SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
EXECUTIVE BRIEF
File Synchronization and Sharing
Market Forecast, 2012-2017

ON

An Osterman Research Executive Brief

Published June 2013

SPON

sponsored by

sponsored by
Osterman Research, Inc.
P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA
Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com
www.ostermanresearch.com • twitter.com/mosterman
File Synchronization and
Sharing Market Forecast,
2012-2017

OVERVIEW OF THE CLOUD-BASED FSS MARKET
File-sharing and synchronization (FSS) tools, most of which today are cloud-based,
are used widely in organizations of all sizes. These tools permit users to share a
group of files with others, as well as access all of their relevant content on any device
they choose. Although offered by many different vendors, the FSS market leader is
Dropbox, which has seen its user base increase dramatically from the company’s
inception in 2007: the company had four million users as of January 2010, reached
25 million users by April 2011, doubled its user base just six months later to 50
million, and added its 100 millionth user in November 2012.

FSS MARKET DRIVERS
The popularity and growth of the FSS market has three primary drivers:
•

There is a growing need for users to share content and collaborate with other
employees, business partners, consultants and clients. While email is the
primary tool for sharing content in most organizations, it has serious limitations
that FSS tools have helped users to overcome.

•

There is a growing number of platforms that users employ to do their work,
including traditional desktop and laptop computers in the office, as well as
smartphones, tablets and home computers. This trend is being fueled in large
part by the “Bring Your Own Device” (BYOD) phenomenon, in which employees
use their personal mobile devices to access corporate data and applications.

•

There is a trend toward telework that benefits employees by permitting them to
work from home or other remote locations, and that benefits employers by
allowing them to reduce the amount of office space that they must provide for
employees.

Many of the free
or low cost,
cloud-based tools
provide robust
functionality, but
are seriously
lacking in
enterprise-grade
features.

SERIOUS PROBLEMS WITH CURRENT FSS TOOLS

It is important to note that the FSS market is not a monolith. Many of the free or low
cost, cloud-based tools provide robust functionality, but are seriously lacking in
enterprise-grade features, as discussed below. A minority of FSS tools in use are
truly enterprise grade, meaning that most use of FSS today imposes significant risk:
•

Minimal or no compliance and governance capabilities
Content shared using most FSS tools is normally not encrypted unless the user
specifically chooses to do so and installs additional software to encrypt the
content. Consequently, sensitive or confidential corporate data can be sent over
the Internet and stored in a third party’s cloud data center unencrypted, possibly
exposing it to interception in violation of regulatory obligations (e.g., the Health
Insurance Portability and Accountability Act [HIPAA], the Payment Card Industry
Data Security Standards [PCI DSS], or various state data breach statutes). For
example, Dropbox encrypts customer data on the server, but not at the client.

•

Minimal IT control over content
A serious shortcoming of most FSS solutions is that they provide IT with little
control over the lifecycle of data. For example, these tools typically do not offer
any control over when content will expire, they provide no policy-managed
encryption, and they do not provide any policy-managed permissions or access
control. Moreover, corporate policies that manage encryption, backup, archiving
or DLP for content sent through email or FTP systems cannot be applied to
content sent through most FSS tools. In short, the lack of IT control over the
content sent through most of these tools puts the employee in charge of
employer-owned data, when in reality the opposite should be true. As shown in
the figure on the next page, the proportion of Dropbox deployments under
control of individual employees – and not IT – increases with the size of the
organization.

©2013 Osterman Research, Inc.

1
File Synchronization and
Sharing Market Forecast,
2012-2017

Another aspect of IT’s lack of control over content is that not all cloud providers
offer a perfect record of security protection. For example, on June 19, 2011,
Dropbox experienced a major security breach for three hours and fifty-two
minutes that allowed anyone to access their customers’ datai.
Deployment Models for Dropbox by Organization Size

When content is
stored in an FSS
vendor’s data
center, accessing
it for purposes of
eDiscovery or a
regulatory audit
becomes
impractical or
impossible.

Source: Osterman Research, Inc.

•

eDiscovery and regulatory compliance are more difficult
When content is stored in an FSS vendor’s data center, accessing it for purposes
of eDiscovery or a regulatory audit becomes impractical or impossible because IT
must gain access to every account and then search it, assuming they are even
able to do so. Moreover, tools like Dropbox are not compliant with a number of
compliance standards like HIPAA, PCI DSS, ISO 27001, ISO 9001 or the Family
Educational Rights and Privacy Act (FERPA).

•

Security capabilities are sometimes lacking
Another problem with many cloud-based FSS tools is that they typically do not
scan content for spam or malware. This allows content from an unprotected
home computer or smartphone, for example, to be infected with malware,
uploaded to the cloud, and then downloaded to a user’s work computer. This
circumvents in-house security systems and permits malware to penetrate
corporate defenses much more easily. Dropbox, for example, admits that it does
not scan for malware: in a February 2012 forum post, a Dropbox moderator
noted that “Checking [for malware] will only be done on your own machine after
it has downloaded.ii”

•

No control over the physical location of data storage
Most cloud-based FSS providers do not allow their customers to control the
physical location of data storage. This can lead to regulatory problems or other
issues in jurisdictions that require sensitive data to be stored only in certain
geographies. For example, a non-US company will typically prefer that its data
not be stored in a US-based data center in order to avoid its access under the
PATRIOT Act. Some types of data held by countries in the EU are required to be
stored only in certain geographies.

©2013 Osterman Research, Inc.

2
File Synchronization and
Sharing Market Forecast,
2012-2017

•

Mixed corporate and personal data
Another problem with the use of many FSS tools is that they can be used to send
and share a mix of corporate and personal content because employees are in
charge of their management, not IT. For example, mixed with sensitive
company information might be an employee’s personal photos, resumé, recipes
or personal tax returns. This not only makes activities like eDiscovery or
regulatory compliance more difficult because reviewers must sort through
personal data as they search for corporate records, but it raises the often
onerous issue of employee privacy rights. This can be a very serious issue in
some jurisdictions.

OVERVIEW OF THE CLOUD-BASED FSS MARKET
Osterman Research forecasts that the worldwide Total Available Market (TAM) for
FSS capabilities was 591.4 million seats in 2012 and will grow to 781.4 million seats
by 2017, achieving a compound annual growth rate of 5.7%, as shown in the
following figure. Our estimate of the TAM value in 2012 was $79.8 billion, growing to
$106.0 billion by 2017.
Total Available Market for FSS, 2012-2017
Millions of Seats Worldwide

The worldwide
Total Available
Market (TAM)
for FSS
capabilities was
591.4 million
seats in 2012 and
will grow to
781.4 million
seats by 2017.
Source: Osterman Research, Inc.

FSS USER BASE

Virtually every organization represents a potential user of FSS technologies, although
the penetration of these technologies into particular organizations will vary widely
based on the industry served, the proportion of “information workers” (those that use
a computing device, email and file-generation tools), the regulatory requirements of
the business, and other factors. For example, Osterman Research conducted a
survey in 2013 to determine, in part, the penetration of FSS tools in various
industries. We discovered that Dropbox had achieved the following levels of
penetration by industry:
•
•
•

Government: 72.1%
Technology-focused firms: 72.1%
Manufacturing: 56.8%

©2013 Osterman Research, Inc.

3
File Synchronization and
Sharing Market Forecast,
2012-2017

•
•

Financial services: 56.6%
Overall: 68.1%

It is important to note that:
•

The market for FSS-related tools and services is limited primarily to information
workers and not to the general employee population. For example, Osterman
Research estimates that the potential user base for FSS tools will be only 8.5%
of mining, construction and manufacturing employees in 2013. By contrast, 75%
of educational services-related employees are a potential user base for FSS tools
and services.

•

Highly regulated organizations – e.g., those in the financial services, healthcare,
energy and pharmaceuticals industries, among others – will be somewhat slower
to adopt FSS tools because of the regulatory requirements imposed upon them
to manage data according to statutory requirements. However, we believe that
regulated industries will be among the early adopters of enterprise-grade FSS
tools and services, largely because of deficiencies among some cloud-based FSS
tools in use today.

RECOMMENDATIONS
Osterman Research recommends the deployment of an enterprise-grade FSS
capability as a replacement for non-enterprise tools. Doing so will offer users the
flexibility and ease of use that drives them to the current crop of cloud-based FSS
tools, and it will give IT the control over corporate content that is sent by and stored
in these systems. We recommend that among the key features an organization
should seek in an enterprise-grade FSS capability are:
•

The ability for users to synchronize content as easily as they can with Dropbox or
equivalent tools today.

•

The ability for IT to easily deploy and manage the system. Many organizations
will want to deploy an FSS capability on-premise in order to maintain complete
control over where and how data is stored.

•

The ability to access content using a variety of devices, browsers and operating
systems.

•

Integration with LDAP or Active Directory, as well as provision of APIs that will
enable integration with various on-premise and cloud-based systems in use.

•

The ability to implement a variety of other capabilities, including tracking of all
file versions, management of content according to granular corporate policies,
the ability to stored deleted files, maintenance of activity logs to monitor content
flows, the ability to encrypt sensitive content, the ability to archive content,
permission and access control for individual files, the ability to establish
expiration periods for files, and the ability to maintain a complete audit trail for
compliance purposes.

File-sharing and
synchronization
(FSS) tools are
widely used today
and will
represent a Total
Available Market
of $106 billion by
2017.

SUMMARY
File-sharing and synchronization (FSS) tools are widely used today and will represent
a Total Available Market of $106 billion by 2017. However, most of the FSS tools in
use today are low-cost, cloud-based solutions that do not provide sufficient
enterprise-grade features. While these tools most often work as advertised, they
create serious risks for any organization. Organizations should, therefore, deploy
enterprise-grade solutions that will mitigate the risks imposed by commonly used FSS
tools.

©2013 Osterman Research, Inc.

4
File Synchronization and
Sharing Market Forecast,
2012-2017
© 2013 Osterman Research, Inc. All rights reserved.
No part of this document may be reproduced in any form by any means, nor may it be
distributed without the permission of Osterman Research, Inc., nor may it be resold or
distributed by any entity other than Osterman Research, Inc., without prior written authorization
of Osterman Research, Inc.
Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes
legal advice, nor shall this document or any software product or other offering referenced herein
serve as a substitute for the reader’s compliance with any laws (including but not limited to any
act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively,
“Laws”)) referenced in this document. If necessary, the reader should consult with competent
legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no
representation or warranty regarding the completeness or accuracy of the information contained
in this document.
THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR
IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE
DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE
ILLEGAL.
i

ii

http://techcrunch.com/2011/06/20/dropbox-security-bug-made-passwords-optional-forfour-hours/
http://forums.dropbox.com/topic.php?id=52598

©2013 Osterman Research, Inc.

5

Mais conteúdo relacionado

Mais procurados

How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou MilradLou Milrad
 
Running head hardware and software security14 hardware an
Running head hardware and software security14 hardware anRunning head hardware and software security14 hardware an
Running head hardware and software security14 hardware anAKHIL969626
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007LindaWatson19
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
B Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsVishal Shah
 
Share point encryption
Share point encryptionShare point encryption
Share point encryptioncsmith2009
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsNewton Day Uploads
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
E-Discovery and Electronic Evidence
E-Discovery and Electronic EvidenceE-Discovery and Electronic Evidence
E-Discovery and Electronic Evidencewcodell
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization surveyAndrew Wong
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYcscpconf
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordCor Ranzijn
 

Mais procurados (20)

How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
 
Running head hardware and software security14 hardware an
Running head hardware and software security14 hardware anRunning head hardware and software security14 hardware an
Running head hardware and software security14 hardware an
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
B Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En Us
 
Share point encryption
Share point encryptionShare point encryption
Share point encryption
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow Systems
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
E-Discovery and Electronic Evidence
E-Discovery and Electronic EvidenceE-Discovery and Electronic Evidence
E-Discovery and Electronic Evidence
 
Gov civilworkshop
Gov civilworkshopGov civilworkshop
Gov civilworkshop
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Dark data
Dark dataDark data
Dark data
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEY
 
Research Proposal K.M.Sangeetha
Research Proposal K.M.SangeethaResearch Proposal K.M.Sangeetha
Research Proposal K.M.Sangeetha
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
 

Destaque

PLAM 2015 - Evolving Backups Strategy, Devploying pyxbackup
PLAM 2015 - Evolving Backups Strategy, Devploying pyxbackupPLAM 2015 - Evolving Backups Strategy, Devploying pyxbackup
PLAM 2015 - Evolving Backups Strategy, Devploying pyxbackupJervin Real
 
Introduction to Backups and Security
Introduction to Backups and SecurityIntroduction to Backups and Security
Introduction to Backups and SecuritySuzette Franck
 
Introducing ShareFile Enterprise Edition
Introducing ShareFile Enterprise EditionIntroducing ShareFile Enterprise Edition
Introducing ShareFile Enterprise EditionCitrix
 
Google Drive (for dummies)
Google Drive (for dummies)Google Drive (for dummies)
Google Drive (for dummies)Dom Cushnan
 

Destaque (6)

PLAM 2015 - Evolving Backups Strategy, Devploying pyxbackup
PLAM 2015 - Evolving Backups Strategy, Devploying pyxbackupPLAM 2015 - Evolving Backups Strategy, Devploying pyxbackup
PLAM 2015 - Evolving Backups Strategy, Devploying pyxbackup
 
Introduction to Backups and Security
Introduction to Backups and SecurityIntroduction to Backups and Security
Introduction to Backups and Security
 
Less15 backups
Less15 backupsLess15 backups
Less15 backups
 
Introducing ShareFile Enterprise Edition
Introducing ShareFile Enterprise EditionIntroducing ShareFile Enterprise Edition
Introducing ShareFile Enterprise Edition
 
Backups are the BOMB!
Backups are the BOMB!Backups are the BOMB!
Backups are the BOMB!
 
Google Drive (for dummies)
Google Drive (for dummies)Google Drive (for dummies)
Google Drive (for dummies)
 

Semelhante a 2014 trend in file sharing

White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...AeroFS
 
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 viewThe Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 viewHybrid Cloud
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemIron Mountain
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Huddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddleHQ
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationKirk Donnan
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChaptemariuse18nolet
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxvrickens
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliancePeter Goldbrunner
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
Data Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfData Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfaccacloud
 

Semelhante a 2014 trend in file sharing (20)

White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
 
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 viewThe Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Huddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File Sync
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content Collaboration
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
Data Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfData Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdf
 

Último

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Último (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

2014 trend in file sharing

  • 1. EXECUTIVE BRIEF File Synchronization and Sharing Market Forecast, 2012-2017 ON An Osterman Research Executive Brief Published June 2013 SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com www.ostermanresearch.com • twitter.com/mosterman
  • 2. File Synchronization and Sharing Market Forecast, 2012-2017 OVERVIEW OF THE CLOUD-BASED FSS MARKET File-sharing and synchronization (FSS) tools, most of which today are cloud-based, are used widely in organizations of all sizes. These tools permit users to share a group of files with others, as well as access all of their relevant content on any device they choose. Although offered by many different vendors, the FSS market leader is Dropbox, which has seen its user base increase dramatically from the company’s inception in 2007: the company had four million users as of January 2010, reached 25 million users by April 2011, doubled its user base just six months later to 50 million, and added its 100 millionth user in November 2012. FSS MARKET DRIVERS The popularity and growth of the FSS market has three primary drivers: • There is a growing need for users to share content and collaborate with other employees, business partners, consultants and clients. While email is the primary tool for sharing content in most organizations, it has serious limitations that FSS tools have helped users to overcome. • There is a growing number of platforms that users employ to do their work, including traditional desktop and laptop computers in the office, as well as smartphones, tablets and home computers. This trend is being fueled in large part by the “Bring Your Own Device” (BYOD) phenomenon, in which employees use their personal mobile devices to access corporate data and applications. • There is a trend toward telework that benefits employees by permitting them to work from home or other remote locations, and that benefits employers by allowing them to reduce the amount of office space that they must provide for employees. Many of the free or low cost, cloud-based tools provide robust functionality, but are seriously lacking in enterprise-grade features. SERIOUS PROBLEMS WITH CURRENT FSS TOOLS It is important to note that the FSS market is not a monolith. Many of the free or low cost, cloud-based tools provide robust functionality, but are seriously lacking in enterprise-grade features, as discussed below. A minority of FSS tools in use are truly enterprise grade, meaning that most use of FSS today imposes significant risk: • Minimal or no compliance and governance capabilities Content shared using most FSS tools is normally not encrypted unless the user specifically chooses to do so and installs additional software to encrypt the content. Consequently, sensitive or confidential corporate data can be sent over the Internet and stored in a third party’s cloud data center unencrypted, possibly exposing it to interception in violation of regulatory obligations (e.g., the Health Insurance Portability and Accountability Act [HIPAA], the Payment Card Industry Data Security Standards [PCI DSS], or various state data breach statutes). For example, Dropbox encrypts customer data on the server, but not at the client. • Minimal IT control over content A serious shortcoming of most FSS solutions is that they provide IT with little control over the lifecycle of data. For example, these tools typically do not offer any control over when content will expire, they provide no policy-managed encryption, and they do not provide any policy-managed permissions or access control. Moreover, corporate policies that manage encryption, backup, archiving or DLP for content sent through email or FTP systems cannot be applied to content sent through most FSS tools. In short, the lack of IT control over the content sent through most of these tools puts the employee in charge of employer-owned data, when in reality the opposite should be true. As shown in the figure on the next page, the proportion of Dropbox deployments under control of individual employees – and not IT – increases with the size of the organization. ©2013 Osterman Research, Inc. 1
  • 3. File Synchronization and Sharing Market Forecast, 2012-2017 Another aspect of IT’s lack of control over content is that not all cloud providers offer a perfect record of security protection. For example, on June 19, 2011, Dropbox experienced a major security breach for three hours and fifty-two minutes that allowed anyone to access their customers’ datai. Deployment Models for Dropbox by Organization Size When content is stored in an FSS vendor’s data center, accessing it for purposes of eDiscovery or a regulatory audit becomes impractical or impossible. Source: Osterman Research, Inc. • eDiscovery and regulatory compliance are more difficult When content is stored in an FSS vendor’s data center, accessing it for purposes of eDiscovery or a regulatory audit becomes impractical or impossible because IT must gain access to every account and then search it, assuming they are even able to do so. Moreover, tools like Dropbox are not compliant with a number of compliance standards like HIPAA, PCI DSS, ISO 27001, ISO 9001 or the Family Educational Rights and Privacy Act (FERPA). • Security capabilities are sometimes lacking Another problem with many cloud-based FSS tools is that they typically do not scan content for spam or malware. This allows content from an unprotected home computer or smartphone, for example, to be infected with malware, uploaded to the cloud, and then downloaded to a user’s work computer. This circumvents in-house security systems and permits malware to penetrate corporate defenses much more easily. Dropbox, for example, admits that it does not scan for malware: in a February 2012 forum post, a Dropbox moderator noted that “Checking [for malware] will only be done on your own machine after it has downloaded.ii” • No control over the physical location of data storage Most cloud-based FSS providers do not allow their customers to control the physical location of data storage. This can lead to regulatory problems or other issues in jurisdictions that require sensitive data to be stored only in certain geographies. For example, a non-US company will typically prefer that its data not be stored in a US-based data center in order to avoid its access under the PATRIOT Act. Some types of data held by countries in the EU are required to be stored only in certain geographies. ©2013 Osterman Research, Inc. 2
  • 4. File Synchronization and Sharing Market Forecast, 2012-2017 • Mixed corporate and personal data Another problem with the use of many FSS tools is that they can be used to send and share a mix of corporate and personal content because employees are in charge of their management, not IT. For example, mixed with sensitive company information might be an employee’s personal photos, resumé, recipes or personal tax returns. This not only makes activities like eDiscovery or regulatory compliance more difficult because reviewers must sort through personal data as they search for corporate records, but it raises the often onerous issue of employee privacy rights. This can be a very serious issue in some jurisdictions. OVERVIEW OF THE CLOUD-BASED FSS MARKET Osterman Research forecasts that the worldwide Total Available Market (TAM) for FSS capabilities was 591.4 million seats in 2012 and will grow to 781.4 million seats by 2017, achieving a compound annual growth rate of 5.7%, as shown in the following figure. Our estimate of the TAM value in 2012 was $79.8 billion, growing to $106.0 billion by 2017. Total Available Market for FSS, 2012-2017 Millions of Seats Worldwide The worldwide Total Available Market (TAM) for FSS capabilities was 591.4 million seats in 2012 and will grow to 781.4 million seats by 2017. Source: Osterman Research, Inc. FSS USER BASE Virtually every organization represents a potential user of FSS technologies, although the penetration of these technologies into particular organizations will vary widely based on the industry served, the proportion of “information workers” (those that use a computing device, email and file-generation tools), the regulatory requirements of the business, and other factors. For example, Osterman Research conducted a survey in 2013 to determine, in part, the penetration of FSS tools in various industries. We discovered that Dropbox had achieved the following levels of penetration by industry: • • • Government: 72.1% Technology-focused firms: 72.1% Manufacturing: 56.8% ©2013 Osterman Research, Inc. 3
  • 5. File Synchronization and Sharing Market Forecast, 2012-2017 • • Financial services: 56.6% Overall: 68.1% It is important to note that: • The market for FSS-related tools and services is limited primarily to information workers and not to the general employee population. For example, Osterman Research estimates that the potential user base for FSS tools will be only 8.5% of mining, construction and manufacturing employees in 2013. By contrast, 75% of educational services-related employees are a potential user base for FSS tools and services. • Highly regulated organizations – e.g., those in the financial services, healthcare, energy and pharmaceuticals industries, among others – will be somewhat slower to adopt FSS tools because of the regulatory requirements imposed upon them to manage data according to statutory requirements. However, we believe that regulated industries will be among the early adopters of enterprise-grade FSS tools and services, largely because of deficiencies among some cloud-based FSS tools in use today. RECOMMENDATIONS Osterman Research recommends the deployment of an enterprise-grade FSS capability as a replacement for non-enterprise tools. Doing so will offer users the flexibility and ease of use that drives them to the current crop of cloud-based FSS tools, and it will give IT the control over corporate content that is sent by and stored in these systems. We recommend that among the key features an organization should seek in an enterprise-grade FSS capability are: • The ability for users to synchronize content as easily as they can with Dropbox or equivalent tools today. • The ability for IT to easily deploy and manage the system. Many organizations will want to deploy an FSS capability on-premise in order to maintain complete control over where and how data is stored. • The ability to access content using a variety of devices, browsers and operating systems. • Integration with LDAP or Active Directory, as well as provision of APIs that will enable integration with various on-premise and cloud-based systems in use. • The ability to implement a variety of other capabilities, including tracking of all file versions, management of content according to granular corporate policies, the ability to stored deleted files, maintenance of activity logs to monitor content flows, the ability to encrypt sensitive content, the ability to archive content, permission and access control for individual files, the ability to establish expiration periods for files, and the ability to maintain a complete audit trail for compliance purposes. File-sharing and synchronization (FSS) tools are widely used today and will represent a Total Available Market of $106 billion by 2017. SUMMARY File-sharing and synchronization (FSS) tools are widely used today and will represent a Total Available Market of $106 billion by 2017. However, most of the FSS tools in use today are low-cost, cloud-based solutions that do not provide sufficient enterprise-grade features. While these tools most often work as advertised, they create serious risks for any organization. Organizations should, therefore, deploy enterprise-grade solutions that will mitigate the risks imposed by commonly used FSS tools. ©2013 Osterman Research, Inc. 4
  • 6. File Synchronization and Sharing Market Forecast, 2012-2017 © 2013 Osterman Research, Inc. All rights reserved. No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without prior written authorization of Osterman Research, Inc. Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this document or any software product or other offering referenced herein serve as a substitute for the reader’s compliance with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively, “Laws”)) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of the information contained in this document. THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL. i ii http://techcrunch.com/2011/06/20/dropbox-security-bug-made-passwords-optional-forfour-hours/ http://forums.dropbox.com/topic.php?id=52598 ©2013 Osterman Research, Inc. 5