SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
EXECUTIVE BRIEF
File Synchronization and Sharing
Market Forecast, 2012-2017

ON

An Osterman Research Executive Brief

Published June 2013

SPON

sponsored by

sponsored by
Osterman Research, Inc.
P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA
Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com
www.ostermanresearch.com • twitter.com/mosterman
File Synchronization and
Sharing Market Forecast,
2012-2017

OVERVIEW OF THE CLOUD-BASED FSS MARKET
File-sharing and synchronization (FSS) tools, most of which today are cloud-based,
are used widely in organizations of all sizes. These tools permit users to share a
group of files with others, as well as access all of their relevant content on any device
they choose. Although offered by many different vendors, the FSS market leader is
Dropbox, which has seen its user base increase dramatically from the company’s
inception in 2007: the company had four million users as of January 2010, reached
25 million users by April 2011, doubled its user base just six months later to 50
million, and added its 100 millionth user in November 2012.

FSS MARKET DRIVERS
The popularity and growth of the FSS market has three primary drivers:
•

There is a growing need for users to share content and collaborate with other
employees, business partners, consultants and clients. While email is the
primary tool for sharing content in most organizations, it has serious limitations
that FSS tools have helped users to overcome.

•

There is a growing number of platforms that users employ to do their work,
including traditional desktop and laptop computers in the office, as well as
smartphones, tablets and home computers. This trend is being fueled in large
part by the “Bring Your Own Device” (BYOD) phenomenon, in which employees
use their personal mobile devices to access corporate data and applications.

•

There is a trend toward telework that benefits employees by permitting them to
work from home or other remote locations, and that benefits employers by
allowing them to reduce the amount of office space that they must provide for
employees.

Many of the free
or low cost,
cloud-based tools
provide robust
functionality, but
are seriously
lacking in
enterprise-grade
features.

SERIOUS PROBLEMS WITH CURRENT FSS TOOLS

It is important to note that the FSS market is not a monolith. Many of the free or low
cost, cloud-based tools provide robust functionality, but are seriously lacking in
enterprise-grade features, as discussed below. A minority of FSS tools in use are
truly enterprise grade, meaning that most use of FSS today imposes significant risk:
•

Minimal or no compliance and governance capabilities
Content shared using most FSS tools is normally not encrypted unless the user
specifically chooses to do so and installs additional software to encrypt the
content. Consequently, sensitive or confidential corporate data can be sent over
the Internet and stored in a third party’s cloud data center unencrypted, possibly
exposing it to interception in violation of regulatory obligations (e.g., the Health
Insurance Portability and Accountability Act [HIPAA], the Payment Card Industry
Data Security Standards [PCI DSS], or various state data breach statutes). For
example, Dropbox encrypts customer data on the server, but not at the client.

•

Minimal IT control over content
A serious shortcoming of most FSS solutions is that they provide IT with little
control over the lifecycle of data. For example, these tools typically do not offer
any control over when content will expire, they provide no policy-managed
encryption, and they do not provide any policy-managed permissions or access
control. Moreover, corporate policies that manage encryption, backup, archiving
or DLP for content sent through email or FTP systems cannot be applied to
content sent through most FSS tools. In short, the lack of IT control over the
content sent through most of these tools puts the employee in charge of
employer-owned data, when in reality the opposite should be true. As shown in
the figure on the next page, the proportion of Dropbox deployments under
control of individual employees – and not IT – increases with the size of the
organization.

©2013 Osterman Research, Inc.

1
File Synchronization and
Sharing Market Forecast,
2012-2017

Another aspect of IT’s lack of control over content is that not all cloud providers
offer a perfect record of security protection. For example, on June 19, 2011,
Dropbox experienced a major security breach for three hours and fifty-two
minutes that allowed anyone to access their customers’ datai.
Deployment Models for Dropbox by Organization Size

When content is
stored in an FSS
vendor’s data
center, accessing
it for purposes of
eDiscovery or a
regulatory audit
becomes
impractical or
impossible.

Source: Osterman Research, Inc.

•

eDiscovery and regulatory compliance are more difficult
When content is stored in an FSS vendor’s data center, accessing it for purposes
of eDiscovery or a regulatory audit becomes impractical or impossible because IT
must gain access to every account and then search it, assuming they are even
able to do so. Moreover, tools like Dropbox are not compliant with a number of
compliance standards like HIPAA, PCI DSS, ISO 27001, ISO 9001 or the Family
Educational Rights and Privacy Act (FERPA).

•

Security capabilities are sometimes lacking
Another problem with many cloud-based FSS tools is that they typically do not
scan content for spam or malware. This allows content from an unprotected
home computer or smartphone, for example, to be infected with malware,
uploaded to the cloud, and then downloaded to a user’s work computer. This
circumvents in-house security systems and permits malware to penetrate
corporate defenses much more easily. Dropbox, for example, admits that it does
not scan for malware: in a February 2012 forum post, a Dropbox moderator
noted that “Checking [for malware] will only be done on your own machine after
it has downloaded.ii”

•

No control over the physical location of data storage
Most cloud-based FSS providers do not allow their customers to control the
physical location of data storage. This can lead to regulatory problems or other
issues in jurisdictions that require sensitive data to be stored only in certain
geographies. For example, a non-US company will typically prefer that its data
not be stored in a US-based data center in order to avoid its access under the
PATRIOT Act. Some types of data held by countries in the EU are required to be
stored only in certain geographies.

©2013 Osterman Research, Inc.

2
File Synchronization and
Sharing Market Forecast,
2012-2017

•

Mixed corporate and personal data
Another problem with the use of many FSS tools is that they can be used to send
and share a mix of corporate and personal content because employees are in
charge of their management, not IT. For example, mixed with sensitive
company information might be an employee’s personal photos, resumé, recipes
or personal tax returns. This not only makes activities like eDiscovery or
regulatory compliance more difficult because reviewers must sort through
personal data as they search for corporate records, but it raises the often
onerous issue of employee privacy rights. This can be a very serious issue in
some jurisdictions.

OVERVIEW OF THE CLOUD-BASED FSS MARKET
Osterman Research forecasts that the worldwide Total Available Market (TAM) for
FSS capabilities was 591.4 million seats in 2012 and will grow to 781.4 million seats
by 2017, achieving a compound annual growth rate of 5.7%, as shown in the
following figure. Our estimate of the TAM value in 2012 was $79.8 billion, growing to
$106.0 billion by 2017.
Total Available Market for FSS, 2012-2017
Millions of Seats Worldwide

The worldwide
Total Available
Market (TAM)
for FSS
capabilities was
591.4 million
seats in 2012 and
will grow to
781.4 million
seats by 2017.
Source: Osterman Research, Inc.

FSS USER BASE

Virtually every organization represents a potential user of FSS technologies, although
the penetration of these technologies into particular organizations will vary widely
based on the industry served, the proportion of “information workers” (those that use
a computing device, email and file-generation tools), the regulatory requirements of
the business, and other factors. For example, Osterman Research conducted a
survey in 2013 to determine, in part, the penetration of FSS tools in various
industries. We discovered that Dropbox had achieved the following levels of
penetration by industry:
•
•
•

Government: 72.1%
Technology-focused firms: 72.1%
Manufacturing: 56.8%

©2013 Osterman Research, Inc.

3
File Synchronization and
Sharing Market Forecast,
2012-2017

•
•

Financial services: 56.6%
Overall: 68.1%

It is important to note that:
•

The market for FSS-related tools and services is limited primarily to information
workers and not to the general employee population. For example, Osterman
Research estimates that the potential user base for FSS tools will be only 8.5%
of mining, construction and manufacturing employees in 2013. By contrast, 75%
of educational services-related employees are a potential user base for FSS tools
and services.

•

Highly regulated organizations – e.g., those in the financial services, healthcare,
energy and pharmaceuticals industries, among others – will be somewhat slower
to adopt FSS tools because of the regulatory requirements imposed upon them
to manage data according to statutory requirements. However, we believe that
regulated industries will be among the early adopters of enterprise-grade FSS
tools and services, largely because of deficiencies among some cloud-based FSS
tools in use today.

RECOMMENDATIONS
Osterman Research recommends the deployment of an enterprise-grade FSS
capability as a replacement for non-enterprise tools. Doing so will offer users the
flexibility and ease of use that drives them to the current crop of cloud-based FSS
tools, and it will give IT the control over corporate content that is sent by and stored
in these systems. We recommend that among the key features an organization
should seek in an enterprise-grade FSS capability are:
•

The ability for users to synchronize content as easily as they can with Dropbox or
equivalent tools today.

•

The ability for IT to easily deploy and manage the system. Many organizations
will want to deploy an FSS capability on-premise in order to maintain complete
control over where and how data is stored.

•

The ability to access content using a variety of devices, browsers and operating
systems.

•

Integration with LDAP or Active Directory, as well as provision of APIs that will
enable integration with various on-premise and cloud-based systems in use.

•

The ability to implement a variety of other capabilities, including tracking of all
file versions, management of content according to granular corporate policies,
the ability to stored deleted files, maintenance of activity logs to monitor content
flows, the ability to encrypt sensitive content, the ability to archive content,
permission and access control for individual files, the ability to establish
expiration periods for files, and the ability to maintain a complete audit trail for
compliance purposes.

File-sharing and
synchronization
(FSS) tools are
widely used today
and will
represent a Total
Available Market
of $106 billion by
2017.

SUMMARY
File-sharing and synchronization (FSS) tools are widely used today and will represent
a Total Available Market of $106 billion by 2017. However, most of the FSS tools in
use today are low-cost, cloud-based solutions that do not provide sufficient
enterprise-grade features. While these tools most often work as advertised, they
create serious risks for any organization. Organizations should, therefore, deploy
enterprise-grade solutions that will mitigate the risks imposed by commonly used FSS
tools.

©2013 Osterman Research, Inc.

4
File Synchronization and
Sharing Market Forecast,
2012-2017
© 2013 Osterman Research, Inc. All rights reserved.
No part of this document may be reproduced in any form by any means, nor may it be
distributed without the permission of Osterman Research, Inc., nor may it be resold or
distributed by any entity other than Osterman Research, Inc., without prior written authorization
of Osterman Research, Inc.
Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes
legal advice, nor shall this document or any software product or other offering referenced herein
serve as a substitute for the reader’s compliance with any laws (including but not limited to any
act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively,
“Laws”)) referenced in this document. If necessary, the reader should consult with competent
legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no
representation or warranty regarding the completeness or accuracy of the information contained
in this document.
THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR
IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE
DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE
ILLEGAL.
i

ii

http://techcrunch.com/2011/06/20/dropbox-security-bug-made-passwords-optional-forfour-hours/
http://forums.dropbox.com/topic.php?id=52598

©2013 Osterman Research, Inc.

5

Contenu connexe

Tendances

How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou MilradLou Milrad
 
Running head hardware and software security14 hardware an
Running head hardware and software security14 hardware anRunning head hardware and software security14 hardware an
Running head hardware and software security14 hardware anAKHIL969626
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007LindaWatson19
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
B Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsVishal Shah
 
Share point encryption
Share point encryptionShare point encryption
Share point encryptioncsmith2009
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsNewton Day Uploads
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
E-Discovery and Electronic Evidence
E-Discovery and Electronic EvidenceE-Discovery and Electronic Evidence
E-Discovery and Electronic Evidencewcodell
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization surveyAndrew Wong
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYcscpconf
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordCor Ranzijn
 

Tendances (20)

How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
 
Running head hardware and software security14 hardware an
Running head hardware and software security14 hardware anRunning head hardware and software security14 hardware an
Running head hardware and software security14 hardware an
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
B Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En Us
 
Share point encryption
Share point encryptionShare point encryption
Share point encryption
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow Systems
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
E-Discovery and Electronic Evidence
E-Discovery and Electronic EvidenceE-Discovery and Electronic Evidence
E-Discovery and Electronic Evidence
 
Gov civilworkshop
Gov civilworkshopGov civilworkshop
Gov civilworkshop
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Dark data
Dark dataDark data
Dark data
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEY
 
Research Proposal K.M.Sangeetha
Research Proposal K.M.SangeethaResearch Proposal K.M.Sangeetha
Research Proposal K.M.Sangeetha
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
 

En vedette

PLAM 2015 - Evolving Backups Strategy, Devploying pyxbackup
PLAM 2015 - Evolving Backups Strategy, Devploying pyxbackupPLAM 2015 - Evolving Backups Strategy, Devploying pyxbackup
PLAM 2015 - Evolving Backups Strategy, Devploying pyxbackupJervin Real
 
Introduction to Backups and Security
Introduction to Backups and SecurityIntroduction to Backups and Security
Introduction to Backups and SecuritySuzette Franck
 
Introducing ShareFile Enterprise Edition
Introducing ShareFile Enterprise EditionIntroducing ShareFile Enterprise Edition
Introducing ShareFile Enterprise EditionCitrix
 
Google Drive (for dummies)
Google Drive (for dummies)Google Drive (for dummies)
Google Drive (for dummies)Dom Cushnan
 

En vedette (6)

PLAM 2015 - Evolving Backups Strategy, Devploying pyxbackup
PLAM 2015 - Evolving Backups Strategy, Devploying pyxbackupPLAM 2015 - Evolving Backups Strategy, Devploying pyxbackup
PLAM 2015 - Evolving Backups Strategy, Devploying pyxbackup
 
Introduction to Backups and Security
Introduction to Backups and SecurityIntroduction to Backups and Security
Introduction to Backups and Security
 
Less15 backups
Less15 backupsLess15 backups
Less15 backups
 
Introducing ShareFile Enterprise Edition
Introducing ShareFile Enterprise EditionIntroducing ShareFile Enterprise Edition
Introducing ShareFile Enterprise Edition
 
Backups are the BOMB!
Backups are the BOMB!Backups are the BOMB!
Backups are the BOMB!
 
Google Drive (for dummies)
Google Drive (for dummies)Google Drive (for dummies)
Google Drive (for dummies)
 

Similaire à 2014 trend in file sharing

White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...AeroFS
 
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 viewThe Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 viewHybrid Cloud
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemIron Mountain
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Huddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddleHQ
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationKirk Donnan
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChaptemariuse18nolet
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxvrickens
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliancePeter Goldbrunner
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
Data Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfData Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfaccacloud
 

Similaire à 2014 trend in file sharing (20)

White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
 
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 viewThe Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Huddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File Sync
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content Collaboration
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
Data Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfData Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdf
 

Dernier

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Dernier (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

2014 trend in file sharing

  • 1. EXECUTIVE BRIEF File Synchronization and Sharing Market Forecast, 2012-2017 ON An Osterman Research Executive Brief Published June 2013 SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com www.ostermanresearch.com • twitter.com/mosterman
  • 2. File Synchronization and Sharing Market Forecast, 2012-2017 OVERVIEW OF THE CLOUD-BASED FSS MARKET File-sharing and synchronization (FSS) tools, most of which today are cloud-based, are used widely in organizations of all sizes. These tools permit users to share a group of files with others, as well as access all of their relevant content on any device they choose. Although offered by many different vendors, the FSS market leader is Dropbox, which has seen its user base increase dramatically from the company’s inception in 2007: the company had four million users as of January 2010, reached 25 million users by April 2011, doubled its user base just six months later to 50 million, and added its 100 millionth user in November 2012. FSS MARKET DRIVERS The popularity and growth of the FSS market has three primary drivers: • There is a growing need for users to share content and collaborate with other employees, business partners, consultants and clients. While email is the primary tool for sharing content in most organizations, it has serious limitations that FSS tools have helped users to overcome. • There is a growing number of platforms that users employ to do their work, including traditional desktop and laptop computers in the office, as well as smartphones, tablets and home computers. This trend is being fueled in large part by the “Bring Your Own Device” (BYOD) phenomenon, in which employees use their personal mobile devices to access corporate data and applications. • There is a trend toward telework that benefits employees by permitting them to work from home or other remote locations, and that benefits employers by allowing them to reduce the amount of office space that they must provide for employees. Many of the free or low cost, cloud-based tools provide robust functionality, but are seriously lacking in enterprise-grade features. SERIOUS PROBLEMS WITH CURRENT FSS TOOLS It is important to note that the FSS market is not a monolith. Many of the free or low cost, cloud-based tools provide robust functionality, but are seriously lacking in enterprise-grade features, as discussed below. A minority of FSS tools in use are truly enterprise grade, meaning that most use of FSS today imposes significant risk: • Minimal or no compliance and governance capabilities Content shared using most FSS tools is normally not encrypted unless the user specifically chooses to do so and installs additional software to encrypt the content. Consequently, sensitive or confidential corporate data can be sent over the Internet and stored in a third party’s cloud data center unencrypted, possibly exposing it to interception in violation of regulatory obligations (e.g., the Health Insurance Portability and Accountability Act [HIPAA], the Payment Card Industry Data Security Standards [PCI DSS], or various state data breach statutes). For example, Dropbox encrypts customer data on the server, but not at the client. • Minimal IT control over content A serious shortcoming of most FSS solutions is that they provide IT with little control over the lifecycle of data. For example, these tools typically do not offer any control over when content will expire, they provide no policy-managed encryption, and they do not provide any policy-managed permissions or access control. Moreover, corporate policies that manage encryption, backup, archiving or DLP for content sent through email or FTP systems cannot be applied to content sent through most FSS tools. In short, the lack of IT control over the content sent through most of these tools puts the employee in charge of employer-owned data, when in reality the opposite should be true. As shown in the figure on the next page, the proportion of Dropbox deployments under control of individual employees – and not IT – increases with the size of the organization. ©2013 Osterman Research, Inc. 1
  • 3. File Synchronization and Sharing Market Forecast, 2012-2017 Another aspect of IT’s lack of control over content is that not all cloud providers offer a perfect record of security protection. For example, on June 19, 2011, Dropbox experienced a major security breach for three hours and fifty-two minutes that allowed anyone to access their customers’ datai. Deployment Models for Dropbox by Organization Size When content is stored in an FSS vendor’s data center, accessing it for purposes of eDiscovery or a regulatory audit becomes impractical or impossible. Source: Osterman Research, Inc. • eDiscovery and regulatory compliance are more difficult When content is stored in an FSS vendor’s data center, accessing it for purposes of eDiscovery or a regulatory audit becomes impractical or impossible because IT must gain access to every account and then search it, assuming they are even able to do so. Moreover, tools like Dropbox are not compliant with a number of compliance standards like HIPAA, PCI DSS, ISO 27001, ISO 9001 or the Family Educational Rights and Privacy Act (FERPA). • Security capabilities are sometimes lacking Another problem with many cloud-based FSS tools is that they typically do not scan content for spam or malware. This allows content from an unprotected home computer or smartphone, for example, to be infected with malware, uploaded to the cloud, and then downloaded to a user’s work computer. This circumvents in-house security systems and permits malware to penetrate corporate defenses much more easily. Dropbox, for example, admits that it does not scan for malware: in a February 2012 forum post, a Dropbox moderator noted that “Checking [for malware] will only be done on your own machine after it has downloaded.ii” • No control over the physical location of data storage Most cloud-based FSS providers do not allow their customers to control the physical location of data storage. This can lead to regulatory problems or other issues in jurisdictions that require sensitive data to be stored only in certain geographies. For example, a non-US company will typically prefer that its data not be stored in a US-based data center in order to avoid its access under the PATRIOT Act. Some types of data held by countries in the EU are required to be stored only in certain geographies. ©2013 Osterman Research, Inc. 2
  • 4. File Synchronization and Sharing Market Forecast, 2012-2017 • Mixed corporate and personal data Another problem with the use of many FSS tools is that they can be used to send and share a mix of corporate and personal content because employees are in charge of their management, not IT. For example, mixed with sensitive company information might be an employee’s personal photos, resumé, recipes or personal tax returns. This not only makes activities like eDiscovery or regulatory compliance more difficult because reviewers must sort through personal data as they search for corporate records, but it raises the often onerous issue of employee privacy rights. This can be a very serious issue in some jurisdictions. OVERVIEW OF THE CLOUD-BASED FSS MARKET Osterman Research forecasts that the worldwide Total Available Market (TAM) for FSS capabilities was 591.4 million seats in 2012 and will grow to 781.4 million seats by 2017, achieving a compound annual growth rate of 5.7%, as shown in the following figure. Our estimate of the TAM value in 2012 was $79.8 billion, growing to $106.0 billion by 2017. Total Available Market for FSS, 2012-2017 Millions of Seats Worldwide The worldwide Total Available Market (TAM) for FSS capabilities was 591.4 million seats in 2012 and will grow to 781.4 million seats by 2017. Source: Osterman Research, Inc. FSS USER BASE Virtually every organization represents a potential user of FSS technologies, although the penetration of these technologies into particular organizations will vary widely based on the industry served, the proportion of “information workers” (those that use a computing device, email and file-generation tools), the regulatory requirements of the business, and other factors. For example, Osterman Research conducted a survey in 2013 to determine, in part, the penetration of FSS tools in various industries. We discovered that Dropbox had achieved the following levels of penetration by industry: • • • Government: 72.1% Technology-focused firms: 72.1% Manufacturing: 56.8% ©2013 Osterman Research, Inc. 3
  • 5. File Synchronization and Sharing Market Forecast, 2012-2017 • • Financial services: 56.6% Overall: 68.1% It is important to note that: • The market for FSS-related tools and services is limited primarily to information workers and not to the general employee population. For example, Osterman Research estimates that the potential user base for FSS tools will be only 8.5% of mining, construction and manufacturing employees in 2013. By contrast, 75% of educational services-related employees are a potential user base for FSS tools and services. • Highly regulated organizations – e.g., those in the financial services, healthcare, energy and pharmaceuticals industries, among others – will be somewhat slower to adopt FSS tools because of the regulatory requirements imposed upon them to manage data according to statutory requirements. However, we believe that regulated industries will be among the early adopters of enterprise-grade FSS tools and services, largely because of deficiencies among some cloud-based FSS tools in use today. RECOMMENDATIONS Osterman Research recommends the deployment of an enterprise-grade FSS capability as a replacement for non-enterprise tools. Doing so will offer users the flexibility and ease of use that drives them to the current crop of cloud-based FSS tools, and it will give IT the control over corporate content that is sent by and stored in these systems. We recommend that among the key features an organization should seek in an enterprise-grade FSS capability are: • The ability for users to synchronize content as easily as they can with Dropbox or equivalent tools today. • The ability for IT to easily deploy and manage the system. Many organizations will want to deploy an FSS capability on-premise in order to maintain complete control over where and how data is stored. • The ability to access content using a variety of devices, browsers and operating systems. • Integration with LDAP or Active Directory, as well as provision of APIs that will enable integration with various on-premise and cloud-based systems in use. • The ability to implement a variety of other capabilities, including tracking of all file versions, management of content according to granular corporate policies, the ability to stored deleted files, maintenance of activity logs to monitor content flows, the ability to encrypt sensitive content, the ability to archive content, permission and access control for individual files, the ability to establish expiration periods for files, and the ability to maintain a complete audit trail for compliance purposes. File-sharing and synchronization (FSS) tools are widely used today and will represent a Total Available Market of $106 billion by 2017. SUMMARY File-sharing and synchronization (FSS) tools are widely used today and will represent a Total Available Market of $106 billion by 2017. However, most of the FSS tools in use today are low-cost, cloud-based solutions that do not provide sufficient enterprise-grade features. While these tools most often work as advertised, they create serious risks for any organization. Organizations should, therefore, deploy enterprise-grade solutions that will mitigate the risks imposed by commonly used FSS tools. ©2013 Osterman Research, Inc. 4
  • 6. File Synchronization and Sharing Market Forecast, 2012-2017 © 2013 Osterman Research, Inc. All rights reserved. No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without prior written authorization of Osterman Research, Inc. Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this document or any software product or other offering referenced herein serve as a substitute for the reader’s compliance with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively, “Laws”)) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of the information contained in this document. THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL. i ii http://techcrunch.com/2011/06/20/dropbox-security-bug-made-passwords-optional-forfour-hours/ http://forums.dropbox.com/topic.php?id=52598 ©2013 Osterman Research, Inc. 5