IF Not… then you need to check out: PROOFPOINT.com for all your email security needs…
Dave and I interviewed Andre’s Kron today on the CHWR live radio show, and he was awesome!! Andres shared so many wonderful tips and advice today about how you as broadband navigator in the digital age can protect your personal and business platforms, accounts and also personal user info!
Andrés Kohn, Vice President, Technology – Andrés Kohn is currently responsible for Proofpoint’s email archiving business unit and has been responsible for setting Proofpoint’s product direction since the inception of the company.
A frequent public speaker on cloud computing, IT security and compliance issues, Mr. Kohn is responsible for developing strategic technology partnerships that complement Proofpoint’s solution offerings. He joined Proofpoint from Critical Path, where he was director of Product Management and responsible for the global direction of their messaging products and services. Before joining Critical Path, Mr. Kohn held several product marketing positions at PeopleSoft, and various management roles at International Paper as well as Procter and Gamble. Mr. Kohn holds a B.S. degree with distinction and an M.S. degree in engineering from Cornell University. He also holds an M.B.A. degree from Stanford University.
On June 23, Proofpoint and Osterman Research will announce results from a 632-respondent survey demonstrating that enterprises and government agencies are finally taking steps to deal with the onslaught of consumerized IT in the workplace — consumerized IT that includes mobile devices such as the iPad and iPhone, social platforms such as Facebook and Twitter, and IM applications from Yahoo!, MSN and AOL.
• Contrary to some recently published reports and opinions, the survey revealed that the 84 percent of organizations allowing employees to use consumerized IT such as iPads, iPhones, Facebook, Twitter and IM to conduct business communications are mitigate associated risks by turning away from a trust-only approach and implementing three-layer security and compliance strategies that include a combination of trust, policy and technology. Fifty-one percent of those polled stated that they relied on a combination of all three layers, 22 percent did not use technology but did rely on employees to adhere to policies, and only 12 percent relied solely on employees’ “good judgment” for defense. The survey showed that the segment of respondents taking a three-layer approach is placing heavy reliance on endpoint protection technologies that include agents and applications used to enforce policies.
Additional findings of interest:
• Email still provides the most opportunity for data leakage and attack – 67% of respondents stated that within their consumer mobile-device networks, email is the most-used business application
• Some organizations continue to ban consumerized IT, it is being used anyway — 16% of respondents said that their organizations do not allow employees to use consumer technologies in the workplace. Of this segment, 64% suspect that employees are using consumerized IT regardless of policies against it
• 71 percent of organizations that do not allow consumerized IT in the workplace do nothing more than issue a warning to employees who violate policy
• 72 percent of organizations that do not allow consumerized IT in the workplace are not convinced that it can be used in a secure and compliant manner
• 48 percent of organizations that allow consumerized IT in the workplace allow users to choose which technologies they use
• 48 percent of organizations that allow consumerized IT in the workplace regulate which technologies can be used
• 89 percent of organizations that allow consumerized IT in the workplace say that the Apple iPhone and iPad are the most-used mobile devices
• 49 percent of organizations that allow consumerized IT in the workplace say that Facebook is the most-used social media platform
Check out more here at Proofpoint… To GET Started
Learn IT, DO IT, Teach IT, Share IT, BE IT
Your CyberHood Watch Partner
Radio Security Journalist
© 2006 – 2011 CyberHood Watch