SlideShare a Scribd company logo
1 of 39
Download to read offline
PRESENTEDBY
2016 SPOTLIGHT REPORT
CLOUDSECURITY
Group Partner
Information
Security
CLOUD SECURITY
SPOTLIGHT REPORT
TABLE OF CONTENTS
Overview
Key survey findings
CLOUD ADOPTION TRENDS
Cloud benefits
Cloud investments
Cloud adoption stages
Barriers to cloud adoption
Top cloud service delivery & providers
Most popular cloud workloads
Data stored in the cloud
Applications deployed in the cloud
Most popular cloud apps
CLOUD SECURITY CHALLENGES
Cloud security concerns
Cloud security incidents
Security risks in the cloud vs. on-premise
Cloud apps vs. on-premise apps
Biggest security threats in public clouds
Cloud security concerns
Biggest cloud security headaches
Personal cloud storage policy
CLOUD SECURITY SOLUTIONS
Paths to stronger security
Cloud confidence builders
Traditional security tools in the cloud
Most effective cloud security technologies
Most popular cloud security controls
Drivers of cloud-based security solutions
Barriers to cloud-based security solutions
Cloud application security
Access to cloud applications
Security impact on DevOps
Methodology & Demographics
Sponsors
Contact us
3
4
6
7
8
9
10
11
12
13
14
16
17
18
19
20
21
22
23
25
26
27
28
29
30
31
32
33
34
35
36
39
In this new report, you will learn how your peers are
approaching cybersecurity in the era of cloud,
including the latest trends and benchmarks to gauge
how your own organization stacks up.
Many thanks to our sponsors for supporting this
research project: AlienVault, Bitglass, Cato
Networks, CloudPassage, Dell Software, Dome9,
FireLayers, IMMUNIO, (ISC)2
and Randtronics.
We hope you will enjoy this report.
Holger Schulze
OVERVIEW
Cloud investment continues
to grow over 20% annually as
organizations are looking to reduce
IT cost, increase agility and better
support business functions.
Security of critical data and
systems in the cloud remains a
key barrier to adoption of cloud
services. This report, the result
of comprehensive research in
partnership with the 300,000+
member Information Security
Community on LinkedIn, reveals
the drivers and risk factors of
migrating to the cloud. Learn how
organizations are responding to
the security threats in the cloud
and what tools and best practices
IT cybersecurity leaders are
considering in their move to
the cloud.
3
Holger Schulze
Group Founder
Information Security
Community on LinkedIn
hhschulze@gmail.com
Group Partner
Information
Security
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 4
KEY SURVEY FINDINGS
Security concerns top the list of barriers to cloud adoption led by general security concerns
(53%, up from 45% in last year’s survey), legal and regulatory compliance concerns (42%, up
from 29%), and data loss and leakage risks (40%). The rise in specific concerns about compliance
and integration suggests that companies are moving from theoretical exploration of cloud
models to actual implementation.
53% of organizations see unauthorized access through misuse of employee credentials and
improper access controls as the single biggest threat to cloud security. This is followed by
hijacking of accounts (44%), and insecure interfaces / APIs (39%). One in three organizations
say external sharing of sensitive information is the biggest security threat.
Verifying security policies (51%), visibility into infrastructure security (49%) and compliance
(37%) were named as the top three cloud security challenges that cause the biggest headaches
for IT security professionals.
Organizations moving to the cloud have a variety of choices available to strengthen cloud
security. 61% of organizations plan to train and certify existing IT staff, 45% partner with a
managed security services provider, and 42% deploy additional security software to protect data
and applications in the cloud.
Encryption of data at rest (65%) and in motion on networks (57%) top the list of most effective
security technologies to protect data in the cloud. This is followed by intrusion detection and
prevention (IDP) with 48% and access control technologies such as Cloud Access Security
Brokers (CASB) with 45%.
1
2
3
4
5
CLOUD ADOPTION TRENDS
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 6
After a few years of operating workloads in the cloud, organizations are confirming the benefits match the original
promise of cloud computing. Availability (46%), cost reduction (41%) and flexible scalability (36%) top the list.
Cloud is still falling short of expectations in the areas of regulatory compliance (13%) and the promise of reduced
complexity (14%).
CLOUD BENEFITS
Cloud Benefits
Availability
46%
Cost Reduction
Regulatory
Compliance
41%
13%Reduced
Complexity14%
Flexible Scalability
36%
Q: What benefits have you realized from your cloud deployment?
Moved expenses from fixed CAPEX (purchase) to variable OPEX (rental/subscription) 32% | Accelerated deployment and provisioning 31% |
Increased agility 28% | Improved performance 27% | Increased efficiency 26% | Increased geographic reach 24% | Increased employee productivity 23% |
Improved security 19% | Accelerated time to market 18% | Align cost model with usage 18% | Not Sure/Other 25%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 7
For over a third of organizations (38%), cloud investments represent up to 15% of overall IT infrastructure
investment. Half of all organizations have over 15% of their IT invested in the cloud.
CLOUD INVESTMENTS
Q: Cloud infrastructure investments represent what percentage of your overall infrastructure footprint (in terms of servers/workloads/instances)?
IT infrastructure
38% 50%
0% 1-15% 16-25% 26-50% 51-75% +75%
12%
21%
13%
9%
7%
Share of cloud relative to overall IT investment
Organizations invest more
than 15% of all IT in cloud
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 8
Private Cloud
30%
Deployed
Implementing
Trial
Planning
Public Cloud
25% Hybrid Cloud No Plans
24% 21%
41%
20%
16%
23%
41%
20%
19%
20%
34%
20%
18%
28%
79% of respondents are either in planning or trial stages, currently implementing or in active production cloud
environments.
Cloud computing can be classified by location and ownership of the cloud infrastructure:
CLOUD ADOPTION STAGES
Q: What cloud service delivery model(s) is your organization using?
Private Cloud - Cloud infrastructure and
services are dedicated to a particular
organization. Private clouds can reside
on premise or be hosted by a third party.
Public Cloud - Cloud services and
infrastructure are hosted by a third-party
cloud provider and resources are shared
among multiple cloud tenants / clients.
Hybrid Cloud - Cloud computing environment
in which single applications are split across
private and public cloud, often to dynamically
accommodate spikes in server demand.
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 9
Cloud security concerns not only top the list of perceived barriers to cloud adoption, they are further increasing.
General security concerns (with 53% up from 45% in last year’s survey), legal and regulatory compliance concerns
(42% up from 29%), data loss & leakage risks (40% slightly down from 41%), integration with existing IT environments
(35% up from 29%) and lack of expertise (26% up from 16%) top the list of barriers to cloud adoption. However, it
is important to put this in context as the number of reported breaches in enterprise environments far exceed the
reported exposure from cloud platforms.
BARRIERS TO CLOUD ADOPTION
Q: What are the biggest barriers holding back cloud adoption in your organization?
Loss of control 23% | Management complexity 20% | Increased agility 28% | Fear of vendor lock-in 18% | Internal resistance and inertia 18% |
Lack of staff resources 17% | Lack of transparency and visibility 15% | Lack of maturity of cloud service models 14% | Cost/Lack of ROI 13% | Lack of budget 13%
Performance of apps in the cloud 12% | Lack of management buy-in 10% | Lack of customizability 9% | None 9% | Dissatisfaction with cloud service offerings/
performance/pricing 7% | Billing & tracking issues 7% | Lack of support by cloud provider 6% | Availability 5% | Not sure/Other 10%
General
security risks
Legal & regulatory
compliance
Data loss &
leakage risks
53% 42% 40%
Cloud Adoption Barriers
#1 #2 #3
8% p.p.
from last year
13% p.p.
from last year
1% p.p.
from last year
Integration with
existing IT environments
Lack of
expertise
35% 26%
#4 #5
6% p.p.
from last year
10% p.p.
from last year
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 10
VMware Rackspace IBM Softlayer / IBM
18% 11% 8% 5%
45%
39%18%
None BPaaS Not sure/Other
9% 8% 11%
61%
cloud service
delivery models
SaaS
53%
IaaS
39%
PaaS
Amazon AWS is the big fish in the cloud services
pond, used by 45% of respondents. Microsoft Azure
follows with 39%.
TOP CLOUD SERVICE DELIVERY & PROVIDERS
Q: What public cloud provider(s) do you currently use?
CenturyLink – Savvis 4% | HP 4% | Verizon – Terremark 4% |
AT&T 4% | CSC 1% | GoGrid 1% | Joyent 1% | Not sure/Other 32%
The dominance of both cloud applications and cloud
infrastructure requires that we think about securing
these different entities as part of a holistic vision
for securing application and infrastructure (both on
premise and in the cloud). A majority of organizations
(61%) uses SaaS models, followed by IaaS (53%) and
PaaS (39%) as their cloud service delivery model.
Q: What cloud service delivery model(s) is your organization using?
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 11
Storage (52% up from 38% in last year’s survey), computing (51% up from 32%) and virtualization (44% up from 33%) top
the list of most deployed workloads in the cloud.
MOST POPULAR CLOUD WORKLOADS
Q: What services & workloads is your organization deploying in the cloud?
VIRTUALIZATION
52%
51%
44%
41%
STORAGE
COMPUTING
BUSINESS
APPLICATIONS
POPULAR
CLOUD
WORKLOADS
Productivity Applications (email, collaboration, instant messaging) 37% | Networking (virtual private cloud, DNS, etc) 35% |
Database (relational, NoSQL, caching, etc.) 33% | Operating System 30% | IT Operations Applications (administration, backup, provisioning, monitoring, etc.) 25%
Developer / Testing Applications 25% | Security (Identity management, access control, data protection, usage & resource monitoring, anti-virus, etc.) 25% |
Middleware 17% | Desktop virtualization 15% | Runtime 9% | Not sure/Other 17%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 12
Email is the most common corporate information stored in the cloud (44%), followed by customer data such as
names and contact information (31%), sales and marketing data (31%), and employee and payroll data (30%). Fewer
organizations store intellectual property information (18%) or employee healthcare data (12%) in the cloud.
DATA STORED IN THE CLOUD
Q: What types of corporate information do you store in the cloud?
Contracts,
invoices, orders
44%
Em
ail
32%
Custom
er
data
31%
26%
Financial
corporate data
19% Intellectual
property
18%
Sales &
M
arketing
data
30%
Em
ployee
data
DevOps / development data 16% | Health information 12% | None 11% | Not sure/Other 24%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 13
The use of cloud applications is increasing as the number of organizations with 50% or more of applications deployed
in the cloud (18%) has more than doubled since last year’s survey. It is apparent that the move toward cloud computing is
inevitable. Organizations have no real competitive advantage by owning core IT infrastructure any more than owning
power generation or water supply.
APPLICATIONS DEPLOYED IN THE CLOUD
Q: What percentage of applications used by your organization are in the cloud?
56%
0% 1-25% 26-50% 51-75% 76-100%
10% 12%
16%
6%
Share of Applications Deployed in the Cloud
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 14
MOST POPULAR CLOUD APPS
Web-based applications and websites (47%),
collaboration and communication tools (38%) and
productivity tools (33%) are the most popular types
of business applications deployed in the cloud.
Microsoft Office 365 is leading the way in existing
cloud app deployments (41%) as well as planned
future deployments (20%). Salesforce follows second
and is already deployed in 27% of organizations and
planned for future deployment in 7% of organizations.
The migration to Office 365 is one of the biggest
changes to enterprise IT in recent years. It represents
yet another step in the migration of enterprises to
a utility-based model for IT services delivery that
started with Salesforce.com many years ago.
MOST POPULAR CLOUD APPS
Web apps
Collaboration &
communication apps
Productivity
IT Operations
Custom business
applications
46%
38%
33%
27%
27%
Q: Which of the following cloud applications are deployed or will be deployed in your organization?
Q: What types of business applications is your organization
deploying in the cloud?
CURRENTLY
DEPLOYED
FUTURE
DEPLOYMENT
Microsoft Office 365
Salesforce
Exchange
Google Apps
Dropbox
Service Now
Box
Workday
None
SuccessFactors
Not sure
41%
27%
24%
20%
17%
15%
14%
9%
8%
7%
6%
20%
7%
11%
6%
5%
5%
4%
4%
5%
3%
10%
Application development / testing 26% |
Sales & Marketing 25% | HR 25% |
Business intelligence / analytics 24% |
Disaster recovery / storage / archiving 24% |
Content management 22% | Finance & accounting 19% |
Supply chain management 11% | Not sure/Other 20%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 15
CLOUD SECURITY CHALLENGES
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 16
Cloud security concerns are on the rise. An overwhelming majority of 91% of organizations are very or moderately
concerned about public cloud security. Today, perceived security risks are the single biggest factor holding back
faster adoption of cloud computing. And yet, adoption of cloud computing is on the rise. The overwhelming benefits
of cloud computing should drive organizations and security teams to find a way to “get cloud done”. This is a prime
example to where security can have a profound impact on enabling business transformation.
CLOUD SECURITY CONCERNS
Q: Please rate your level of overall security concern related to adopting public cloud computing
Moderately
concerned47%
Very
concerned44%
Not sure91%organizations
have security
concerns 47%
44%
5%
4%
Not at all
concerned
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 17
A majority of respondents say they did not experience a cloud-related security incident. 36% can’t disclose or aren’t
sure about security incidents, indicating a lack of visibility into cloud security.
CLOUD SECURITY INCIDENTS
Q: Did your organization experience a cloud-related security incident in the last 12 months?
Can’t discloseYes
NO
15%9%
55%
Not sure
21%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 18
We continue to see evidence that the perception of cloud security is slowly improving relative to traditional enterprise IT
environments. The share of organizations that see a higher risk of security breaches in the cloud compared to traditional
IT environments is shrinking to 21% compared to last year’s 28%.
SECURITY RISKS IN THE CLOUD VS ON-PREMISE
Q: Compared to your traditional IT environment, would you say the number of security breaches you experienced in a public cloud is?
16%
5% 21%
Significantly higher (5%)
Somewhat higher (16%)
Significantly lower (7%)
Somewhat lower (15%)
Higher risk of security
breaches compared
to on-premise
22%Lower risk of security
breaches compared
to on-premise
Not sure
About the same
7%
15%
30%
27%
0%
unchanged
from last year
7% p.p.
from last year
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 19
Perceptions of SaaS security are slowly improving, thanks to continued investments in security controls and
customer education. For the first time since we asked this survey question, a majority of over 52% believe that cloud
apps are as secure or more secure than on-premises applications, up from only 40% in last year’s survey. The math
is simple: Large cloud providers can outspend any enterprise in securing their infrastructure and apply expertise and
manpower that is better utilized in protecting a shared infrastructure. The results are superior in terms of availability,
performance and security of cloud environments.
CLOUD APPS VS ON-PREMISE APPS
Q: Do you believe public cloud apps/SaaS like Salesforce and Office 365 are more or less secure than your internally hosted applications?
52%
Public cloud
apps are more
secure than
internal apps
Public cloud
apps are less
secure than
internal apps
Public cloud apps
are about as
secure as
internal apps
Not sure
17%
33%35%
15%
Believe that cloud apps are as
secure or more secure than
on-premises applications
SaaS Security
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 20
Unauthorized access through misuse of employee credentials and improper access controls is the single biggest
threat (53%) to cloud security. This is followed by hijacking of accounts (44%) and insecure interfaces / APIs (39%).
33% of organizations say external sharing of sensitive information is the biggest security threat. Identity management
and access control is an emerging and increasing threat concern for enterprises scaling and on-boarding to the
cloud. The good news is that all these risks can be addressed by using security controls including multi-factor
authentication, Identity and Access Management (IAM), Cloud Access Security Brokers (CASB), IP range restrictions
and access auditing.
BIGGEST SECURITY THREATS IN PUBLIC CLOUDS
Q: What do you consider the biggest security threats in public clouds?
53%
#1 #2 #3 #4
11001010110010101
11001010110010101
11001010110010101
010PASSWORD10
Unauthorized access
44%Hijacking of accounts
39% 33%Insecure interfaces/APIs External sharing of data
Posting of confidential proprietary data by employees 33% | Malicious insiders 32% | Denial of service attacks 31% |
Foreign state sponsored cyber attacks 30% | Malware injection 25% | Abuse of cloud services 24% | Shared memory attacks 18% |
Lateral movement of threats (east-west traffic) 16% | Theft of service 15% | Lost mobile devices 12% | Natural disasters 5% | Not sure/Other 9% |
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 21
Data loss, leakage and privacy continue to top the list of cloud related security concerns, virtually unchanged from last
year’s survey findings. Concerns about legal and regulatory compliance have seen the biggest gain, moving from the
number 7 spot (24%) to number 4 (39%) on the list, in line with the observed rise of compliance concerns as a key barrier
to cloud adoption.
CLOUD SECURITY CONCERNS
Q: What are your biggest cloud security concerns?
49%Data loss/leakage
46%Data privacy
42%Confidentiality
39%Legal and regulatory
compliance
CONFIDENTIAL
Data sovereignty/control 34% | Accidental exposure of credentials 26% | Lack of forensic data 26% | Incident & problem management 25%
Visibility & transparency 19% | Availability of services, systems and data 17% | Liability 17% | Disaster recovery 13% | Performance 13% |
Business continuity 13% | Fraud (e.g. account hijacking) 12% | Not sure/Other 5% | None 1%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 22
Verifying security policies (51%), visibility into infrastructure security (49%) and compliance (37%) were named as the top
three cloud security challenges that cause the biggest headaches for IT security professionals. Because the cloud is a
new environment, that is often incompatible with existing security technologies, there is a need for a new holistic security
model to cover both on-premise and cloud environments. The holy grail is a unified security policy that can be applied
across the infrastructure regardless of the underlying assets.
BIGGEST CLOUD SECURITY HEADACHES
Q: What are your biggest cloud security headaches?
51% ComplianceVerifying security policies
49% 37%Visibility to
infrastructure security
No automatic discovery / visibility / control to infrastructure security 32% | Reporting security threats and solutions 31% | Remediating threats 29% |
Security can’t keep up with pace of changes to new / existing applications 27% | Can’t identify misconfigurations quickly 26% |
Complex cloud to cloud / cloud to on prem security rule matching 21% | Unknown / hidden open IP port 20% |
Automatically enforcing of security across multiple datacenters 18% | IaaS / PaaS security rules limit / cap 15% |
Lack of integration with on-premise security technologies 12% | Too much time and resource management overhead 11% |
Lack of feature parity with on-premise security solution 9% | No flexibility 7% | Native to cloud application or cloud infrastructure 5% | None 4% |
Not sure/Other 15%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 23
Employee access to private cloud storage is one of the biggest risk factors regarding data leakage and theft - and
organizations are repsonding accordingly. 42% of organizations do not allow employees to access private cloud storage
services from the company’s network – 36% do allow access. This is a notable reversal of last year’s survey findings
where only 36% of organizations did not allow access to cloud storage services. Identifying the use of unauthorized cloud
services (“Shadow IT”) remains a major visibility challenge.
PERSONAL CLOUD STORAGE POLICY
Q: Are employees allowed to access personal cloud storage services (those registered to a personal email address) from the company’s network?
We don’t
have a policy
Yes
NO
13% 36%
42%
Not sure
9%42%Organizations do not allow
employees to access private
cloud storage services from the
corporate network.
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 24
CLOUD SECURITY SOLUTIONS
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 25
Organizations moving to the cloud are faced with new security challenges that cannot be addressed with traditional
security approaches. Secure clouds cannot exist without the right cloud security expertise. 61% of organizations
plan to train and certify existing IT staff in cloud security to ensure the proper cloud security controls are being
implemented both internally and with third party cloud service providers. Organizations realize that their IT
teams need to stay current on evolving cloud technologies, threats and mitigation strategies. In addition, 45% of
organizations plan to partner with a managed security services provider and 42% deploy additional security software
to protect data and applications in the cloud.
PATHS TO STRONGER SECURITY
Q: When moving to the cloud, how do you plan to handle your security needs?
Partner with a managed services
provider who will provide the resources
Use security software from
independent software vendor(s)
Add security staff dedicated
to cloud security issues
Look at different security-as-a-service
providers to outsource – 24x7 monitoring
45%
42%
23%
17%
Hire Professionals 23%
Not sure/Other 19%
Train and certify existing IT staff 61%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 26
Setting and enforcing security policies across cloud environments is by far the most requested capability to increase
confidence in public clouds.
CLOUD CONFIDENCE BUILDERS
Q: Which of the following would most increase your confidence in adopting public clouds?
56%
Setting and enforcing
security policies
across clouds
Ability to create
data boundaries
39%
APIs for reporting,
auditing and alerting
on security events
38%
Effective mapping
of security controls
for internally-hosted
applications to the
cloud infrastructure
37%
Isolation/protection
of virtual machines
34%
Ability to compare
security levels across
cloud providers
33%
Improved Security compared to self-managed deployment 30% | Organization certification 29% | High-integrity infrastructure 27% |
Regulatory oversight 25% | Protecting workloads 15% | Not sure/Other 13%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 27
Most traditional security tools have not been designed for cloud environments and the unique challenges cloud
adoption presents. The survey results confirm that traditional tools work somewhat or not at all for over half of
cybersecurity professionals (59%). Only 14% feel that traditional security tools are sufficient to manage security across
the cloud. The gap, say those surveyed, is primarily in both verifying security policies and visibility into infrastructure
security. This is a great example of the dissolving perimeter. Together with mobility, the need to secure access from
anywhere (mobile users, branch locations) to anywhere (physical datacenter, cloud datacenter and public cloud apps)
breaks the traditional network topology and perimeter defense. The resulting proliferation in point security solutions
is putting additional pressure on short handed security teams, as experienced security staff is still scarce.
TRADITIONAL SECURITY TOOLS IN THE CLOUD
Other
traditional tools
work somewhat
or not at all
2%
Not at all
11%
They work just fine
14%
Not sure
25%
Somewhat (but not
a complete solution)
48%
59%
Q: How well do your traditional network
security tools / appliances work in public
cloud environments?
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 28
Virtually unchanged from last year’s cloud security survey, encryption of data at rest (65%) and in motion on networks
(57%) tops the list of most effective security controls to protect data in the cloud. This is followed by intrusion detection
and prevention (IDP) with 48% and access control technologies such as Cloud Access Security Brokers (CASB) and
Identity and Access Management (IAM) with 45%.
MOST EFFECTIVE CLOUD SECURITY TECHNOLOGIES
Q: What security technologies and controls are most effective to protect data in the cloud?
65%Data encryption
57%Network encryption
48%Intrusion detection
& prevention
Trained cloud security professionals 45% | Access control (e.g. CASB / Cloud Access Security Brokers) 45% | Log management and analytics 43% |
Firewalls / NAC 40% | Data leakage prevention 40% | Endpoint security controls 40% | Patch management 38% | Network monitoring 37% |
Single sign-on / user authentication 35% | Anti-virus / Anti-malware 35% | Employee usage monitoring 29% | Mobile device management (MDM) 25% |
Database scanning and monitoring 24% | Content filtering 24% | Security Information and Event Management (SIEM) 22% | Cyber forensics 21% |
Not sure/Other 12%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 29
The most prevalent cloud security controls include multi-factor authentication in nearly half of organizations. One in four
organizations deploy additional security mechanisms.
MOST POPULAR CLOUD SECURITY CONTROLS
Q: How do you protect data in the cloud?
45%
We use multi-factor
authentication for
access control
Organizations deploy additional
security mechanisms
43%
We use encryption or
tokenization to protect
data in the cloud
41% 40%
Intrusion detection
& prevention
We use security
services offered by
the cloud provider
We deploy additional security services offered by third party vendors 25% | We don’t protect data in the cloud 5% | Not sure/Other 21%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 30
Faster time to deployment (47%), reduced
software maintenance efforts (40%) and
direct web access from any location (35%)
are the dominant drivers for cloud-based
security solutions.
Placing security in the cloud provides
significant ROI benefits for businesses.
It breaks the traditional “appliance model”
of security: Instead of physical constraints,
patch and upgrade cycles, and need for
a local IT support, the cloud enables a
security model that is up to date, always
patched, elastic and scalable, and available
everywhere.
DRIVERS OF CLOUD-BASED SECURITY SOLUTIONS
Q: What are the main drivers for considering Cloud-based Security Solutions?
Faster time to
deployment
Reduced effort
around patches and
upgrades of software
Automation helps
reduce manual effort
Easier policy
management
Need for direct secure
Internet access from
any location
48%
35%
28%
41%
31%
#1
#2
#3
#5
Appliance footprint
reduction in
branch offices
25%#7
Native to cloud
application or
cloud infrastructure
9%#9
#4
Better performance
27% #6
Protection focused on
the workload/instance
Not sure/Other 20%
20% #8
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 31
On the flipside, data privacy (56%), compliance (43%) and platform integrity (39%) are the main barriers to cloud-based
security solutions.
These concerns apply to cloud in general. Using regional cloud instances to comply with data localization requirements,
minimizing personal data storage, and demonstrating tight security controls around the platform should make cloud-
based security the default security delivery model. This way, cloud computing can offer a compelling alternative to on-
premise security in the face of emerging threats, shrinking budgets and scarce expertise.
BARRIERS TO CLOUD-BASED SECURITY SOLUTIONS
Q: What are the main inhibitors of using Cloud-based Security Solutions?
Data Privacy Regulatory
compliance
requirements
Integrity of Cloud
security platform
56% 43% 39%cloud-based
security solutions
#1 #2 #3
Solution maturity 39% | Need to keep data within specific geographical area 31% | Need to provide Keys for SSL decryption in the Cloud 23% |
Scalability and performance 17% | Lack of integration with on-premise security technologies 15% | Lack of feature parity with on-premise security solution 11% |
Not sure/Other 15%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 32
A majority of organizations are taking proactive measures to protect their business applications. We dug deeper to find
out how companies were protecting their applications. The most popular application security measures are penetration
testing (59%) followed by web application firewalls (54%) and developer education (47%).
CLOUD APPLICATION SECURITY
Q: What Application Security measures are you taking in order to protect your business applications?
59% 54%
44% 38% 7%
Web application firewallsPenetration testing
Static/Dynamic testing Security monitoring Bug Bounty programs Not sure/Other
6% 17%
None
47%Developer education
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 33
The vast majority of organizations surveyed (55%) use Active Directory on premise as the authoritative directory to
identify, authenticate and authorize access to cloud applications. Consequently, access to cloud based applications for a
majority of organizations depends heavily on proper security controls around on-premise Active Directory infrastructure.
The cloud enablement of Active Directory is a key enabler for moving to cloud-based security infrastructure.
ACCESS TO CLOUD APPLICATIONS
Q: What is the authoritative directory you use for identity data and authentication, and authorization of access for your cloud based applications?
28%
55%
27%
8% 7%
4% 3%
On premise
Active Directory
(synchronization)
On premise
Active Directory
(federation)
On premise
LDAP Directory
(Non Microsoft)
None
Not sure/Other 23%
Cloud based
Directory only
– AzureAD
Cloud based
Directory only
– Amazon
Simple AD
Organizations use Active
Directory on premise
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 34
46% of respondents state that security slows down continuous development methods like DevOps, another 15 percent
noted that security is ignored completely in their DevOps process.
59% of respondents indicated that agility and accelerated deployments are among the cloud adoption benefits, yet
security slows down DevOps. Utilization of “built for the cloud” security products provides security governance directly
integrated into the DevOps process and is key to fully realizing the benefits of the cloud.
SECURITY IMPACT ON DEVOPS
Q: Does security slow down continuous development methods like DevOps at your organization?
Yes - security slows
down DevOps
No - security is fully
integrated with DevOps
31%
No - security is completely
ignored in DevOps
15%
Other
8%
46%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 35
METHODOLOGY & DEMOGRAPHICS
The Cloud Security Spotlight Report is based on the results of a comprehensive survey of 2,200 professionals across a broad
cross-section of organizations about their adoption of cloud computing and security related concerns and practices.
The 2,200 respondents range from technical executives to managers and practitioners, and they represent organizations of
varying sizes across many industries. Their answers provide a comprehensive perspective on the state of cloud security today.
CAREER LEVEL
25% 19% 17% 14% 8%7% 6% 4%
Specialist Manager /Supervisor Consultant Director Owner / CEO / President CTO, CIO, CISCO, CMO, CFO, COO Vice President
Other
DEPARTMENT
IT Security IT Operations Engineering Operations Compliance Sales Product Management Marketing Finance Legal HR
Other
INDUSTRY
Technology, Software & Internet Government Financial Services Professional Services Healthcare, Pharmaceuticals, & Biotech
Education & Research Computers & Electronics Telecommunications Manufacturing Energy & Utilities Retail Non-Profit Other
COMPANY SIZE
Fewer than 10 10-99 100-999 1,000 4,000 5,000 – 10,000 Over 10,000
52% 20% 9% 6% 4% 3%2%
2%2%
2% 2%
11% 13% 19% 16% 9% 32%
20% 18% 12% 8% 8% 6% 5% 5% 3% 3% 3% 5%
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 36
SPONSORS
Bitglass | www.bitglass.com
The Bitglass Cloud Access Security Broker (CASB) solution provides end-to-end data protection from the cloud
to the device. It deploys in minutes and works with any cloud app on any device.
Bitglass enables enterprises to understand and control usage of cloud apps like Office 365 and Salesforce, and
internal apps like Exchange and Sharepoint. Cloud data at rest is protected with encryption and suspicious activity
detection. IT security teams can enforce consistent access, sharing, and data leakage prevention policies across
multiple cloud services, and protect mobile devices - without MDM.
Cato Networks | www.catonetworks.com
Cato Networks provides businesses with a simple, affordable and enterprise-grade secure network, at the fraction
of the cost of legacy, appliance-based solutions. The Cato Cloud reestablishes the network perimeter in the Cloud,
connecting all datacenters, remote locations, cloud infrastructure and the mobile workforce. Cato protects all
WAN and Internet traffic with a set of network security services, built directly into the cloud network. Cato was
founded by cybersecurity luminary Shlomo Kramer, co-founder of Check Point Software and Imperva, and Gur
Shatz, co-founder of Incapsula.
AlienVault | www.alienvault.com
AlienVault has simplified the way organizations detect and respond to today’s ever evolving threat landscape. Our
unique and award-winning approach, trusted by thousands of customers, combines the essential security controls
of our all-in-one platform, AlienVault Unified Security Management, with the power of AlienVault’s Open Threat
Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable
threat detection attainable for resource-constrained IT teams.
If your organization has adopted cloud infrastructure or services, you have a significant amount of valuable data
in the cloud – all of which needs to be secured. AlienVault Unified Security Management™ (USM) simplifies cloud
security management with a platform of essential tools to achieve complete security visibility and accelerate
compliance reporting.
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 37
SPONSORS
Dell Software | software.dell.com
Dell Software empowers organizations of all sizes to experience Dell’s “power to do more” by delivering scalable
yet simple-to-use solutions that can increase productivity, responsiveness and efficiency. Dell Software is uniquely
positioned to address today’s most pressing business and IT challenges with holistic, connected software offerings
across five core solution areas, encompassing data center and cloud management, information management,
mobile workforce management, security and data protection. This software, when combined with Dell hardware
and services, helps customers simplify IT, mitigate risk and accelerate business results.
Dome 9 | dome9.com
Dome9 Security provides enterprise identity access management (IAM) protection, network security, and
compliance for public clouds like Amazon Web Services (AWS). More than 200 enterprise customers trust Dome9
to protect their clouds running on AWS, Windows Azure, Google Cloud, IBM/Softlayer and many others.
CloudPassage | www.cloudpassage.com
CloudPassage®
Halo®
is the world’s leading agile security platform that provides instant visibility and continuous
protection for servers in any combination of data centers, private clouds and public clouds. The Halo platform is
delivered as a service, so it deploys in minutes and scales on-demand. Halo uses minimal system resources; so
layered security can be deployed where it counts, right at every workload – servers, instances and containers.
Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and
compliance posture, while at the same time enabling business agility.
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 38
Randtronics | www.randtronics.com
Randtronics Data Privacy Manager (DPM) protects structured and unstructured data on premises and in the cloud
using encryption, masking, tokenization and anonymization. DPM’s offering are some of the safest methods of
security available. Without measures like encryption, companies are only partly securing their data and exposing
themselves to growing vulnerabilities.
(ISC)2
| www.isc2.org/ccsp
(ISC)2
is the largest not-for-profit membership body of certified cyber, information, software and infrastructure
security professionals worldwide, with over 110,000 members. (ISC)2
’s flagship certification is the CISSP®
. In 2015,
(ISC)2
and the Cloud Security Alliance partnered to launch the Certified Cloud Security Professional (CCSP®
)
credential for security professionals whose day-to-day responsibilities involve procuring, securing and managing
cloud environments or purchased cloud services. (ISC)2
offers education programs and services based on its CBK®
.
SPONSORS
IMMUNIO | www.immunio.com
IMMUNIO is a pioneer in realtime application self-protection (RASP), providing automatic detection and protection
against web application security vulnerabilities. IMMUNIO augments applications with the necessary protection
services and hardens applications against common attacks targeting typical security weaknesses. The company’s
mission is to make truly effective real-time web protection technology easily available and widely deployed, and by
doing so, stop the biggest source of breached data records.
SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 39
Interested in joining the next
security research report?
Contact Holger Schulze to learn more.
hhschulze@gmail.com
CONTACT US
All Rights Reserved. Copyright 2016 Crowd Research Partners. This work is licensed under a Creative Commons Attribution 4.0 International License.
Produced by:

More Related Content

Viewers also liked

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Rohit Buddabathina
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
Amit Gatenyo
 

Viewers also liked (16)

Demystifying Cloud Security
Demystifying Cloud SecurityDemystifying Cloud Security
Demystifying Cloud Security
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Scaling the Cloud - Cloud Security
Scaling the Cloud - Cloud SecurityScaling the Cloud - Cloud Security
Scaling the Cloud - Cloud Security
 
Cloud Computing Integration Introduction
Cloud Computing Integration IntroductionCloud Computing Integration Introduction
Cloud Computing Integration Introduction
 
2016 Cloud Trends and Stats: RightScale State of the Cloud Report
2016 Cloud Trends and Stats: RightScale State of the Cloud Report2016 Cloud Trends and Stats: RightScale State of the Cloud Report
2016 Cloud Trends and Stats: RightScale State of the Cloud Report
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
IC4 Cloud Security Workshop 2016
IC4 Cloud Security Workshop 2016IC4 Cloud Security Workshop 2016
IC4 Cloud Security Workshop 2016
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
 
Cloud Predictions 2016
Cloud Predictions 2016Cloud Predictions 2016
Cloud Predictions 2016
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolio
 
Cloud Security - The treacherous 12
Cloud Security - The treacherous 12Cloud Security - The treacherous 12
Cloud Security - The treacherous 12
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
Don't Be a Target!
Don't Be a Target! Don't Be a Target!
Don't Be a Target!
 
Google Cloud Platform for the Enterprise
Google Cloud Platform for the EnterpriseGoogle Cloud Platform for the Enterprise
Google Cloud Platform for the Enterprise
 
Cloud Security Overview
Cloud Security OverviewCloud Security Overview
Cloud Security Overview
 

Recently uploaded

Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Lisi Hocke
 
Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...
Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...
Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...
drm1699
 

Recently uploaded (20)

From Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST APIFrom Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST API
 
Abortion Pill Prices Jozini ](+27832195400*)[ 🏥 Women's Abortion Clinic in Jo...
Abortion Pill Prices Jozini ](+27832195400*)[ 🏥 Women's Abortion Clinic in Jo...Abortion Pill Prices Jozini ](+27832195400*)[ 🏥 Women's Abortion Clinic in Jo...
Abortion Pill Prices Jozini ](+27832195400*)[ 🏥 Women's Abortion Clinic in Jo...
 
Weeding your micro service landscape.pdf
Weeding your micro service landscape.pdfWeeding your micro service landscape.pdf
Weeding your micro service landscape.pdf
 
Navigation in flutter – how to add stack, tab, and drawer navigators to your ...
Navigation in flutter – how to add stack, tab, and drawer navigators to your ...Navigation in flutter – how to add stack, tab, and drawer navigators to your ...
Navigation in flutter – how to add stack, tab, and drawer navigators to your ...
 
Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...
Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...
Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...
 
Modern binary build systems - PyCon 2024
Modern binary build systems - PyCon 2024Modern binary build systems - PyCon 2024
Modern binary build systems - PyCon 2024
 
[GRCPP] Introduction to concepts (C++20)
[GRCPP] Introduction to concepts (C++20)[GRCPP] Introduction to concepts (C++20)
[GRCPP] Introduction to concepts (C++20)
 
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAOpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
 
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
 
A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdf
 
Software Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements EngineeringSoftware Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements Engineering
 
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
 
Auto Affiliate AI Earns First Commission in 3 Hours..pdf
Auto Affiliate  AI Earns First Commission in 3 Hours..pdfAuto Affiliate  AI Earns First Commission in 3 Hours..pdf
Auto Affiliate AI Earns First Commission in 3 Hours..pdf
 
Abortion Clinic In Stanger ](+27832195400*)[ 🏥 Safe Abortion Pills In Stanger...
Abortion Clinic In Stanger ](+27832195400*)[ 🏥 Safe Abortion Pills In Stanger...Abortion Clinic In Stanger ](+27832195400*)[ 🏥 Safe Abortion Pills In Stanger...
Abortion Clinic In Stanger ](+27832195400*)[ 🏥 Safe Abortion Pills In Stanger...
 
Your Ultimate Web Studio for Streaming Anywhere | Evmux
Your Ultimate Web Studio for Streaming Anywhere | EvmuxYour Ultimate Web Studio for Streaming Anywhere | Evmux
Your Ultimate Web Studio for Streaming Anywhere | Evmux
 
Novo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMsNovo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMs
 
Abortion Pill Prices Germiston ](+27832195400*)[ 🏥 Women's Abortion Clinic in...
Abortion Pill Prices Germiston ](+27832195400*)[ 🏥 Women's Abortion Clinic in...Abortion Pill Prices Germiston ](+27832195400*)[ 🏥 Women's Abortion Clinic in...
Abortion Pill Prices Germiston ](+27832195400*)[ 🏥 Women's Abortion Clinic in...
 
The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)
 
Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...
Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...
Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...
 
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
 

2016 Cloud Security Spotlight Report

  • 2. CLOUD SECURITY SPOTLIGHT REPORT TABLE OF CONTENTS Overview Key survey findings CLOUD ADOPTION TRENDS Cloud benefits Cloud investments Cloud adoption stages Barriers to cloud adoption Top cloud service delivery & providers Most popular cloud workloads Data stored in the cloud Applications deployed in the cloud Most popular cloud apps CLOUD SECURITY CHALLENGES Cloud security concerns Cloud security incidents Security risks in the cloud vs. on-premise Cloud apps vs. on-premise apps Biggest security threats in public clouds Cloud security concerns Biggest cloud security headaches Personal cloud storage policy CLOUD SECURITY SOLUTIONS Paths to stronger security Cloud confidence builders Traditional security tools in the cloud Most effective cloud security technologies Most popular cloud security controls Drivers of cloud-based security solutions Barriers to cloud-based security solutions Cloud application security Access to cloud applications Security impact on DevOps Methodology & Demographics Sponsors Contact us 3 4 6 7 8 9 10 11 12 13 14 16 17 18 19 20 21 22 23 25 26 27 28 29 30 31 32 33 34 35 36 39
  • 3. In this new report, you will learn how your peers are approaching cybersecurity in the era of cloud, including the latest trends and benchmarks to gauge how your own organization stacks up. Many thanks to our sponsors for supporting this research project: AlienVault, Bitglass, Cato Networks, CloudPassage, Dell Software, Dome9, FireLayers, IMMUNIO, (ISC)2 and Randtronics. We hope you will enjoy this report. Holger Schulze OVERVIEW Cloud investment continues to grow over 20% annually as organizations are looking to reduce IT cost, increase agility and better support business functions. Security of critical data and systems in the cloud remains a key barrier to adoption of cloud services. This report, the result of comprehensive research in partnership with the 300,000+ member Information Security Community on LinkedIn, reveals the drivers and risk factors of migrating to the cloud. Learn how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 3 Holger Schulze Group Founder Information Security Community on LinkedIn hhschulze@gmail.com Group Partner Information Security SHARE THE CLOUD SECURITY SPOTLIGHT REPORT
  • 4. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 4 KEY SURVEY FINDINGS Security concerns top the list of barriers to cloud adoption led by general security concerns (53%, up from 45% in last year’s survey), legal and regulatory compliance concerns (42%, up from 29%), and data loss and leakage risks (40%). The rise in specific concerns about compliance and integration suggests that companies are moving from theoretical exploration of cloud models to actual implementation. 53% of organizations see unauthorized access through misuse of employee credentials and improper access controls as the single biggest threat to cloud security. This is followed by hijacking of accounts (44%), and insecure interfaces / APIs (39%). One in three organizations say external sharing of sensitive information is the biggest security threat. Verifying security policies (51%), visibility into infrastructure security (49%) and compliance (37%) were named as the top three cloud security challenges that cause the biggest headaches for IT security professionals. Organizations moving to the cloud have a variety of choices available to strengthen cloud security. 61% of organizations plan to train and certify existing IT staff, 45% partner with a managed security services provider, and 42% deploy additional security software to protect data and applications in the cloud. Encryption of data at rest (65%) and in motion on networks (57%) top the list of most effective security technologies to protect data in the cloud. This is followed by intrusion detection and prevention (IDP) with 48% and access control technologies such as Cloud Access Security Brokers (CASB) with 45%. 1 2 3 4 5
  • 6. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 6 After a few years of operating workloads in the cloud, organizations are confirming the benefits match the original promise of cloud computing. Availability (46%), cost reduction (41%) and flexible scalability (36%) top the list. Cloud is still falling short of expectations in the areas of regulatory compliance (13%) and the promise of reduced complexity (14%). CLOUD BENEFITS Cloud Benefits Availability 46% Cost Reduction Regulatory Compliance 41% 13%Reduced Complexity14% Flexible Scalability 36% Q: What benefits have you realized from your cloud deployment? Moved expenses from fixed CAPEX (purchase) to variable OPEX (rental/subscription) 32% | Accelerated deployment and provisioning 31% | Increased agility 28% | Improved performance 27% | Increased efficiency 26% | Increased geographic reach 24% | Increased employee productivity 23% | Improved security 19% | Accelerated time to market 18% | Align cost model with usage 18% | Not Sure/Other 25%
  • 7. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 7 For over a third of organizations (38%), cloud investments represent up to 15% of overall IT infrastructure investment. Half of all organizations have over 15% of their IT invested in the cloud. CLOUD INVESTMENTS Q: Cloud infrastructure investments represent what percentage of your overall infrastructure footprint (in terms of servers/workloads/instances)? IT infrastructure 38% 50% 0% 1-15% 16-25% 26-50% 51-75% +75% 12% 21% 13% 9% 7% Share of cloud relative to overall IT investment Organizations invest more than 15% of all IT in cloud
  • 8. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 8 Private Cloud 30% Deployed Implementing Trial Planning Public Cloud 25% Hybrid Cloud No Plans 24% 21% 41% 20% 16% 23% 41% 20% 19% 20% 34% 20% 18% 28% 79% of respondents are either in planning or trial stages, currently implementing or in active production cloud environments. Cloud computing can be classified by location and ownership of the cloud infrastructure: CLOUD ADOPTION STAGES Q: What cloud service delivery model(s) is your organization using? Private Cloud - Cloud infrastructure and services are dedicated to a particular organization. Private clouds can reside on premise or be hosted by a third party. Public Cloud - Cloud services and infrastructure are hosted by a third-party cloud provider and resources are shared among multiple cloud tenants / clients. Hybrid Cloud - Cloud computing environment in which single applications are split across private and public cloud, often to dynamically accommodate spikes in server demand.
  • 9. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 9 Cloud security concerns not only top the list of perceived barriers to cloud adoption, they are further increasing. General security concerns (with 53% up from 45% in last year’s survey), legal and regulatory compliance concerns (42% up from 29%), data loss & leakage risks (40% slightly down from 41%), integration with existing IT environments (35% up from 29%) and lack of expertise (26% up from 16%) top the list of barriers to cloud adoption. However, it is important to put this in context as the number of reported breaches in enterprise environments far exceed the reported exposure from cloud platforms. BARRIERS TO CLOUD ADOPTION Q: What are the biggest barriers holding back cloud adoption in your organization? Loss of control 23% | Management complexity 20% | Increased agility 28% | Fear of vendor lock-in 18% | Internal resistance and inertia 18% | Lack of staff resources 17% | Lack of transparency and visibility 15% | Lack of maturity of cloud service models 14% | Cost/Lack of ROI 13% | Lack of budget 13% Performance of apps in the cloud 12% | Lack of management buy-in 10% | Lack of customizability 9% | None 9% | Dissatisfaction with cloud service offerings/ performance/pricing 7% | Billing & tracking issues 7% | Lack of support by cloud provider 6% | Availability 5% | Not sure/Other 10% General security risks Legal & regulatory compliance Data loss & leakage risks 53% 42% 40% Cloud Adoption Barriers #1 #2 #3 8% p.p. from last year 13% p.p. from last year 1% p.p. from last year Integration with existing IT environments Lack of expertise 35% 26% #4 #5 6% p.p. from last year 10% p.p. from last year
  • 10. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 10 VMware Rackspace IBM Softlayer / IBM 18% 11% 8% 5% 45% 39%18% None BPaaS Not sure/Other 9% 8% 11% 61% cloud service delivery models SaaS 53% IaaS 39% PaaS Amazon AWS is the big fish in the cloud services pond, used by 45% of respondents. Microsoft Azure follows with 39%. TOP CLOUD SERVICE DELIVERY & PROVIDERS Q: What public cloud provider(s) do you currently use? CenturyLink – Savvis 4% | HP 4% | Verizon – Terremark 4% | AT&T 4% | CSC 1% | GoGrid 1% | Joyent 1% | Not sure/Other 32% The dominance of both cloud applications and cloud infrastructure requires that we think about securing these different entities as part of a holistic vision for securing application and infrastructure (both on premise and in the cloud). A majority of organizations (61%) uses SaaS models, followed by IaaS (53%) and PaaS (39%) as their cloud service delivery model. Q: What cloud service delivery model(s) is your organization using?
  • 11. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 11 Storage (52% up from 38% in last year’s survey), computing (51% up from 32%) and virtualization (44% up from 33%) top the list of most deployed workloads in the cloud. MOST POPULAR CLOUD WORKLOADS Q: What services & workloads is your organization deploying in the cloud? VIRTUALIZATION 52% 51% 44% 41% STORAGE COMPUTING BUSINESS APPLICATIONS POPULAR CLOUD WORKLOADS Productivity Applications (email, collaboration, instant messaging) 37% | Networking (virtual private cloud, DNS, etc) 35% | Database (relational, NoSQL, caching, etc.) 33% | Operating System 30% | IT Operations Applications (administration, backup, provisioning, monitoring, etc.) 25% Developer / Testing Applications 25% | Security (Identity management, access control, data protection, usage & resource monitoring, anti-virus, etc.) 25% | Middleware 17% | Desktop virtualization 15% | Runtime 9% | Not sure/Other 17%
  • 12. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 12 Email is the most common corporate information stored in the cloud (44%), followed by customer data such as names and contact information (31%), sales and marketing data (31%), and employee and payroll data (30%). Fewer organizations store intellectual property information (18%) or employee healthcare data (12%) in the cloud. DATA STORED IN THE CLOUD Q: What types of corporate information do you store in the cloud? Contracts, invoices, orders 44% Em ail 32% Custom er data 31% 26% Financial corporate data 19% Intellectual property 18% Sales & M arketing data 30% Em ployee data DevOps / development data 16% | Health information 12% | None 11% | Not sure/Other 24%
  • 13. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 13 The use of cloud applications is increasing as the number of organizations with 50% or more of applications deployed in the cloud (18%) has more than doubled since last year’s survey. It is apparent that the move toward cloud computing is inevitable. Organizations have no real competitive advantage by owning core IT infrastructure any more than owning power generation or water supply. APPLICATIONS DEPLOYED IN THE CLOUD Q: What percentage of applications used by your organization are in the cloud? 56% 0% 1-25% 26-50% 51-75% 76-100% 10% 12% 16% 6% Share of Applications Deployed in the Cloud
  • 14. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 14 MOST POPULAR CLOUD APPS Web-based applications and websites (47%), collaboration and communication tools (38%) and productivity tools (33%) are the most popular types of business applications deployed in the cloud. Microsoft Office 365 is leading the way in existing cloud app deployments (41%) as well as planned future deployments (20%). Salesforce follows second and is already deployed in 27% of organizations and planned for future deployment in 7% of organizations. The migration to Office 365 is one of the biggest changes to enterprise IT in recent years. It represents yet another step in the migration of enterprises to a utility-based model for IT services delivery that started with Salesforce.com many years ago. MOST POPULAR CLOUD APPS Web apps Collaboration & communication apps Productivity IT Operations Custom business applications 46% 38% 33% 27% 27% Q: Which of the following cloud applications are deployed or will be deployed in your organization? Q: What types of business applications is your organization deploying in the cloud? CURRENTLY DEPLOYED FUTURE DEPLOYMENT Microsoft Office 365 Salesforce Exchange Google Apps Dropbox Service Now Box Workday None SuccessFactors Not sure 41% 27% 24% 20% 17% 15% 14% 9% 8% 7% 6% 20% 7% 11% 6% 5% 5% 4% 4% 5% 3% 10% Application development / testing 26% | Sales & Marketing 25% | HR 25% | Business intelligence / analytics 24% | Disaster recovery / storage / archiving 24% | Content management 22% | Finance & accounting 19% | Supply chain management 11% | Not sure/Other 20%
  • 15. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 15 CLOUD SECURITY CHALLENGES
  • 16. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 16 Cloud security concerns are on the rise. An overwhelming majority of 91% of organizations are very or moderately concerned about public cloud security. Today, perceived security risks are the single biggest factor holding back faster adoption of cloud computing. And yet, adoption of cloud computing is on the rise. The overwhelming benefits of cloud computing should drive organizations and security teams to find a way to “get cloud done”. This is a prime example to where security can have a profound impact on enabling business transformation. CLOUD SECURITY CONCERNS Q: Please rate your level of overall security concern related to adopting public cloud computing Moderately concerned47% Very concerned44% Not sure91%organizations have security concerns 47% 44% 5% 4% Not at all concerned
  • 17. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 17 A majority of respondents say they did not experience a cloud-related security incident. 36% can’t disclose or aren’t sure about security incidents, indicating a lack of visibility into cloud security. CLOUD SECURITY INCIDENTS Q: Did your organization experience a cloud-related security incident in the last 12 months? Can’t discloseYes NO 15%9% 55% Not sure 21%
  • 18. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 18 We continue to see evidence that the perception of cloud security is slowly improving relative to traditional enterprise IT environments. The share of organizations that see a higher risk of security breaches in the cloud compared to traditional IT environments is shrinking to 21% compared to last year’s 28%. SECURITY RISKS IN THE CLOUD VS ON-PREMISE Q: Compared to your traditional IT environment, would you say the number of security breaches you experienced in a public cloud is? 16% 5% 21% Significantly higher (5%) Somewhat higher (16%) Significantly lower (7%) Somewhat lower (15%) Higher risk of security breaches compared to on-premise 22%Lower risk of security breaches compared to on-premise Not sure About the same 7% 15% 30% 27% 0% unchanged from last year 7% p.p. from last year
  • 19. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 19 Perceptions of SaaS security are slowly improving, thanks to continued investments in security controls and customer education. For the first time since we asked this survey question, a majority of over 52% believe that cloud apps are as secure or more secure than on-premises applications, up from only 40% in last year’s survey. The math is simple: Large cloud providers can outspend any enterprise in securing their infrastructure and apply expertise and manpower that is better utilized in protecting a shared infrastructure. The results are superior in terms of availability, performance and security of cloud environments. CLOUD APPS VS ON-PREMISE APPS Q: Do you believe public cloud apps/SaaS like Salesforce and Office 365 are more or less secure than your internally hosted applications? 52% Public cloud apps are more secure than internal apps Public cloud apps are less secure than internal apps Public cloud apps are about as secure as internal apps Not sure 17% 33%35% 15% Believe that cloud apps are as secure or more secure than on-premises applications SaaS Security
  • 20. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 20 Unauthorized access through misuse of employee credentials and improper access controls is the single biggest threat (53%) to cloud security. This is followed by hijacking of accounts (44%) and insecure interfaces / APIs (39%). 33% of organizations say external sharing of sensitive information is the biggest security threat. Identity management and access control is an emerging and increasing threat concern for enterprises scaling and on-boarding to the cloud. The good news is that all these risks can be addressed by using security controls including multi-factor authentication, Identity and Access Management (IAM), Cloud Access Security Brokers (CASB), IP range restrictions and access auditing. BIGGEST SECURITY THREATS IN PUBLIC CLOUDS Q: What do you consider the biggest security threats in public clouds? 53% #1 #2 #3 #4 11001010110010101 11001010110010101 11001010110010101 010PASSWORD10 Unauthorized access 44%Hijacking of accounts 39% 33%Insecure interfaces/APIs External sharing of data Posting of confidential proprietary data by employees 33% | Malicious insiders 32% | Denial of service attacks 31% | Foreign state sponsored cyber attacks 30% | Malware injection 25% | Abuse of cloud services 24% | Shared memory attacks 18% | Lateral movement of threats (east-west traffic) 16% | Theft of service 15% | Lost mobile devices 12% | Natural disasters 5% | Not sure/Other 9% |
  • 21. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 21 Data loss, leakage and privacy continue to top the list of cloud related security concerns, virtually unchanged from last year’s survey findings. Concerns about legal and regulatory compliance have seen the biggest gain, moving from the number 7 spot (24%) to number 4 (39%) on the list, in line with the observed rise of compliance concerns as a key barrier to cloud adoption. CLOUD SECURITY CONCERNS Q: What are your biggest cloud security concerns? 49%Data loss/leakage 46%Data privacy 42%Confidentiality 39%Legal and regulatory compliance CONFIDENTIAL Data sovereignty/control 34% | Accidental exposure of credentials 26% | Lack of forensic data 26% | Incident & problem management 25% Visibility & transparency 19% | Availability of services, systems and data 17% | Liability 17% | Disaster recovery 13% | Performance 13% | Business continuity 13% | Fraud (e.g. account hijacking) 12% | Not sure/Other 5% | None 1%
  • 22. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 22 Verifying security policies (51%), visibility into infrastructure security (49%) and compliance (37%) were named as the top three cloud security challenges that cause the biggest headaches for IT security professionals. Because the cloud is a new environment, that is often incompatible with existing security technologies, there is a need for a new holistic security model to cover both on-premise and cloud environments. The holy grail is a unified security policy that can be applied across the infrastructure regardless of the underlying assets. BIGGEST CLOUD SECURITY HEADACHES Q: What are your biggest cloud security headaches? 51% ComplianceVerifying security policies 49% 37%Visibility to infrastructure security No automatic discovery / visibility / control to infrastructure security 32% | Reporting security threats and solutions 31% | Remediating threats 29% | Security can’t keep up with pace of changes to new / existing applications 27% | Can’t identify misconfigurations quickly 26% | Complex cloud to cloud / cloud to on prem security rule matching 21% | Unknown / hidden open IP port 20% | Automatically enforcing of security across multiple datacenters 18% | IaaS / PaaS security rules limit / cap 15% | Lack of integration with on-premise security technologies 12% | Too much time and resource management overhead 11% | Lack of feature parity with on-premise security solution 9% | No flexibility 7% | Native to cloud application or cloud infrastructure 5% | None 4% | Not sure/Other 15%
  • 23. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 23 Employee access to private cloud storage is one of the biggest risk factors regarding data leakage and theft - and organizations are repsonding accordingly. 42% of organizations do not allow employees to access private cloud storage services from the company’s network – 36% do allow access. This is a notable reversal of last year’s survey findings where only 36% of organizations did not allow access to cloud storage services. Identifying the use of unauthorized cloud services (“Shadow IT”) remains a major visibility challenge. PERSONAL CLOUD STORAGE POLICY Q: Are employees allowed to access personal cloud storage services (those registered to a personal email address) from the company’s network? We don’t have a policy Yes NO 13% 36% 42% Not sure 9%42%Organizations do not allow employees to access private cloud storage services from the corporate network.
  • 24. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 24 CLOUD SECURITY SOLUTIONS
  • 25. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 25 Organizations moving to the cloud are faced with new security challenges that cannot be addressed with traditional security approaches. Secure clouds cannot exist without the right cloud security expertise. 61% of organizations plan to train and certify existing IT staff in cloud security to ensure the proper cloud security controls are being implemented both internally and with third party cloud service providers. Organizations realize that their IT teams need to stay current on evolving cloud technologies, threats and mitigation strategies. In addition, 45% of organizations plan to partner with a managed security services provider and 42% deploy additional security software to protect data and applications in the cloud. PATHS TO STRONGER SECURITY Q: When moving to the cloud, how do you plan to handle your security needs? Partner with a managed services provider who will provide the resources Use security software from independent software vendor(s) Add security staff dedicated to cloud security issues Look at different security-as-a-service providers to outsource – 24x7 monitoring 45% 42% 23% 17% Hire Professionals 23% Not sure/Other 19% Train and certify existing IT staff 61%
  • 26. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 26 Setting and enforcing security policies across cloud environments is by far the most requested capability to increase confidence in public clouds. CLOUD CONFIDENCE BUILDERS Q: Which of the following would most increase your confidence in adopting public clouds? 56% Setting and enforcing security policies across clouds Ability to create data boundaries 39% APIs for reporting, auditing and alerting on security events 38% Effective mapping of security controls for internally-hosted applications to the cloud infrastructure 37% Isolation/protection of virtual machines 34% Ability to compare security levels across cloud providers 33% Improved Security compared to self-managed deployment 30% | Organization certification 29% | High-integrity infrastructure 27% | Regulatory oversight 25% | Protecting workloads 15% | Not sure/Other 13%
  • 27. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 27 Most traditional security tools have not been designed for cloud environments and the unique challenges cloud adoption presents. The survey results confirm that traditional tools work somewhat or not at all for over half of cybersecurity professionals (59%). Only 14% feel that traditional security tools are sufficient to manage security across the cloud. The gap, say those surveyed, is primarily in both verifying security policies and visibility into infrastructure security. This is a great example of the dissolving perimeter. Together with mobility, the need to secure access from anywhere (mobile users, branch locations) to anywhere (physical datacenter, cloud datacenter and public cloud apps) breaks the traditional network topology and perimeter defense. The resulting proliferation in point security solutions is putting additional pressure on short handed security teams, as experienced security staff is still scarce. TRADITIONAL SECURITY TOOLS IN THE CLOUD Other traditional tools work somewhat or not at all 2% Not at all 11% They work just fine 14% Not sure 25% Somewhat (but not a complete solution) 48% 59% Q: How well do your traditional network security tools / appliances work in public cloud environments?
  • 28. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 28 Virtually unchanged from last year’s cloud security survey, encryption of data at rest (65%) and in motion on networks (57%) tops the list of most effective security controls to protect data in the cloud. This is followed by intrusion detection and prevention (IDP) with 48% and access control technologies such as Cloud Access Security Brokers (CASB) and Identity and Access Management (IAM) with 45%. MOST EFFECTIVE CLOUD SECURITY TECHNOLOGIES Q: What security technologies and controls are most effective to protect data in the cloud? 65%Data encryption 57%Network encryption 48%Intrusion detection & prevention Trained cloud security professionals 45% | Access control (e.g. CASB / Cloud Access Security Brokers) 45% | Log management and analytics 43% | Firewalls / NAC 40% | Data leakage prevention 40% | Endpoint security controls 40% | Patch management 38% | Network monitoring 37% | Single sign-on / user authentication 35% | Anti-virus / Anti-malware 35% | Employee usage monitoring 29% | Mobile device management (MDM) 25% | Database scanning and monitoring 24% | Content filtering 24% | Security Information and Event Management (SIEM) 22% | Cyber forensics 21% | Not sure/Other 12%
  • 29. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 29 The most prevalent cloud security controls include multi-factor authentication in nearly half of organizations. One in four organizations deploy additional security mechanisms. MOST POPULAR CLOUD SECURITY CONTROLS Q: How do you protect data in the cloud? 45% We use multi-factor authentication for access control Organizations deploy additional security mechanisms 43% We use encryption or tokenization to protect data in the cloud 41% 40% Intrusion detection & prevention We use security services offered by the cloud provider We deploy additional security services offered by third party vendors 25% | We don’t protect data in the cloud 5% | Not sure/Other 21%
  • 30. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 30 Faster time to deployment (47%), reduced software maintenance efforts (40%) and direct web access from any location (35%) are the dominant drivers for cloud-based security solutions. Placing security in the cloud provides significant ROI benefits for businesses. It breaks the traditional “appliance model” of security: Instead of physical constraints, patch and upgrade cycles, and need for a local IT support, the cloud enables a security model that is up to date, always patched, elastic and scalable, and available everywhere. DRIVERS OF CLOUD-BASED SECURITY SOLUTIONS Q: What are the main drivers for considering Cloud-based Security Solutions? Faster time to deployment Reduced effort around patches and upgrades of software Automation helps reduce manual effort Easier policy management Need for direct secure Internet access from any location 48% 35% 28% 41% 31% #1 #2 #3 #5 Appliance footprint reduction in branch offices 25%#7 Native to cloud application or cloud infrastructure 9%#9 #4 Better performance 27% #6 Protection focused on the workload/instance Not sure/Other 20% 20% #8
  • 31. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 31 On the flipside, data privacy (56%), compliance (43%) and platform integrity (39%) are the main barriers to cloud-based security solutions. These concerns apply to cloud in general. Using regional cloud instances to comply with data localization requirements, minimizing personal data storage, and demonstrating tight security controls around the platform should make cloud- based security the default security delivery model. This way, cloud computing can offer a compelling alternative to on- premise security in the face of emerging threats, shrinking budgets and scarce expertise. BARRIERS TO CLOUD-BASED SECURITY SOLUTIONS Q: What are the main inhibitors of using Cloud-based Security Solutions? Data Privacy Regulatory compliance requirements Integrity of Cloud security platform 56% 43% 39%cloud-based security solutions #1 #2 #3 Solution maturity 39% | Need to keep data within specific geographical area 31% | Need to provide Keys for SSL decryption in the Cloud 23% | Scalability and performance 17% | Lack of integration with on-premise security technologies 15% | Lack of feature parity with on-premise security solution 11% | Not sure/Other 15%
  • 32. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 32 A majority of organizations are taking proactive measures to protect their business applications. We dug deeper to find out how companies were protecting their applications. The most popular application security measures are penetration testing (59%) followed by web application firewalls (54%) and developer education (47%). CLOUD APPLICATION SECURITY Q: What Application Security measures are you taking in order to protect your business applications? 59% 54% 44% 38% 7% Web application firewallsPenetration testing Static/Dynamic testing Security monitoring Bug Bounty programs Not sure/Other 6% 17% None 47%Developer education
  • 33. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 33 The vast majority of organizations surveyed (55%) use Active Directory on premise as the authoritative directory to identify, authenticate and authorize access to cloud applications. Consequently, access to cloud based applications for a majority of organizations depends heavily on proper security controls around on-premise Active Directory infrastructure. The cloud enablement of Active Directory is a key enabler for moving to cloud-based security infrastructure. ACCESS TO CLOUD APPLICATIONS Q: What is the authoritative directory you use for identity data and authentication, and authorization of access for your cloud based applications? 28% 55% 27% 8% 7% 4% 3% On premise Active Directory (synchronization) On premise Active Directory (federation) On premise LDAP Directory (Non Microsoft) None Not sure/Other 23% Cloud based Directory only – AzureAD Cloud based Directory only – Amazon Simple AD Organizations use Active Directory on premise
  • 34. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 34 46% of respondents state that security slows down continuous development methods like DevOps, another 15 percent noted that security is ignored completely in their DevOps process. 59% of respondents indicated that agility and accelerated deployments are among the cloud adoption benefits, yet security slows down DevOps. Utilization of “built for the cloud” security products provides security governance directly integrated into the DevOps process and is key to fully realizing the benefits of the cloud. SECURITY IMPACT ON DEVOPS Q: Does security slow down continuous development methods like DevOps at your organization? Yes - security slows down DevOps No - security is fully integrated with DevOps 31% No - security is completely ignored in DevOps 15% Other 8% 46%
  • 35. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 35 METHODOLOGY & DEMOGRAPHICS The Cloud Security Spotlight Report is based on the results of a comprehensive survey of 2,200 professionals across a broad cross-section of organizations about their adoption of cloud computing and security related concerns and practices. The 2,200 respondents range from technical executives to managers and practitioners, and they represent organizations of varying sizes across many industries. Their answers provide a comprehensive perspective on the state of cloud security today. CAREER LEVEL 25% 19% 17% 14% 8%7% 6% 4% Specialist Manager /Supervisor Consultant Director Owner / CEO / President CTO, CIO, CISCO, CMO, CFO, COO Vice President Other DEPARTMENT IT Security IT Operations Engineering Operations Compliance Sales Product Management Marketing Finance Legal HR Other INDUSTRY Technology, Software & Internet Government Financial Services Professional Services Healthcare, Pharmaceuticals, & Biotech Education & Research Computers & Electronics Telecommunications Manufacturing Energy & Utilities Retail Non-Profit Other COMPANY SIZE Fewer than 10 10-99 100-999 1,000 4,000 5,000 – 10,000 Over 10,000 52% 20% 9% 6% 4% 3%2% 2%2% 2% 2% 11% 13% 19% 16% 9% 32% 20% 18% 12% 8% 8% 6% 5% 5% 3% 3% 3% 5%
  • 36. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 36 SPONSORS Bitglass | www.bitglass.com The Bitglass Cloud Access Security Broker (CASB) solution provides end-to-end data protection from the cloud to the device. It deploys in minutes and works with any cloud app on any device. Bitglass enables enterprises to understand and control usage of cloud apps like Office 365 and Salesforce, and internal apps like Exchange and Sharepoint. Cloud data at rest is protected with encryption and suspicious activity detection. IT security teams can enforce consistent access, sharing, and data leakage prevention policies across multiple cloud services, and protect mobile devices - without MDM. Cato Networks | www.catonetworks.com Cato Networks provides businesses with a simple, affordable and enterprise-grade secure network, at the fraction of the cost of legacy, appliance-based solutions. The Cato Cloud reestablishes the network perimeter in the Cloud, connecting all datacenters, remote locations, cloud infrastructure and the mobile workforce. Cato protects all WAN and Internet traffic with a set of network security services, built directly into the cloud network. Cato was founded by cybersecurity luminary Shlomo Kramer, co-founder of Check Point Software and Imperva, and Gur Shatz, co-founder of Incapsula. AlienVault | www.alienvault.com AlienVault has simplified the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award-winning approach, trusted by thousands of customers, combines the essential security controls of our all-in-one platform, AlienVault Unified Security Management, with the power of AlienVault’s Open Threat Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams. If your organization has adopted cloud infrastructure or services, you have a significant amount of valuable data in the cloud – all of which needs to be secured. AlienVault Unified Security Management™ (USM) simplifies cloud security management with a platform of essential tools to achieve complete security visibility and accelerate compliance reporting.
  • 37. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 37 SPONSORS Dell Software | software.dell.com Dell Software empowers organizations of all sizes to experience Dell’s “power to do more” by delivering scalable yet simple-to-use solutions that can increase productivity, responsiveness and efficiency. Dell Software is uniquely positioned to address today’s most pressing business and IT challenges with holistic, connected software offerings across five core solution areas, encompassing data center and cloud management, information management, mobile workforce management, security and data protection. This software, when combined with Dell hardware and services, helps customers simplify IT, mitigate risk and accelerate business results. Dome 9 | dome9.com Dome9 Security provides enterprise identity access management (IAM) protection, network security, and compliance for public clouds like Amazon Web Services (AWS). More than 200 enterprise customers trust Dome9 to protect their clouds running on AWS, Windows Azure, Google Cloud, IBM/Softlayer and many others. CloudPassage | www.cloudpassage.com CloudPassage® Halo® is the world’s leading agile security platform that provides instant visibility and continuous protection for servers in any combination of data centers, private clouds and public clouds. The Halo platform is delivered as a service, so it deploys in minutes and scales on-demand. Halo uses minimal system resources; so layered security can be deployed where it counts, right at every workload – servers, instances and containers. Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.
  • 38. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 38 Randtronics | www.randtronics.com Randtronics Data Privacy Manager (DPM) protects structured and unstructured data on premises and in the cloud using encryption, masking, tokenization and anonymization. DPM’s offering are some of the safest methods of security available. Without measures like encryption, companies are only partly securing their data and exposing themselves to growing vulnerabilities. (ISC)2 | www.isc2.org/ccsp (ISC)2 is the largest not-for-profit membership body of certified cyber, information, software and infrastructure security professionals worldwide, with over 110,000 members. (ISC)2 ’s flagship certification is the CISSP® . In 2015, (ISC)2 and the Cloud Security Alliance partnered to launch the Certified Cloud Security Professional (CCSP® ) credential for security professionals whose day-to-day responsibilities involve procuring, securing and managing cloud environments or purchased cloud services. (ISC)2 offers education programs and services based on its CBK® . SPONSORS IMMUNIO | www.immunio.com IMMUNIO is a pioneer in realtime application self-protection (RASP), providing automatic detection and protection against web application security vulnerabilities. IMMUNIO augments applications with the necessary protection services and hardens applications against common attacks targeting typical security weaknesses. The company’s mission is to make truly effective real-time web protection technology easily available and widely deployed, and by doing so, stop the biggest source of breached data records.
  • 39. SHARE THE CLOUD SECURITY SPOTLIGHT REPORT 39 Interested in joining the next security research report? Contact Holger Schulze to learn more. hhschulze@gmail.com CONTACT US All Rights Reserved. Copyright 2016 Crowd Research Partners. This work is licensed under a Creative Commons Attribution 4.0 International License. Produced by: