Comments
Shadow IT: Honey Badger Better Care
Oldest First  |  Newest First  |  Threaded View
bkosh
50%
50%
bkosh,
User Rank: Strategist
5/14/2014 | 9:46:55 AM
Embrace the beast!
That's a nice story and a killer headline. Smart IT is spreading the responsibility of security to their users by having them encrypt all data before it hits the cloud. This is wise because even if you trust one cloud, the average user is going to have 3-5 cloud storage servcies on each device. That's a recipe for disaster unless you have a cross platform way to share and collaborate securely. This is the reason for third party apps like nCrypted Cloud.  
Laurianne
50%
50%
Laurianne,
User Rank: Author
5/14/2014 | 10:12:59 AM
Re: Embrace the beast!
As CIOs at our recent InformationWeek Conference discussed, you can get a grip on Dropbox use by offering preferred alternatives. Onyeka Nchege, CIO of Coca-Cola Bottling, described how he holds up a caution sign, rather than a stop sign, for business users, on matters of BYOD and shadow IT. Then you present the alternatives.
Lorna Garey
100%
0%
Lorna Garey,
User Rank: Author
5/14/2014 | 11:31:58 AM
Re: Embrace the beast!
Encryption is one of those techs that everyone agrees is smart, but then they have some excuse why they can't use it consistently. Key management is hard! It will add latency/confuse users/cost too much! It didn't take off when IT was in control. Not holding my breath for it to be widely adopted now.
ShadowIT
50%
50%
ShadowIT,
User Rank: Apprentice
5/14/2014 | 1:09:53 PM
Re: Embrace the beast!
What are the benefits of nCrypted Cloud?
bkosh
100%
0%
bkosh,
User Rank: Strategist
5/14/2014 | 1:32:04 PM
Re: Embrace the beast!
Well Lorna makes a good point, if IT can't encrypt/protect data then how will we expect users to? The main benefit of nCrypted Cloud is it allows IT folks to delegate the responsibility of protecting shared data in the cloud to their end users. It's a mouse click to encrypt. It's also network agnostic, device agnostic, and cloud storage agnostic. At the same time, there is accountability with forensic level data usage auditing, so you can centralize visibility and oversight of user's activity. IT gets a looking glass into where data is going and being used outside the organization, and on non-corporate devices. Anomalies are easily detected and corrected. This is not crazy, it is an accountability based model, it's the only way to scale and it's the way our society works. For example, most states have speed limited to 65MPH. But cars are not limited to 65MPH. Why not? Drivers are held accountable for their actions, and traffic flows freely. We need the same model to balance the corporate requriements of protecting the data, while allowing business users to move as quickly and efficiently as possible. 
jagibbons
50%
50%
jagibbons,
User Rank: Ninja
5/15/2014 | 9:52:29 AM
Re: Embrace the beast!
Consumerism in the enterprise will almost always be at odds with security and governance. A balance of alternatives, or the idea shared of the Caution! sign instead of Stop!, needs to be found. Identify the consumer or end-user friendly tools that also fit the organization's security, governance and compliance needs. Then, help users get there. Whatever policies are put into place, the average user in any company is going to find and utilize the tools that allow him/her to get their job done with the minimum amount of overhead or headache. The harder IT makes it to get the job done by implementing the strongest security tools and rules, the more employees will look for ways to get around it. Meet them in the middle and find solutions that meet the needs of both sides of the equation.
Drew Conry-Murray
50%
50%
Drew Conry-Murray,
User Rank: Ninja
5/15/2014 | 11:04:27 AM
Re: Embrace the beast!
I think Lori's advice is sound: better to steer users toward more suitable options (without being confrontational about it).

But the problem remains that even if you get employees onto Secure Enterprise Platform X, they're going to be collaborating with business partners that are still using Dropbox and other consumer tools. Not sure what the fix is here.

On the positive side, I think it's encouraging that Dropbox admitted to the vulnerability. I'm not naive enough to believe that Dropbox is transparent about all its security problems, but we've come a long way from the days when vendors pretended they were always secure.


The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - August 20, 2014
CIOs need people who know the ins and outs of cloud software stacks and security, and, most of all, can break through cultural resistance.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.