Click here to close now.




















Welcome!

@CloudExpo Authors: Elizabeth White, Liz McMillan, Cloud Best Practices Network, Kevin Jackson, Pat Romanski

News Feed Item

SailPoint publie l'infographie d'une enquête sur le pouls du marché montrant que l'adoption de l'informatique dématérialisée et mobile augmente les risques de sécurité

SailPoint a publié aujourd'hui une infographie fondée sur des résultats de recherches récentes qui indiquent que les entreprises adoptent activement des solutions dématérialisées et mobiles pour leurs applications essentielles ; une tendance qui augmente le risque de failles de sécurité et d'échecs d'audits. Intitulée « Cloud and Mobile Adoption Increases IT Security Risks », l'infographie se fonde sur l’enquête annuelle de SailPoint intitulée Market Pulse Survey, qui évalue le mode de gestion des identités et des risques par les informaticiens et les chefs d'entreprise et le mode de gestion et de protection des applications essentielles et des données sensibles dans les entreprises d'aujourd'hui.

L'infographie « Cloud and Mobile Adoption Increases IT Security Risks » de SailPoint est disponible pour téléchargement à l'adresse : www.sailpoint.com/2012survey. (Les personnes intéressées sont autorisées à intégrer et partager l'infographie sur leurs sites Web ou leurs blogs en mentionnant les références.)

L'enquête « Market Pulse Survey » 2012 de SailPoint a révélé un paysage informatique complexe, dans lequel les entreprises comptent de plus en plus sur le stockage d’un important volume de données très sensibles dans le nuage, mais ont une visibilité limitée de ces applications et ont du mal à en gérer l'accès. Résumé des conclusions de l'enquête illustrées dans l'infographie :

  • Les responsables informatiques estiment qu'une application essentielle sur trois est actuellement dématérialisée. D'ici 2015, ce chiffre passera à une sur deux. Corsant le défi auquel doivent faire face les services informatiques, plus de 15 % des chefs d’entreprise admettent qu’ils n’ont aucun moyen de savoir si des données sensibles sont stockées dans le nuage.
  • La majorité des entreprises interrogées ne bloquent pas l'utilisation d'applications personnelles au travail, même si ces dernières échappent totalement au contrôle des services TI. Environ un tiers des entreprises sont entièrement verrouillées quand il s'agit de l'utilisation d'applications personnelles au travail.
  • Près de la moitié des chefs d'entreprise déclarent utiliser toujours ou souvent les mêmes mots de passe pour les applications Web personnelles et les applications de travail.
  • Environ deux tiers des entreprises sont « très préoccupées » par des failles sécuritaires concernant les informations d'entreprise.
  • Même si environ 60 % des responsables informatiques ont conscience du rôle important joué par la gestion des identités et des accès pour prévenir les atteintes à la sécurité, près des deux tiers de ces mêmes responsables avouent ne pas trop faire confiance à la capacité de leur entreprise à démontrer, lors d'un audit TI, l'efficacité des contrôles internes qui gèrent les privilèges d'accès.

Au cours de l'enquête « Market Pulse Survey » 2012 de SailPoint, 200 chefs d’entreprise responsables de divers services clés et 200 décideurs en informatique dans des sociétés d’au moins 5 000 salariés ont été interviewés. Les personnes interrogées étaient réparties également entre les États-Unis et le Royaume-Uni. Les interviews ont été conduites via un panel en ligne. Loudhouse, une agence de recherche indépendante, a conduit la recherche pour le compte de SailPoint. Pour télécharger les résultats de l’enquête « Market Pulse Survey » 2012 de SailPoint, veuillez consulter le site : www.sailpoint.com/2012survey.

À propos de SailPoint

SailPoint, leader du marché en solutions de gestion de l’identité, aide les plus grandes multinationales à atténuer les risques, à réduire les coûts informatiques et à assurer la conformité. Les solutions novatrices de la société, IdentityIQTM et AccessIQTM, offrent une visibilité et un contrôle supérieurs sur l’accès des utilisateurs aux applications et aux données sensibles, tant sur site que dans le nuage. La suite de produits de SailPoint offre aux clients une solution unifiée pour la gestion de la conformité avec prise en compte des risques, la gestion en boucle fermée du cycle de vie de l’utilisateur, la fourniture de service souple, la gestion de l’accès au nuage et l’intelligence de l’identité, tout cela fondé sur un modèle de gouvernance intégrée. Fondée en 2005, la société est installée à Austin, au Texas, avec des bureaux en Allemagne, en Grande-Bretagne, en Inde, en Israël et aux Pays-Bas. Pour de plus amples renseignements, veuillez consulter le site www.sailpoint.com.

SailPoint, le logo SailPoint, IdentityIQ, AccessIQ et toutes les techniques sont des marques commerciales ou des marques déposées de SailPoint Technologies, Inc. aux États-Unis et/ou dans d’autres pays. Tous les autres produits ou services sont des marques commerciales de leurs sociétés respectives.

Le texte du communiqué issu d’une traduction ne doit d’aucune manière être considéré comme officiel. La seule version du communiqué qui fasse foi est celle du communiqué dans sa langue d’origine. La traduction devra toujours être confrontée au texte source, qui fera jurisprudence.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is designed for their business. In 2015, organizations such as United Airlines, Sony...
Amazon and Google have built software-defined data centers (SDDCs) that deliver massively scalable services with great efficiency. Yet, building SDDCs has proven to be a near impossibility for ‘normal’ companies without hyper-scale resources. In his session at 17th Cloud Expo, David Cauthron, founder and chief executive officer of Nimboxx, will discuss the evolution of virtualization (hardware, application, memory, storage) and how commodity / open source hyper converged infrastructure (HCI) so...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
The web app is agile. The REST API is agile. The testing and planning are agile. But alas, data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes that force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software organ...
IBM’s Blue Box Cloud, powered by OpenStack, is now available in any of IBM’s globally integrated cloud data centers running SoftLayer infrastructure. Less than 90 days after its acquisition of Blue Box, IBM has integrated its Blue Box Cloud Dedicated private-cloud-as-a-service into its broader portfolio of OpenStack® based solutions. The announcement, made today at the OpenStack Silicon Valley event, further highlights IBM’s continued support to deliver OpenStack solutions across all cloud depl...
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
The Internet of Things (IoT) is about the digitization of physical assets including sensors, devices, machines, gateways, and the network. It creates possibilities for significant value creation and new revenue generating business models via data democratization and ubiquitous analytics across IoT networks. The explosion of data in all forms in IoT requires a more robust and broader lens in order to enable smarter timely actions and better outcomes. Business operations become the key driver of I...
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
WSM International, the pioneer and leader in server migration services, has announced an agreement with WHOA.com, a leader in providing secure public, private and hybrid cloud computing services. Under terms of the agreement, WSM will provide migration services to WHOA.com customers to relocate some or all of their applications, digital assets, and other computing workloads to WHOA.com enterprise-class, secure cloud infrastructure. The migration services include detailed evaluation and planning...
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
SYS-CON Events announced today that Micron Technology, Inc., a global leader in advanced semiconductor systems, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Micron’s broad portfolio of high-performance memory technologies – including DRAM, NAND and NOR Flash – is the basis for solid state drives, modules, multichip packages and other system solutions. Backed by more than 35 years of tech...
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on...
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies leverage disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advance...
Cloud and datacenter migration innovator AppZero has joined the Microsoft Enterprise Cloud Alliance Program. AppZero is a fast, flexible way to move Windows Server applications from any source machine – physical or virtual – to any destination server, in any cloud or datacenter, using its patented container technology. AppZero’s container is also called a Virtual Application Appliance (VAA). To facilitate Microsoft Azure onboarding, AppZero has two purpose-built offerings: AppZero SP for Azure,...
In today's digital world, change is the one constant. Disruptive innovations like cloud, mobility, social media, and the Internet of Things have reshaped the market and set new standards in customer expectations. To remain competitive, businesses must tap the potential of emerging technologies and markets through the rapid release of new products and services. However, the rigid and siloed structures of traditional IT platforms and processes are slowing them down – resulting in lengthy delivery ...
This Enterprise Strategy Group lab validation report of the NEC Express5800/R320 server with Intel® Xeon® processor presents the benefits of 99.999% uptime NEC fault-tolerant servers that lower overall virtualized server total cost of ownership. This report also includes survey data on the significant costs associated with system outages impacting enterprise and web applications. Click Here to Download Report Now!