More like this

Business

Arrow

The Channel

IBM: Listen up, we're the sheriffs of this leaky external app town

Gonna shoot down those Bring Your Own Cloud apps vulns

Sheriff Woody

IBM is finally waking up to the potential threat that employees’ Bring Your Own Cloud-based apps pose for corporate enterprises, prompting it to roll out a security service.

The Cloud Security Enforcer includes ID management-as-a-service and scans the corporate network to discover external apps that workers are using, then seeks to secure the access, Big Blue said.

The problems tend to arise when staffers jump into Google Docs, Dropbox or Box to share documents with each other.

“By using these third party cloud applications, organisations cannot see, manage or secure the information employees are sharing outside of company policy,” said Andy Lane, programme director at IBM Security.

A study commissioned by IBM Security showed one in three Fortune 1000 employees regularly saves and shares data on external clouds that can’t be tracked, a trend that is only going to grow.

One in four workers also link the apps to their corporate log-in and password, potentially creating “vast loopholes” that hackers can use to get into the corporate network.

“Whether it’s allowed by their employer or not, they’re still going to use outside tools, and upload company data to them. Instead of fighting this activity, companies would be wise to look for ways to give their employees secure access to cloud apps,” said Lane.

An analyst pointed out Dropbox, Box, Microsoft and Google introduced “business variants” of their consumer doc sharing clouds a number of years ago to head off the potential security problem.

“We are seeing more use of these enterprise-friendly alternatives,” he said. Educating users on a safe use of clouds is a more useful way of tackling the problem.

Blocking technologies, as he described Cloud Security Enforcer, “only gets you so far because users will always find a way around such measures". ®

Sponsored: The world has changed, has your IAM strategy?