Categories
Latest News

Unauthorised file sharing – Yes, we do that ! + Infographic

Here are the results of an interesting survey, conducted by Workshare. The main results are in the infographic but here are some of the other findings:
• 70% of legal professionals do not have direct authorization from their IT department to use consumer file sharing applications.
• 77% of legal professionals use their personal devices for work, more than any other industry surveyed.
• The majority (88%) of these workers also use free file sharing services to collaborate, up 4% from 2012. COMMENT: Obviously Workshare has a solution that will address this issue (as do some other vendors) but is the BYOD horse already out of the stable and it’s now a little late to do anything?

Here are the results of an interesting survey, conducted by Workshare. The main results are in the infographic but here are some of the other findings:
70% of legal professionals do not have direct authorization from their IT department to use consumer file sharing applications.
77% of legal professionals use their personal devices for work, more than any other industry surveyed.
The majority (88%) of these workers also use free file sharing services to collaborate, up 4% from 2012.

COMMENT: Obviously Workshare has a solution that will address this issue (as do some other vendors) but is the BYOD horse already out of the stable and it’s now a little late to do anything?

Workforce-Mobilization-Infographic_Legal

 

One reply on “Unauthorised file sharing – Yes, we do that ! + Infographic”

I do admire their efforts to solve this problem but the horse hasn’t bolted for BYOD, the horse has bolted for Workshare! Whilst they try their hardest to play catch up, the market has matured far beyond secure file transfer or replacing dropbox.

The established players (like Accellion who I work for) believe a solution to mobile file sharing should integrate into existing ECM and file-shares. It should works with DLP, and with MDM. One that has document editing and PDF annotation in a secure container and one that has a proven on-premise architecture. This is something that has taken years and years of development.

When you are talking about accessing your most critical sensitive documents on mobiles, I suggest your readers research the serious players out there and ask for real customer validation.

Here is Gartners take on who they are along with strengths/weaknesses.

http://tinyurl.com/l9o6gh7

Nice infographic though!

Comments are closed.