Sie sind auf Seite 1von 14

TRENDIN G:

I dont want to be Li nkedIn with Micros oft

Advanced beginner's gui de to R

Subscribe to newsl etters

Resourc es/White Papers

Search

computerworld
Sign In | Register
Cloud Computing
Computer Hardware
Consumerization of IT
Data Center
Emerging Technology
Enterprise Applications
IT Management
Internet
Mobile & Wireless
Networking
Operating Systems
Security
Vertical IT
All Topics
News
Features
Reviews
Blogs
Opinions
Insider
Shark Tank
Slideshows
Video
Digital Magazine
Digital Downloads
Newsletters
Computerworld Events
IT Job Search

Resources/White Papers
Home
Cloud Computing
NEWS

IBM tackles 'shadow IT' with a new cloud


security tool for enterprises
MORE LIKE THIS

The cloud gets mobile apps moving

Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone

When video collaboration makes sense in the cloud

on IDG Answers
How is data stored and accessed in the cloud?

Credit: IDGNS

A third of Fortune 1000 employees share and upload


corporate data on third-party cloud apps, it says

By Katherine Noyes
FOLLOW
IDG News Service | Sep 23, 2015 3:49 AM PT
RELATED TOPICS

Cloud Computing
Consumerization of IT
Application Security
Bring Your Own Device (BYOD)
IBM
COMMENTS
If there's one thing that can strike terror into a CIO's heart, it's
the security implications of the cloud. If there's another, it's the
"bring your own" technology trend. Combine the two, and
you've got the motivation behind IBM's new Cloud Security
Enforcer.

Thanks to having set up used a private email server while


U.S. Secretary of State, Hillary Clinton has become a poster
child for "Shadow IT," or the phenomenon by which
employees bring their own technologies into the workplace,
but there's no denying its prevalence. One-third of Fortune
1000 employees share and upload corporate data on thirdparty cloud apps, according to a recent IBM Security study.
One in four link to cloud apps using a corporate log-in and
password.

Your step-by-step guide to repairing Windows 10


When Windows 10 gets wonky, there's a whole set of activities to try and set things
right. If
READ NOW
Announced Tuesday, Cloud Security Enforcer aims to help
companies safeguard the increasing use of bring your own
cloud-based apps at work. It combines cloud identity
management, also known as Identity-as-a-Service, with the
ability to discover any outside apps employees are using,
including those on their mobile devices. Equipped with those
combined capabilities, it enables companies to make access
more secure, IBM said.
Hosted on IBM Cloud, the tool can scan a corporate network,
find the apps employees are using and provide a more secure
way to access them. Four core capabilities help make that
happen.
First, companies can detect unauthorized cloud app usage,
enabling them to identify and securely configure the apps that
employees want to use as well as manage, view and direct
how employees can use them.

Cloud Security Enforcer can also be used to determine and


enforce which data owned by an organization can or cannot
be shared by employees via specific third-party cloud apps.
The tool can connect employees to third-party cloud apps
through security-focused connectors, including automatically
assigning sophisticated passwords. That, in turn, can help
alleviate security breaches caused by human error, IBM said.
Finally, Cloud Security Enforcer can also help protect against
employee-induced and cloud-based threats by analyzing realtime threat data from IBMs global X-Force Exchange threat
intelligence network, which scans the Internet and analyzes
more than 20 billion global security events daily.
IBM has built connectors for Cloud Security Enforcer into
Boxs cloud-based content management and collaboration
platform as well as Microsoft Office 365, Google Apps,
Salesforce.com and other popular enterprise software. Pricing
information was not immediately available.

Katherine Noyes Senior U.S. Correspondent


Katherine Noyes has been an ardent geek ever since she first conquered Pyramid of
Doom on an ancient TRS-80. Today she covers enterprise software in all its forms,
with an emphasis on cloud computing, big data, analytics and artificial intelligence.

The advanced beginner's guide to R


View Comments
YOU MIGHT LIKE
JOIN THE DISCUSSION
Be the first to comment on this article. Our Commenting Policies

Login

0 Comments

Sort

Subscribe

RSS

WHAT READERS LIKE

Scientists can now make lithium-ion batteries last a lifetime


Researchers at the University of California have discovered a way to use
nanowires to allow lithium-ion...

4 new ways to bypass passcode lock screen on iPhones, iPads running iOS 9

Sen. Durbin calls Abbott Labs' IT layoffs 'harsh and insensitive


NEWSLETTERS
Sign up and receive the latest news, reviews and trends on your favorite technology
topics.
Get our daily newsletter
Go

Google's asinine Gmail prank: What were these fools thinking?

Apple delivers a 'significant' update with iOS 9.3

After releasing seven developer betas and several public betas, Apple on Monday
released a noteworthy...
BrandPosts
Learn more
POPULAR RESOURCES

A Cloud for Every Workload

Are You a Security-First Organization?

But I Was Compliant: Investing in Top-Down Security to Build a Compliant


Business

Cross-Enterprise Workload Automation helps reduce cost and complexity,


improve service delivery

Feeling the Love for Node.js: The Performance Basics You Need to know
Now
Go
TOP STORIES

Asus challenges the iPad Mini with the less-pricey ZenPad Z8


At $249.99, Asus' new ZenPad Z8 tablet with Android could make one ponder why
to buy Apple's iPad Mini...

View, search and sort the 100 Best Places to Work in IT


Search by company name, sort by size or location, or filter by criteria important to
you.

Laid-off with a non-compete? Bill would guarantee salary


A proposal in Massachusetts -- not widely expected to pass -- would require an
employer to pay at least...

The next billion: How to best serve the Internets new users
To a large degree, technology companies can do more than the law to make online
transactions...
ComputerworldThe Voice of Business TechnologyFOLLOW US

CLOUD COMPUTING

COMPUTER HARDWARE

CONSUMERIZATION OF IT

DATA CENTER

EMERGING TECHNOLOGY
ENTERPRISE APPLICATIONS

IT MANAGEMENT

INTERNET

MOBILE & WIRELESS

NETWORKING
OPERATING SYSTEMS

SECURITY

VERTICAL IT

All Topics

News

Features

Reviews

Blogs

Opinions

Insider

Shark Tank

Slideshows

Video

Newsletters

Computerworld Events

Resources/White Papers

ABOUT U S

CONTACT

PRIVAC Y POLICIES

EDITOR IAL C ALEND AR

ADVERTISING

CAREERS AT IDG

SIT E MAP

AD CHOICES

E-COMMERC E AFFILIATE RELATION SHIPS

Copyright 1994 - 2016 Computerworld, Inc. All rights reserved.


Explore the IDG Networkdescend

Das könnte Ihnen auch gefallen