IBM Tool Aims to Clean Up Cloud App Usage Patterns
(NYSE:IBM) disclosed that its objective of the new tool was to prevent any leakage of sensitive data through the rogue cloud apps.
Now, thanks to IBM Cloud Security Enforcer, you can finally be the “Yes Guy” in IT. As a complete SaaS solution, IBM Cloud Security Enforcer combines cloud discovery, user analytics, identity and access management, and threat prevention into a single integrated offering, helping businesses to efficiently and securely deploy new cloud services.
“From what we’ve seen in our research and in real-life scenarios, employees continue to use outside cloud and mobile apps to help them do their jobs, and will only continue to increase as technology advances and demographics shift”.
The study, which was released privately to SCMagazine.com, discovered that about 33 percent of Fortune 1000 employees regularly save and share company data to an external cloud-based platform that the company can not track. Employees are increasingly engaging in risky practices on these tools, such as signing in with their personal email addresses, using weak passwords, or re-using corporate log-in credentials.
Big Blue calls the cloud app security tool Cloud Security Enforcer. The study found that now , one out of every two Millennials is sharing work data to outside cloud apps.
Known as shadow IT, the use of apps by workers that have not received the permission of IT teams to install or stream non-approved software within the firewall of a company has been cited as a way data is leaked beyond corporate boundaries and identified as a vector for security risks and breaches.
“We believe that this IBM cloud tool will surely stand out in the market as it not only makes cloud computing safe in corporations, but also efficient as employees have the freedom to use various cloud applications”, an official said. This intelligence enables security and IT teams to quickly react to emerging threats from cloud apps, blocking and taking action against the ones that may present a risk.
The technology delivers four core capabilities. It determines and enforces what company data can or cannot be shared by employees with specific third-party cloud apps.