Cloud Computing Security

2H 2015 Shadow Data Report

Provided by Elastica + Blue Coat

Category Cloud Computing Security

Type White Paper

Length 9

Publish Date January 05 2016

Date posted January 08 2016


Did you know:
Which collaboration and file sharing apps are most used by businesses?
What types of sensitive data are typically found in cloud sharing apps?
What % of shared documents have been compromised?
Which techniques are typically used to exfiltrate data?
What is the financial impact to organizations due to a cloud data breach?

Based on the analysis of over 63M documents, annoymized across the Elastica CloudSOC, the 2H 2015 Shadow Data Report answers these questions to provides valuable insights into cloud application usage to help organizations unlock the full business potential of cloud apps while staying secure and compliant.


Most Recent Comments


Should we donate our health data the same way we donate organs?