The survey found that 92% of companies are generally concerned about a lack of control over their confidential, sensitive, and mission-critical information.
Driving this issue is a misalignment between the employees who need effective tools for inter-enterprise collaboration and the C-level executives responsible for securing valuable proprietary data and enforcing IT policies and corporate governance. As a consequence, 55% of the companies surveyed now employ a Chief Information Security Officer tasked with managing these risks, and over half of respondents are planning to upgrade security technology collaboration solutions within the next 18 months.
“CIOs want to encourage collaboration, but not at the expense of exposing their core IP or risking a data breach,” said John Landy, chief technology officer at Intralinks. “The influx of consumer-grade file sharing technologies into the enterprise is a significant concern. Our research clearly shows that organizations want to encourage open collaboration while enabling IT to build easily applied processes that make sure transactions are secure, compliant, and auditable.”
Top Ranked Features Needed Across Organizations
As part of the survey, respondents ranked technology-related needs in three categories: security features, ease-of-use features, and business productivity features. Across the board, highly secure public cloud storage (63%), pullback of document permissions (63%), and document-based workflow capabilities (61%) ranked as the most important file sharing related needs for businesses. A single secure connection to document sharing tools regardless of the device used (61%) was ranked fourth, indicating that companies are paying attention to the growing trend of “bring-your-own-device.”
Employees: The Five Types of Sharers in an Organization
The study identified that 92% of respondents are concerned about employees sharing sensitive documents outside of the firewall and are wary of letting employees use insecure methods of data transfer that include email, USB drives, FTP servers, and consumer-grade file-sharing. However, as identified in the survey, not all sharers are alike and organizations need to determine which categories their workforce includes in order to better understand how to employ secure and efficient technologies to optimize workflow. As determined through the survey, sharers can be divided into five categories: Strategic Users, Securers, Concerned Sharers, Convenience Users, and Indifferent Users. Strategic Users and Securers are concerned about sharing documents outside of the firewall, want security features such as information rights management and encryption, and want productivity enhancing tools for sync & share and business intelligent workflow. Concerned Sharers value data control and compliance above productivity enhancing features. Convenience Users think that security stifles productivity and use the simplest option available, ignoring associated risks. Indifferent Users are not concerned about secure sharing.
Employers: The Rise of the Chief Information Security Officer (CISO)
Secure technology is now a core requirement to running a successful business, and many companies have recognized its increased importance by adding a new member to the C-suite. The Chief Information Security Officer (CISO) has been introduced to either supplement or replace the role of the Chief Information Officer (CIO). Over 55% of respondents currently employ a CISO, reflecting the shifting role of workplace IT leaders from ones responsible for deploying technologies that enable employees to work more efficiently, to ones in charge of policing technologies that pose a risk to data and network security. It is critical that CISOs understand the document sharing needs of their workforce, or they will find employees violating IT policies in order to work more effectively.
The findings were based on a proprietary survey by Intralinks identifying file sharing and collaboration security issues affecting IT decision makers at U.S.-based companies. The results are based on the responses of 652 IT and business decision makers compiled from June to July 2012. The survey respondents included CIOs, C-suite, SVP/VP/Director- and mid-level managers. Approximately half of the respondents at the time of the survey served in an IT decision making capacity, with the remainder serving in roles across corporate development, operations, finance, sales, human resources, marketing, and research & development. The survey focused on enterprise level companies, with 80% of survey respondents serving at companies with 5,000 or more employees in a range of sectors including manufacturing, financial services, retail, healthcare, transportation, education, and insurance.
As a follow-up to this research, Intralinks created a Sharing Personality Survey to help enterprise employees determine which of the five types of sharers they are, and if their organization might be at risk for data leaks. The first 100 respondents will receive a $25 Amazon gift card. Visithttp://intralinks.checkboxonline.com/Sharing-Personality-Survey.aspx to take the survey and receive your sharing personality profile now.
Additionally, Intralinks recently launched its Content-Sharing Risk Calculator to help you determine the control and protection level of your organization’s sensitive information. Business trends are encouraging users to share information with whomever is needed to get the job done, often outside the corporate firewall. Use the calculator at http://www.intralinks.com/ms/box/risk-calculator/index.php to answer a few quick questions and receive both a score and a risk assessment.
Forward Looking Statements
The forward-looking statements contained in this press release are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. Forward-looking statements are express or implied statements that are not based on historical information and include, among other things, statements concerning Intralinks’ plans, intentions, expectations, projections, hopes, beliefs, objectives, goals and strategies. These statements are neither promises nor guarantees, but are subject to a variety of risks and uncertainties, many of which are beyond our control and could cause actual results to differ materially from those contemplated in these forward-looking statements. Accordingly, there can be no assurance that the results expressed, projected or implied by any forward-looking statements will be achieved, and readers are cautioned not to place undue reliance on any forward-looking statements. The forward-looking statements in this press release speak only as of the date hereof. As such, Intralinks undertakes no obligation to update or revise the information contained in this press release, whether as a result of new information, future events or circumstances or otherwise. For a detailed list of the factors and risks that could affect Intralinks’ financial results, please refer to Intralinks public filings with the Securities and Exchange Commission (the “SEC”) from time to time, including its Annual Report on Form 10-K for the year-ended December 31, 2011 and subsequent quarterly reports. Intralinks undertakes no obligation to update or revise the information contained in this press release, whether as a result of new information, future events or circumstances or otherwise.
Trademarks and Copyright
“Intralinks” and Intralinks’ stylized logo are the registered trademarks of Intralinks, Inc. This press release may also refer to trade names and trademarks of other organizations without reference to their status as registered trademarks. © 2012 Intralinks, Inc. All rights reserved.