Reco Raises $30M to Enable Organizations to Collaborate Securely. Click here to read our Press Release

Collaboration tools allow people to work together. Collaboration security allows people to work together securely.

Ofer Klein, CEO

Collaborate securely with Reco

Collaboration platforms such as Slack or Microsoft Teams have revolutionized how teams work together even while they are physically apart. Evidence shows that companies who use collaboration tools effectively are 30% more effective than companies who don’t, and businesses simply wouldn’t have survived the Covid-19 pandemic without them.

But the challenge of collaboration tools is that they throw out everything we used to know about security. Collaboration tools encourage users to share information freely, across platforms, groups, and channels, work together with colleagues both internally and externally, and ultimately to keep moving forward. For security teams used to controlling IT systems, collaboration tools are incompatible with the way they are used to working.

As a result, a new form of security is needed, and that is collaboration security.

What is collaboration security?

Collaboration security refers to security measures that ensure that employees use collaboration tools securely. Collaboration security can refer to tools and controls, and it can also refer to governance and employee behaviors.

However, collaboration security is an entirely new concept in cybersecurity, and defining it properly requires a deeper look at the wider collaboration and security environments.

What are collaboration tools, and why are they so popular?

Collaboration tools refer to software and applications that make it easy for teams to work together even when they are working in different locations or at different times.

Collaboration tools include communication platforms such as Slack or Microsoft Teams, but Microsoft 365, GSuite, team task management tools such as Asana or JIRA, and many more also fall under the collaboration security umbrella. While many of these tools have been in use for several years, the rush to digital transformation brought about by the Covid-19 pandemic has dramatically expanded the scope of online collaboration for most organizations.

Collaboration tool usage is affecting real change in organizations:

  • The Covid-19 pandemic accounted for a 44% increase in workers using collaboration tools. As of August 2021, 80% of workers used collaboration tools in their work.
  • The same Gartner Digital Worker Experience Survey predicted that in-person meetings will drop to 25% of all meetings by 2024.
  • 300 million people attend meetings via Zoom every single day.
  • 2.7 billion meeting minutes take place on Microsoft Teams every day.
  • A billion messages are sent each week on Slack.
  • Flexible/ hybrid working is here to stay as 73% of workers want to continue to work flexibly as the world returns to the office following Covid-19.
  • 99% of remote workers use an average of 5 different collaboration applications.

Why can’t collaboration tools be secured using traditional methods?

Collaboration tools work differently to tools in the past. They are democratic, constantly changing, and designed by their nature to allow people to work together. By contrast, legacy security tools are designed to protect data by keeping people out. They are often manually intensive, follow strict, static rules, and require oversight and correction from IT and security teams. In short, they simply can’t keep up with the speed of collaboration tools.

For example:

Where does data end up when it is shared via a collaboration tool?

Users may download data sent to them via one platform and forward it on to someone else via another platform. Every collaboration platform has a native sharing capability, which makes tracking a piece of data’s path through the system extra difficult.

What happens to data when someone leaves the organization?

As data becomes ever more decentralized, employees take custody of different packets of data and the location of every piece of data is unknown by individual employees, let alone by anyone else in the organization. This increases the danger that an employee leaving the organization may take vital knowledge about the existence and location of sensitive data with them, and no one inside the organization has access to it.

What happens when a project ends?

When a project ends, the organization may be left with a disused channel on Slack or external users with access to files, chats, or even drives. Human nature is to forget about them, but these channels can quickly become a security liability that the security team has no insight into.

All of these very common collaboration tools require a new form of security.

What are the characteristics of collaboration security?

Collaboration tools require that security adopts different characteristics in order to keep up with it. Some of these characteristics include:

  • Collaboration first: Collaboration security must be able to support productivity.
  • Dynamic security: Collaboration security needs to be dynamic, not based on static rules that require manual intervention to apply and adjust them.
  • Decentralized: Collaboration security must allow for decentralized security where users are encouraged to take charge of their data security (more about that here — link to next blog).
  • Context driven: Collaboration security must understand the business context and data flows rather than relying on contents.

Source: Dr. Chase Cunningham on LinkedIn

At Reco we are building the world’s first collaboration security tool. We are changing the concept of data security in order to enable organizations to be collaborative, productive, and growth oriented.

Ofer Klein, Co-Founder and CEO at Reco

Related Posts

Enabling Principle of Least Privilege in Collaboration Tools
Securing data in collaboration tools centers around understanding of the principle of least privilege across the organization. But the decentralized nature of collaboration tools challenges traditional privilege management, and a new solution is needed to democratize how privileges are assigned and abuses remediated.

Gal Nakash, CTO

Data-protection-insights-for-drive
We recently received a headline from Google: 46% of potentially sensitive files have been shared outside your organization. Part of Google’s data protection insights for Drive, this alert and indeed the report, and the entire initiative, is missing an important ingredient: Context.

Gal Nakash, CTO

Request a Demo

Take a personalized product tour with a member of our team to see how we can help make your existing security teams and tools more effective within minutes.

Just submit the demo request and we’ll be in touch with you shortly.





Which DLP tool do you use if any?

Which collaboration tool do you use? (Select all that apply):

OPEN POSITIONS

Engineering

Team Lead

Product

Product Manager

Marketing

Head of Marketing

Sales

Account Executive