Enterprises Report Security Lapse with their Cloud Provider

Popularity of cloud computing is on the rise but most enterprises face apprehension over adopting cloud computing.

About 43 percent of enterprise IT decision makers experienced a security lapse or issue with their cloud provider within the last 12 months, according to a newly released global cloud security survey by Trend Micro. More than 10 percent of those surveyed said they have cloud computing projects in production, and about half of the respondents reported that they are either implementing or piloting new cloud applications.

Trend Micro is a global cloud security specialist that is focused on creating a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers

For this global survey, the company questioned 1200 IT decision makers from U.S., UK, Germany, India, Canada and Japan.

An overwhelming 93 percent of the respondents said they are currently working with at least one of the cloud services but remaining 7 percent has no plans to deploy any cloud computing service.

Based on our data, we see about 5 times more cloud applications coming online in the next few years, yet 43 percent of existing cloud users had a security incident last year. On top of that, some respondents didn’t even know they were using the cloud, much less securing it,” said Dave Asprey, vice president of cloud security, Trend Micro. “Given that many cloud service providers do not adequately add IT resources to security, the reality is that securing your cloud environment is not an option, it’s a necessity.”

In the past, security concerns were the primary inhibitors to cloud adoption. Now, performance and availability have equal influence over IT decision makers. As we witnessed in recent data breach incidents, everything is linked – poor security causes downtime, as well as bad performance,” added Asprey.

By Anuradha Shukla

Sorry, comments are closed for this post.

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…