EDGE 2015 is starting in

Find out more EDGE 2015
Menu
Four in five employees use non-approved apps at work: McAfee

Four in five employees use non-approved apps at work: McAfee

Security vendor finds that the accessibility of the Cloud has enabled employees to bypass IT administrators

A Stratecast survey has found that more than 80 per cent of employees admit to using unauthorised Software-as-a-Service (SaaS) applications during work.

The McAfee sponsored report also found that IT professionals (83 per cent) use a higher number of non-approved SaaS applications, commonly dubbed as “shadow IT,” than regular company employees (81 per cent).

Bypassing IT processes (39 per cent) was the popular reason for why IT professionals use unauthorised SaaS, while IT restrictions were blamed for making their job difficult (18 per cent).

With four in five employees admitting to using non-approved SaaS at work, McAfee Asia Pacific CTO, Sean Duca, said a balance needs to be struck between businesses protecting themselves and enabling employees to be productive.

“The best approach is to deploy solutions that transparently monitor SaaS applications and uniformly apply enterprise policies, without restricting employees’ ability to do their jobs better,” he said.

“These not only enable secure access to SaaS applications, but can also encrypt sensitive information, prevent data loss, protect against malware, and enable IT to enforce acceptable usage policies.” To highlight this point, Duca refers to the result of 15 per cent of users experiencing a security, access, or liability event while using SaaS.

The draw of social

Microsoft Office 365 (9 per cent) was the top unapproved SaaS application used at work, followed by Zoho (eight per cent), LinkedIn and Facebook (seven per cent for both).

As for what has made acquiring and deploying SaaS applications without the involvement of the IT department easier, Duca points to the growth of the Cloud in regions such as Asia Pacific.

“As a result, many applications are used by corporate employees without the participation or approval of the corporate IT department,” he said.

Patrick Budmar covers consumer and enterprise technology breaking news for IDG Communications. Follow Patrick on Twitter at @patrick_budmar.

EDGE 2015:: For all the latest on EDGE 2015 including the keynote speakers visit the EDGE mini-site now

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags SaaSmcafeeCloudsecurityFrost and Sullivan

Upcoming

Slideshows

In Pictures: 7 things we hate about Twitter

In Pictures: 7 things we hate about Twitter

You probably either love Twitter for its quirkiness and brevity or see it as a pointless waste of time. After nearly a decade on the social scene, Twitter still needs to improve its user experience and fill in notable gaps in the service. These seven problems are long overdue for a fix.

In Pictures: 7 things we hate about Twitter
IN PICTURES: EDGE 2015 - Sponsor Briefing

IN PICTURES: EDGE 2015 - Sponsor Briefing

With EDGE 2015 rapidly approaching, ARN and Reseller News NZ held a Sponsors Briefing where ARN publisher and president, Susan Searle, and Events Manager, Alexandra West, ran through the considerable logistics in detail. Attendees then enjoyed some splendid canapes and drinks. EDGE is designed to bring the A/NZ channel together in a collaborative and educational environment. Themed around channel channel leadership, EDGE will be held at the Sheraton Mirage, Port Douglas, July 20-23. Photos by MIKE GEE.

IN PICTURES: EDGE 2015 - Sponsor Briefing
In Pictures: Robots that cook, clean, sing and dance

In Pictures: Robots that cook, clean, sing and dance

Cooking, learning language and doing the laundry are a few of the human skills demonstrated by.real humanoid bots featured in the National Geographic movie Robots.

In Pictures: Robots that cook, clean, sing and dance

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments