Cloud Computing Security

2H 2015 Shadow Data Report

Provided by Elastica + Blue Coat

Category Cloud Computing Security

Type White Paper

Length 9

Publish Date January 05 2016

Date posted January 08 2016


Did you know:
Which collaboration and file sharing apps are most used by businesses?
What types of sensitive data are typically found in cloud sharing apps?
What % of shared documents have been compromised?
Which techniques are typically used to exfiltrate data?
What is the financial impact to organizations due to a cloud data breach?

Based on the analysis of over 63M documents, annoymized across the Elastica CloudSOC, the 2H 2015 Shadow Data Report answers these questions to provides valuable insights into cloud application usage to help organizations unlock the full business potential of cloud apps while staying secure and compliant.



Thinking Different

Taking baby steps with Big Data

Jon Collins’ in-depth look at tech and society


China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond


CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk


Crowdfunding: Viable alternative to VC funding or glorified marketing?