Press Release: Cloud Security Survey Reveals Lack Of Business Policies Governing Rogue Cloud Usage

Cloud Security Survey Reveals Lack of Business Policies Governing Rogue Cloud Usage Even as Data Protection Remains Highest Concern with the Cloud

Forty Percent of Companies Deny Cloud Usage Despite Employee and Departmental Use of Web-Based Applications and Mobile Devices Outside of IT Control

Seattle, Wash. – November 6, 2012 – New research tracking trends and issues in cloud security revealed a growing gap between actual business cloud practices and related IT policies. The survey found that while nearly 20 percent of businesses have no clear security policies or standards around employee or departmental use of “cloud,” the majority do allow employees to use cloud services and access corporate data from cloud applications or connected devices. This policy versus utilization gap is consistent for both the 61 percent of respondents who said their company is using the cloud, as well as the remainder who reported not officially leveraging cloud services to-date.

The October 2012 research, sponsored by cloud backup provider Symform, surveyed nearly 500 companies across a wide range of industries and organizational size, with 18 percent representing enterprises, 34 percent from small to medium organizations, and 48 percent representing IT service providers or small businesses. The survey queried respondents about current cloud utilization, cloud security concerns and benefits, security policies and employee use of cloud services, applications and devices.

For many businesses, data growth is outpacing cloud adoption. Coupled with BYOD and the consumerization of IT, the survey reveals that many businesses are slow to acknowledge cloud adoption within their organization and, as a result, determine the proper IT security and policies to govern this cloud usage. In fact, of the 39 percent who said they are not using cloud, 65 percent claim to allow employees or teams to use cloud services and 35 percent allow employees to put company data in cloud applications.

This research validates how cloud applications and services are being purchased and managed increasingly by non-IT departments, and illustrates the need for IT to re-claim control from a policy and governance standpoint while still enabling the business to benefit from the cloud’s agility and cost-effectiveness,” said Margaret Dawson, vice president of product management at Symform. “I always advise IT leaders to be the centralized source of all IT policy, vendor criteria, compliance management and the definition of “trust” for their organizations. Cloud usage is inevitable but loss of control is not.

Despite the gap between cloud utilization and corresponding security policies, the Symform survey revealed that secure cloud backup is gaining credibility as a safe place to store or use data, with 50 percent of respondents believing even sensitive data can be secured in the cloud. However, credit card information was a huge exception, with 70 percent saying they would not put credit card data in the cloud. This aligns with the belief that the highest perceived benefit of the cloud is data protection. For those using the cloud, nearly 50 percent stated secure cloud storage services allow them to spend less time managing data protection and on IT security overall. For those not in the cloud, over 50 percent believe that better data protection would be the top benefit gained by moving services to the cloud.

The number one stated concern and key criteria for IT managers with the cloud was Access Controls. Other top security criteria when evaluating cloud services were auditing and tracking, securing data both in motion and at rest, vulnerability management and maintaining strong security service level agreements (SLAs). To alleviate their fears, companies of all sizes are turning to large technology vendors to gain advice and learn best practices on cloud security. While leading analyst and industry organizations such as Gartner, the Cloud Security Alliance and Black Hat scored well among respondents, the most trusted sources were Microsoft, Amazon, Apple, IBM and other IT vendors. In fact, Microsoft and Amazon received an equal 46 percent vote as the  top trusted source(s) on cloud security.

While not necessarily related to cloud security, the research did substantiate that Platform-as-a-Service (PaaS) is the slowest cloud platform to penetrate organizations, lagging well behind Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS). Only 39 percent of those using cloud reported leveraging PaaS, while 48 percent and 79 percent respectively said they were currently using IaaS and SaaS. PaaS again was the laggard when respondents were asked which cloud model they were least likely to adopt, with 48 percent of those already in the cloud and 70 percent of those not yet using cloud claiming they would not leverage a PaaS solution within the next 12 months.

For more information on the cloud security survey results, as well as other primary research sponsored by Symform, go to http://www.symform.com/join-the-revolution/resources/market-research/.

About Symform

The Symform Cloud Storage Network is a better way to store and backup all of your data. As the world’s first distributed and crowdsourced cloud based backup solution, Symform enables users to pay with bytes instead of bucks. Every business on the network contributes excess local drive space to the grid in exchange for secure, fast and reliable cloud data backup. Before data leaves the source device, it is encrypted and shredded, redundancy added, and then geo-distributed across the global network. With its proprietary and patented technology, Symform is building the world’s largest virtual datacenter using existing Internet infrastructure. Go to www.symform.com or email info@symform.com for more information.

Symform, Symform Global Cloud Storage Network, the Resilient Storage Architecture, and RAID-96 are trademarks of Symform, Inc. References to other companies and their products acknowledge the trademarks owned by their respective companies and are for reference purposes only.

Source: Symform

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…