Over one-third of all enterprise data leakage policy violations occur on mobile devices
Nearly half of all cloud app activities and more than one-third of all data leakage policy violations occur on mobile devices, say the results of the October 2014 Netskope Cloud Report.
Based on aggregated, anonymised data from the Netskope Active Platform, the report’s findings are based on tens of billions of cloud app events seen across millions of users between July and September 2014.
Enterprises are continuing to adopt cloud apps at a fast pace, with an average of 579 cloud apps per organisation in Q3, up from 508 the previous quarter. Additionally, 88.7 percent of apps are not enterprise ready, scoring a “medium” or below in the Netskope Cloud Confidence Index.
“There’s a veritable storm of corporate activity across a wide variety of cloud apps, and it’s increasingly happening on mobile devices and often from remote locations,” said Sanjay Beri, CEO and founder of Netskope. “This makes it even more difficult for IT to keep tabs on sensitive corporate and customer data on user-owned devices, especially when you consider that the majority of these apps aren’t enterprise-ready. The data here indicate that, while IT is increasingly aware of the “shadow IT’ problem, it continues to underestimate actual app usage, and the associated risks, by a considerable margin.”
Top 10 cloud apps accessed from mobile devices
Top cloud app activities on mobile
Through this report Netskope isolated the cloud app activity data originating from mobile devices. The data validate that users see mobile devices as a viable extension of cloud apps for completing easily accomplished tasks like “send,” “share,” and “post.” Interestingly, the frequency of activities such as “create” and “approve” may be evidence that app vendors’ efforts to improve the user experience and streamline workflows on mobile devices are paying off.
Beyond the activities themselves, a high number of activity-based policy violations occur on mobile devices, the highest of which is 59 percent of “download” violations. Moreover, more than one-third (34 percent) of all data leakage policy violations occur on mobile devices. This is disproportionately high as compared to total cloud app consumption from mobile devices. Netskope researchers suspect that IT administrators have set stricter policies for mobile devices based on the higher inherent risks associated with mobile access, whether through a device purchased by the company or brought in by the employee through a BYOD program.
Which cloud apps are most popular?
The report identified the top 20 apps used by enterprises based on distinct app sessions. This reflects all cloud app access points tracked by the Netskope Active Platform, which includes perimeter device (e.g., firewalls, gateways, etc.) log analysis and real-time visibility of campus PC, remote PC, and mobile device (e.g., smartphones, tablets).
These apps are: Google Drive, Facebook, Twitter, GMail, YouTube, LinkedIn, Dropbox, Pinterest, Microsoft OneDrive, iCloud, Salesforce, Box, Jive SBS, LiverPerson, Microsoft Office 365, Evernote, WebEx, Amazon CloudDrive, Concur, and Weibo.