As we’ve covered in depth here over the past few years, enterprises have moved to cloud in a big way, with the estimated size of the cloud computing market to have been $130 billion globally in 2017. But those organizations who have made the move, especially when it involves sensitive or
In 2017, the public cloud computing market is predicted to be worth around 130 billion U.S. dollars worldwide.
According to the most recent Frost & Sullivan IT Decision Maker Survey, the top three factors considered when choosing a cloud provider are, in order of importance: 45 percent security capabilities, 40 percent reliability and 27 percent cost.
The Frost & Sullivan 2017 Global Frost & Sullivan IT Decision Maker Survey, which consisted of 1,626 enterprise IT stakeholders, found the following leading benefits:
Still, when it comes to security, that leading concern, security, often comes down to visibility into what is happening within the cloud. According to CASB [FN] provider Bitglass’s report Cloud Hard 2018: Security with a Vengeance Report based on responses from 570 cybersecurity and IT professionals on cloud security. According to their findings visibility and compliance remain challenges, with only 44 percent of respondents saying that they have visibility into external sharing and DLP policy violations in their cloud application and environments.
Consider this: 85 percent of organizations said they were unable to identify anomalous behavior across cloud applications. Additionally, 84 percent of respondents say traditional security solutions don’t work or have limited functionality in the cloud.
“When asked about biggest security threats to their organization, most cited misconfigurations (62 percent) similar to the numerous AWS S3 leaks over the past year, followed by unauthorized access (55 percent). 39 percent said external sharing was the most critical threat while 26 percent highlighted malware and ransomware,” Bitglass said in this statement.
Key Report Highlights:
Perhaps some of these explain why we have witnessed so many cloud data leaks, such as last year’s Swedish data leak , or all of the Amazon S3 breaches detailed in our blog here.
tags
George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.
View all postsDon’t miss out on exclusive content and exciting announcements!