Absolute has introduced the capability to detect data at risk on endpoints associated with cloud storage applications such as Box, Dropbox, iCloud, and OneDrive. With the latest release of Absolute Data & Device Security (DDS), you can now determine which cloud applications are being used and if sensitive data is being stored within those applications. This important functionality offers unique visibility to a growing area of concern for IT.
Where is Your Data Hiding?
According to a Ponemon study, the biggest gaps in current endpoint security models exist in unprotected mobile devices, the insider threat, and the use of third-party cloud applications. A report earlier this year indicated that as much as 45% of corporate data is held on the endpoint in some form, including on cloud applications. This data is often unprotected by even the most basic security protections. The need for remote access off the company network, the rise of BYOD policies, and the limiting restrictions around the size of email attachments, often cause employees to turn towards Shadow IT practices such as the use of cloud data storage applications. This leads to data being used or stored outside the control of IT. This data is at the greatest risk of being breached due to employee negligence (or misuse) and outside attack.
Earlier this year, Absolute launched Endpoint Data Discovery – a new feature of Absolute DDS – to help organizations shine a light on dark data on the endpoint. With Endpoint Data Discovery, organizations can:
- Identify and track sensitive data across endpoints
- Take proactive action
- Enforce corporate data policies
- Take action if the data is at risk
We are proud to extend the innovative capabilities of Endpoint Data Discovery to include the detection of at-risk data on common cloud storage applications including Dropbox, Box, iCloud and One Drive.
New Functionality Now Available in Absolute DDS
Using Endpoint Data Discovery, you can now determine which cloud applications are being used and what information is being stored. Maintain visibility of PHI, PII, payment information, or intellectual property stored in folders associated with cloud applications by leveraging Persistence, and remotely delete that data at the source, even when the endpoint is off your corporate network. Reduce your potential blindspots and take a proactive stance to enforce security policies, identify risks, or prove compliance in the event of a security incident.
The extension of Endpoint Data Discovery data monitoring to cloud applications is available today in the latest version of Absolute DDS.
Get started with your free evaluation version of Absolute DDS today.