SlideShare a Scribd company logo
THE CLOUD ECONOMY
11 Essential Trends About How Companies Connect
to Each Other Via the Cloud
THE CLOUD ECONOMY
A NEW
GENERATION OF APPS
IS CHANGING
HOW PEOPLE
CONNECT
WITH EACH OTHER
AND AT WORK, PEOPLE ARE USING APPS TO CONNECT WITH
PARTNERS, SUPPLIERS, & CUSTOMERS
2013 Q3 2014 Q22013 Q4 2014 Q1 2014 Q3
759 738
626
545
831
2015 Q1
923
BY NOW, MOST COMPANIES
KNOW THEY USE AN AVERAGE OF
923 CLOUD APPS
2014 Q4
897
BUT MANY WOULD
BE SHOCKED
TO DISCOVER
THEY CONNECT TO
1,555
PARTNERS
VIA THESE APPS SUPPLIERS
DISTRIBUTORS CUSTOMERS
VENDORS
TOP CLOUD HYPERCONNECTORS
BASED ON THE NUMBER OF PARTNER CONNECTIONS THEY ENABLE
CUSTOMER SERVICE
FILE SHARING
COLLABORATION
1. Zendesk
1. Sharefile
1. Cisco WebEx
2. Salesforce
2. Box
2. Slack
3. GrooveHQ
3. Wiredrive
3. Office 365
COMPANIES
OF ALL INDUSTRIES
CONNECT WITH
PARTNERS
FROM ALL INDUSTRIES
OUT OF THOUSANDS OF COMPANIES, A SELECT
58 “SUPER PARTNERS”
CONNECT WITH 50% OF ENTERPRISES
A NEW ECONOMY DRIVEN BY THESE
CONNECTIONS IS EMERGING:
THE CLOUD ECONOMY
THE CLOUD IS HAVING A MEASURABLE
IMPACT ON BUSINESS
Average improvement in
time to market
Average increase in
company growth
Average increase in
process efficiency
Average reduction in
operational costs
Average reduction in IT
spending
Average reduction in IT
maintenance cost
20.66%
19.63%
18.80%
16.18%
15.07%
16.76%
Source: Vanson Bourne “The Business Impact of the Cloud”
IN THE CLOUD ECONOMY,
PRODUCTIVITY IS SOARING
United States Productivity
Source: www.tradingeconomics.com, U.S. Bureau of Labor Statistics
108
107
106
105
104
103
102
Jan 10 Jan 12 Jan 14
BUT THERE IS RISK
HACKERS CAN GAIN ACCESS TO YOUR COMPANY
VIA YOUR PARTNERS
HACKERS USED A HEATING & COOLING VENDOR
AS THE INFILTRATION POINT FOR THE
$148 MILLION TARGET BREACH
WHAT MAKES A PARTNER A HIGH RISK
TO YOUR COMPANY?
Devices Infected
with Malware
Unpatched
Vulnerabilities
Compromised
Identities
PASSWORD
*******
USERNAME
*********
Just 8% of partners are high risk
8%
29%
But 29% of data is shared with
high-risk partners
8%
Percent of companies in industry that are high-risk
THE RISKIEST PARTNER INDUSTRIES THAT
REQUIRE CLOSER INSPECTION
Telecommunications
Agriculture & Mining
Construction & Real Estate
Energy & Utilities
Healthcare
High Tech
Transportation & Storage
Manufacturing
Financial Services
Travel
27.7%
21.4%
20.5%
19.9%
18.1%
16.7%
16.5%
16.0%
30.4%
15.9%
DOWNLOAD NOW
CLOUD ADOPTION
& RISK REPORT
Q1 2015 Published Q2 2015
Download the Full Report
Get the full report with
detailed statistics on the
top cloud services,
fastest growing apps,
and risks you can avoid
in the cloud.

More Related Content

What's hot

Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015
Prayukth K V
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
IBM Security
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Black Duck by Synopsys
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Citrix
 
Connectivity Benchmark Report: The Enterprise’s Connected Future - APIs on th...
Connectivity Benchmark Report: The Enterprise’s Connected Future - APIs on th...Connectivity Benchmark Report: The Enterprise’s Connected Future - APIs on th...
Connectivity Benchmark Report: The Enterprise’s Connected Future - APIs on th...
Bui Kiet
 
State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights
Lori MacVittie
 
Not Using Cloud? 5 Stats Show You're Already Behind
Not Using Cloud?  5 Stats Show You're Already BehindNot Using Cloud?  5 Stats Show You're Already Behind
Not Using Cloud? 5 Stats Show You're Already Behind
Avni Rajput
 
Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
Citrix
 
Trends in Cloud Computing 2016
Trends in Cloud Computing 2016Trends in Cloud Computing 2016
Trends in Cloud Computing 2016
CompTIA
 
[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud
RapidScale
 
2019 Technology Trends
2019 Technology Trends 2019 Technology Trends
2019 Technology Trends
Aciron Consulting
 
Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?
shawnnewman
 
Cloud Predictions 2015 - What To Expect?
Cloud Predictions 2015 -  What To Expect?Cloud Predictions 2015 -  What To Expect?
Cloud Predictions 2015 - What To Expect?
Aditi Singh
 
State of Application Delivery 2017 - DevOps Insights
State of Application Delivery 2017 - DevOps Insights State of Application Delivery 2017 - DevOps Insights
State of Application Delivery 2017 - DevOps Insights
Lori MacVittie
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
Accenture Technology
 
Why the cloud is a trend
Why the cloud is a trendWhy the cloud is a trend
Why the cloud is a trend
MotherGuardians
 
Technology & The Future of professional accountants
Technology & The Future of professional accountantsTechnology & The Future of professional accountants
Technology & The Future of professional accountants
Zahir Internasional , PT
 
Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)
José Ferreiro
 
IDC FutureScape Exec Summary Cloud
IDC FutureScape Exec Summary CloudIDC FutureScape Exec Summary Cloud
IDC FutureScape Exec Summary Cloud
Dean Bonehill ♠Technology for Business♠
 
Public support: Benefitting from the cloud ecosystem
Public support: Benefitting from the cloud ecosystemPublic support: Benefitting from the cloud ecosystem
Public support: Benefitting from the cloud ecosystem
Singtel
 

What's hot (20)

Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Connectivity Benchmark Report: The Enterprise’s Connected Future - APIs on th...
Connectivity Benchmark Report: The Enterprise’s Connected Future - APIs on th...Connectivity Benchmark Report: The Enterprise’s Connected Future - APIs on th...
Connectivity Benchmark Report: The Enterprise’s Connected Future - APIs on th...
 
State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights
 
Not Using Cloud? 5 Stats Show You're Already Behind
Not Using Cloud?  5 Stats Show You're Already BehindNot Using Cloud?  5 Stats Show You're Already Behind
Not Using Cloud? 5 Stats Show You're Already Behind
 
Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Trends in Cloud Computing 2016
Trends in Cloud Computing 2016Trends in Cloud Computing 2016
Trends in Cloud Computing 2016
 
[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud
 
2019 Technology Trends
2019 Technology Trends 2019 Technology Trends
2019 Technology Trends
 
Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?
 
Cloud Predictions 2015 - What To Expect?
Cloud Predictions 2015 -  What To Expect?Cloud Predictions 2015 -  What To Expect?
Cloud Predictions 2015 - What To Expect?
 
State of Application Delivery 2017 - DevOps Insights
State of Application Delivery 2017 - DevOps Insights State of Application Delivery 2017 - DevOps Insights
State of Application Delivery 2017 - DevOps Insights
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Why the cloud is a trend
Why the cloud is a trendWhy the cloud is a trend
Why the cloud is a trend
 
Technology & The Future of professional accountants
Technology & The Future of professional accountantsTechnology & The Future of professional accountants
Technology & The Future of professional accountants
 
Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)
 
IDC FutureScape Exec Summary Cloud
IDC FutureScape Exec Summary CloudIDC FutureScape Exec Summary Cloud
IDC FutureScape Exec Summary Cloud
 
Public support: Benefitting from the cloud ecosystem
Public support: Benefitting from the cloud ecosystemPublic support: Benefitting from the cloud ecosystem
Public support: Benefitting from the cloud ecosystem
 

Similar to The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Other Via the Cloud

La Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las AplicacionesLa Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las Aplicaciones
Asociación de Marketing Bancario Argentino
 
Top Software Glitches and Growing Significance of Software Testing
Top Software Glitches and Growing Significance of Software TestingTop Software Glitches and Growing Significance of Software Testing
Top Software Glitches and Growing Significance of Software Testing
Cigniti Technologies Ltd
 
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
Paul Brody
 
Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...
Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...
Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...
Alexander Miller
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodesciccone
 
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' CybersecurityNaughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
Tenable Network Security
 
115,992 views Feb 22, 2012, 1143amI am an author, indep.docx
115,992 views  Feb 22, 2012, 1143amI am an author, indep.docx115,992 views  Feb 22, 2012, 1143amI am an author, indep.docx
115,992 views Feb 22, 2012, 1143amI am an author, indep.docx
aulasnilda
 
Raconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportRaconteur: Cloud for Business Report
Raconteur: Cloud for Business Report
Censornet
 
CA Technologies Survive and Thrive in the Application Economy- August 2014
CA Technologies   Survive and Thrive in the Application Economy- August 2014CA Technologies   Survive and Thrive in the Application Economy- August 2014
CA Technologies Survive and Thrive in the Application Economy- August 2014
JAX Chamber IT Council
 
Top 10 Trends in Telecommuting
Top 10 Trends in TelecommutingTop 10 Trends in Telecommuting
Top 10 Trends in Telecommuting
Icomm Technologies
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Marco Essomba
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility
Array Networks
 
5 Steps to Attaining Information Strength
5 Steps to Attaining Information Strength5 Steps to Attaining Information Strength
5 Steps to Attaining Information Strength
Viewpointe, LLC
 
The 2021 State Of Ecosystem & Application Integration Survey
The 2021 State Of Ecosystem & Application Integration SurveyThe 2021 State Of Ecosystem & Application Integration Survey
The 2021 State Of Ecosystem & Application Integration Survey
ConnorHolbert
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
Appian
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application Security
Veracode
 
Raconteur Cloud for business 2015
Raconteur Cloud for business 2015Raconteur Cloud for business 2015
Raconteur Cloud for business 2015Digital Realty
 
Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4
Accenture Technology
 
Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4
accenture
 

Similar to The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Other Via the Cloud (20)

La Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las AplicacionesLa Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las Aplicaciones
 
Top Software Glitches and Growing Significance of Software Testing
Top Software Glitches and Growing Significance of Software TestingTop Software Glitches and Growing Significance of Software Testing
Top Software Glitches and Growing Significance of Software Testing
 
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
 
Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...
Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...
Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' CybersecurityNaughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
 
115,992 views Feb 22, 2012, 1143amI am an author, indep.docx
115,992 views  Feb 22, 2012, 1143amI am an author, indep.docx115,992 views  Feb 22, 2012, 1143amI am an author, indep.docx
115,992 views Feb 22, 2012, 1143amI am an author, indep.docx
 
Raconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportRaconteur: Cloud for Business Report
Raconteur: Cloud for Business Report
 
CA Technologies Survive and Thrive in the Application Economy- August 2014
CA Technologies   Survive and Thrive in the Application Economy- August 2014CA Technologies   Survive and Thrive in the Application Economy- August 2014
CA Technologies Survive and Thrive in the Application Economy- August 2014
 
Top 10 Trends in Telecommuting
Top 10 Trends in TelecommutingTop 10 Trends in Telecommuting
Top 10 Trends in Telecommuting
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility
 
5 Steps to Attaining Information Strength
5 Steps to Attaining Information Strength5 Steps to Attaining Information Strength
5 Steps to Attaining Information Strength
 
The 2021 State Of Ecosystem & Application Integration Survey
The 2021 State Of Ecosystem & Application Integration SurveyThe 2021 State Of Ecosystem & Application Integration Survey
The 2021 State Of Ecosystem & Application Integration Survey
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application Security
 
Cloud for Business
Cloud for BusinessCloud for Business
Cloud for Business
 
Raconteur Cloud for business 2015
Raconteur Cloud for business 2015Raconteur Cloud for business 2015
Raconteur Cloud for business 2015
 
Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4
 
Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Other Via the Cloud

  • 1. THE CLOUD ECONOMY 11 Essential Trends About How Companies Connect to Each Other Via the Cloud THE CLOUD ECONOMY
  • 2. A NEW GENERATION OF APPS IS CHANGING HOW PEOPLE CONNECT WITH EACH OTHER
  • 3. AND AT WORK, PEOPLE ARE USING APPS TO CONNECT WITH PARTNERS, SUPPLIERS, & CUSTOMERS
  • 4. 2013 Q3 2014 Q22013 Q4 2014 Q1 2014 Q3 759 738 626 545 831 2015 Q1 923 BY NOW, MOST COMPANIES KNOW THEY USE AN AVERAGE OF 923 CLOUD APPS 2014 Q4 897
  • 5. BUT MANY WOULD BE SHOCKED TO DISCOVER THEY CONNECT TO 1,555 PARTNERS VIA THESE APPS SUPPLIERS DISTRIBUTORS CUSTOMERS VENDORS
  • 6. TOP CLOUD HYPERCONNECTORS BASED ON THE NUMBER OF PARTNER CONNECTIONS THEY ENABLE CUSTOMER SERVICE FILE SHARING COLLABORATION 1. Zendesk 1. Sharefile 1. Cisco WebEx 2. Salesforce 2. Box 2. Slack 3. GrooveHQ 3. Wiredrive 3. Office 365
  • 7. COMPANIES OF ALL INDUSTRIES CONNECT WITH PARTNERS FROM ALL INDUSTRIES
  • 8. OUT OF THOUSANDS OF COMPANIES, A SELECT 58 “SUPER PARTNERS” CONNECT WITH 50% OF ENTERPRISES
  • 9. A NEW ECONOMY DRIVEN BY THESE CONNECTIONS IS EMERGING: THE CLOUD ECONOMY
  • 10. THE CLOUD IS HAVING A MEASURABLE IMPACT ON BUSINESS Average improvement in time to market Average increase in company growth Average increase in process efficiency Average reduction in operational costs Average reduction in IT spending Average reduction in IT maintenance cost 20.66% 19.63% 18.80% 16.18% 15.07% 16.76% Source: Vanson Bourne “The Business Impact of the Cloud”
  • 11. IN THE CLOUD ECONOMY, PRODUCTIVITY IS SOARING United States Productivity Source: www.tradingeconomics.com, U.S. Bureau of Labor Statistics 108 107 106 105 104 103 102 Jan 10 Jan 12 Jan 14
  • 12. BUT THERE IS RISK
  • 13. HACKERS CAN GAIN ACCESS TO YOUR COMPANY VIA YOUR PARTNERS
  • 14. HACKERS USED A HEATING & COOLING VENDOR AS THE INFILTRATION POINT FOR THE $148 MILLION TARGET BREACH
  • 15. WHAT MAKES A PARTNER A HIGH RISK TO YOUR COMPANY? Devices Infected with Malware Unpatched Vulnerabilities Compromised Identities PASSWORD ******* USERNAME *********
  • 16. Just 8% of partners are high risk 8%
  • 17. 29% But 29% of data is shared with high-risk partners 8%
  • 18. Percent of companies in industry that are high-risk THE RISKIEST PARTNER INDUSTRIES THAT REQUIRE CLOSER INSPECTION Telecommunications Agriculture & Mining Construction & Real Estate Energy & Utilities Healthcare High Tech Transportation & Storage Manufacturing Financial Services Travel 27.7% 21.4% 20.5% 19.9% 18.1% 16.7% 16.5% 16.0% 30.4% 15.9%
  • 19. DOWNLOAD NOW CLOUD ADOPTION & RISK REPORT Q1 2015 Published Q2 2015 Download the Full Report Get the full report with detailed statistics on the top cloud services, fastest growing apps, and risks you can avoid in the cloud.