google Drive 
23% 
11% 
9% 
7% 
5% 
5% 
5% 
4% 
4% 
4% 
3% 
80% 
OF DATA GOES TO 
JUST 11 
CLOUD SERVICES
Download the Full Report 
DOWNLOAD NOW 
CLOUD ADOPTION 
& RISK REPORT 
Q3 2014 
Published Q4 2014 
Get the full report with 
detailed statistics on the 
top cloud services, 
fastest growing apps, 
and risks you can avoid 
in the cloud.

More Related Content

Viewers also liked

The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaSkyhigh Networks
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaAsheem Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - FranticMiika Puputti
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSkyhigh Networks
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve JobsHubSpot
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Manual administracion riesgo
Manual administracion riesgoManual administracion riesgo
Manual administracion riesgoCincoC
 
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)Jorge Millán Cabrera
 

Viewers also liked (10)

The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and Sequoia
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Manual administracion riesgo
Manual administracion riesgoManual administracion riesgo
Manual administracion riesgo
 
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
 

Recently uploaded

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

The Data Factory: 12 Essential Facts on Enterprise Cloud Usage and Risk

  • 1. THE DATA FACTORY 12 Essential Facts on Enterprise Cloud Usage & Risk
  • 2. The cloud is growing exponentially
  • 3. AND 33% OF COMPANIES HAVE A “FULL STEAM AHEAD” attitude toward cloud adoption Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities”
  • 4. They’re investing heavily in enterprise-grade cloud services
  • 5. TOP 20 ENTERPRISE CLOUD SERVICES 1. Amazon Web Services 2. Microsoft Office 365 3. Salesforce 4. Cisco WebEx 5. Concur 6. ServiceNow 7. Box 8. LivePerson 9. Zendesk 10. Yammer 11. BMC Service Management 12. Workday 13. OpenText BPM 14. OneDrive 15. GoToMeeting 16. NetSuite 17. SuccessFactors 18. SAS OnDemand 19. Oracle Taleo 20. Host Analytics
  • 6. Meanwhile, there’s an explosion of apps employees are bringing to work with them
  • 7. Meanwhile, there’s an explosion of apps employees are bringing to work with them This is called
  • 8. 72% of companies don’t of companies don’t know the scope of know the scope of Shadow IT in their in their organizations, organizations, but but want to know want to know Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities”
  • 9. Consumer services may have a legitimate business use for some employees, but in many instances their use is unsanctioned
  • 10. TOP 20 CONSUMER CLOUD SERVICES in the workplace 1. Facebook 2. Twitter 3. YouTube 4. Linkedin 5. Pinterest 6. Gmail 7. Instagram 8. Tumblr 9. Flickr 10. Myspace 11. Dropbox 12. Yahoo! Mail 13. Apple iCloud 14. Google Drive 15. Photobucket 16. Spotify 17. Shutterfly 18. Slideshare 19. Smugmug 20. VK
  • 11. REQUEST COMPLIMENTARY CLOUD AUDIT “With Skyhigh we discovered a wide range of services, allowing us to understand their associated risks and put in place policies to protect corporate data.” Steve Martino VP Information Security Tip: To learn what cloud apps are in use at your company, get a complimentary cloud audit
  • 12. While many cloud services drive productivity and growth in the business, not all of them are secure
  • 13. In response, IT tries to block them
  • 14. However, you may not be blocking these apps as effectively as you think…
  • 15. CLOUD ENFORCEMENT GAP Apple iCloud Dropbox Facebook Instagram Netflix Pandora Skype Tumblr Twitter YouTube The gap between what companies think they’re blocking and the actual block rates Intended Block Rate Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities” and Skyhigh Networks 80% 50% 48% Cloud Enforcement Gap 40% 35% 40% 50% 45% 35% 40% Actual Block Rate 21% 31% 4% 4% 3% 9% 7% 3% 11% 17%
  • 16. Even if you want to block certain apps, it can be difficult to say no
  • 17. 49% Source: 2014 Cloud Security Alliance Survey “Cloud of IT professionals said they had been pressured into approving an unsecure app Adoption Practices and Priorities”
  • 18. And even secure, sanctioned cloud services can be used in risky ways
  • 19. Just 17% of companies surveyed reported an insider threat incident in the last year perception NO 52% NOT SURE 31% YES 17% Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities” and Skyhigh Networks Have you had an INSIDER THREAT INCIDENT?
  • 20. Just 17% of companies surveyed reported an insider threat incident in the last year Have you had an INSIDER THREAT INCIDENT? But 85% of companies actually had an insider threat perception reality Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities” and Skyhigh Networks YES 85% NO 52% NOT SURE 31% YES 17%
  • 21. There will always be outliers, like this actual employee who may be the world’s worst cloud user
  • 22. INTRODUCING THE CLOUD’S DR. EVIL (actual name changed to protect the accused) This employee used 182 high-risk cloud services at work, and uploaded data to each of these: SERVICE CATEGORY DATA UPLOAD RISK LEVEL SourceForge LiveLeak 4Shared Codehaus ZippyShare Development Social Media File Sharing Development File Sharing 9.3 GB 557.7 MB 2.6 GB 199.6 MB 3.0 GB HIGH HIGH HIGH HIGH HIGH
  • 23. The good news is you can make progress by focusing on the top destinations of corporate data
  • 24. Box Dropbox YouTube Microsoft Office 365 Jive Cisco WebEx Facebook Salesforce Gmail Apple iCloud Google Drive 23% 11% 9% 7% 5% 5% 5% 4% 4% 4% 3% 80% OF DATA GOES TO JUST 11 CLOUD SERVICES
  • 25. Download the Full Report DOWNLOAD NOW CLOUD ADOPTION & RISK REPORT Q3 2014 Published Q4 2014 Get the full report with detailed statistics on the top cloud services, fastest growing apps, and risks you can avoid in the cloud.