Press Release: Cloud Security Survey Reveals Lack Of Business Policies Governing Rogue Cloud Usage

Cloud Security Survey Reveals Lack of Business Policies Governing Rogue Cloud Usage Even as Data Protection Remains Highest Concern with the Cloud

Forty Percent of Companies Deny Cloud Usage Despite Employee and Departmental Use of Web-Based Applications and Mobile Devices Outside of IT Control

Seattle, Wash. – November 6, 2012 – New research tracking trends and issues in cloud security revealed a growing gap between actual business cloud practices and related IT policies. The survey found that while nearly 20 percent of businesses have no clear security policies or standards around employee or departmental use of “cloud,” the majority do allow employees to use cloud services and access corporate data from cloud applications or connected devices. This policy versus utilization gap is consistent for both the 61 percent of respondents who said their company is using the cloud, as well as the remainder who reported not officially leveraging cloud services to-date.

The October 2012 research, sponsored by cloud backup provider Symform, surveyed nearly 500 companies across a wide range of industries and organizational size, with 18 percent representing enterprises, 34 percent from small to medium organizations, and 48 percent representing IT service providers or small businesses. The survey queried respondents about current cloud utilization, cloud security concerns and benefits, security policies and employee use of cloud services, applications and devices.

For many businesses, data growth is outpacing cloud adoption. Coupled with BYOD and the consumerization of IT, the survey reveals that many businesses are slow to acknowledge cloud adoption within their organization and, as a result, determine the proper IT security and policies to govern this cloud usage. In fact, of the 39 percent who said they are not using cloud, 65 percent claim to allow employees or teams to use cloud services and 35 percent allow employees to put company data in cloud applications.

This research validates how cloud applications and services are being purchased and managed increasingly by non-IT departments, and illustrates the need for IT to re-claim control from a policy and governance standpoint while still enabling the business to benefit from the cloud’s agility and cost-effectiveness,” said Margaret Dawson, vice president of product management at Symform. “I always advise IT leaders to be the centralized source of all IT policy, vendor criteria, compliance management and the definition of “trust” for their organizations. Cloud usage is inevitable but loss of control is not.

Despite the gap between cloud utilization and corresponding security policies, the Symform survey revealed that secure cloud backup is gaining credibility as a safe place to store or use data, with 50 percent of respondents believing even sensitive data can be secured in the cloud. However, credit card information was a huge exception, with 70 percent saying they would not put credit card data in the cloud. This aligns with the belief that the highest perceived benefit of the cloud is data protection. For those using the cloud, nearly 50 percent stated secure cloud storage services allow them to spend less time managing data protection and on IT security overall. For those not in the cloud, over 50 percent believe that better data protection would be the top benefit gained by moving services to the cloud.

The number one stated concern and key criteria for IT managers with the cloud was Access Controls. Other top security criteria when evaluating cloud services were auditing and tracking, securing data both in motion and at rest, vulnerability management and maintaining strong security service level agreements (SLAs). To alleviate their fears, companies of all sizes are turning to large technology vendors to gain advice and learn best practices on cloud security. While leading analyst and industry organizations such as Gartner, the Cloud Security Alliance and Black Hat scored well among respondents, the most trusted sources were Microsoft, Amazon, Apple, IBM and other IT vendors. In fact, Microsoft and Amazon received an equal 46 percent vote as the  top trusted source(s) on cloud security.

While not necessarily related to cloud security, the research did substantiate that Platform-as-a-Service (PaaS) is the slowest cloud platform to penetrate organizations, lagging well behind Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS). Only 39 percent of those using cloud reported leveraging PaaS, while 48 percent and 79 percent respectively said they were currently using IaaS and SaaS. PaaS again was the laggard when respondents were asked which cloud model they were least likely to adopt, with 48 percent of those already in the cloud and 70 percent of those not yet using cloud claiming they would not leverage a PaaS solution within the next 12 months.

For more information on the cloud security survey results, as well as other primary research sponsored by Symform, go to http://www.symform.com/join-the-revolution/resources/market-research/.

About Symform

The Symform Cloud Storage Network is a better way to store and backup all of your data. As the world’s first distributed and crowdsourced cloud based backup solution, Symform enables users to pay with bytes instead of bucks. Every business on the network contributes excess local drive space to the grid in exchange for secure, fast and reliable cloud data backup. Before data leaves the source device, it is encrypted and shredded, redundancy added, and then geo-distributed across the global network. With its proprietary and patented technology, Symform is building the world’s largest virtual datacenter using existing Internet infrastructure. Go to www.symform.com or email info@symform.com for more information.

Symform, Symform Global Cloud Storage Network, the Resilient Storage Architecture, and RAID-96 are trademarks of Symform, Inc. References to other companies and their products acknowledge the trademarks owned by their respective companies and are for reference purposes only.

Source: Symform

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
When Sci-Fi Predictions Come To Fruition

When Sci-Fi Predictions Come To Fruition

Evolution of Technologies To paraphrase science fiction author Arthur C. Clark, those who make predictions about the future are either “considered conservative now and mocked later, or mocked now and proved right when they are no longer around to enjoy the acclaim.” The one thing we can be sure about, Clark ventured, is that “[the…

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Inc (FB.O) said on Thursday it had completed a successful test flight of a solar-powered drone that it hopes will help it extend internet connectivity to every corner of the planet. Aquila, Facebook’s lightweight, high-altitude aircraft, flew at a few thousand feet for 96 minutes in Yuma, Arizona, Chief Executive Mark Zuckerberg wrote in…

When Will Women In Tech Become The Norm?

When Will Women In Tech Become The Norm?

Tech Diversity It is well known that the technology industry has been dominated by men, but it is also clear that the industry is working to change that. Diversity in the tech industry, especially where it applies to women in tech, has been a topic of discussion for years. Recently the Washington Technology Industry Association…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Edtech and Virtual Reality – Exciting Learning Environment

Edtech and Virtual Reality – Exciting Learning Environment

Customizing Edutech Customized edtech learning solutions are becoming more commonplace as the education industry recognises their potential and begins transforming the traditional structures so as to incorporate innovative developments. From textbooks to tablets, chalkboards to virtual reality, edtech promises not only dynamic and exciting learning environments but better learning strategies and solutions. Virtual Reality and…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…

Cloud Infographic – The Data Scientist

Cloud Infographic – The Data Scientist

Data Scientist Report The amount of data in our world has been exploding in recent years. Managing big data has become an integral part of many businesses, generating billions of dollars of competitive innovations, productivity and job growth. Forecasting where the big data industry is going has become vital to corporate strategy. Enter the Data…

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps Whether it be enterprise apps or any other, if there is any heavy data that is going to be transacted in and through an app, then affiliating it with the Cloud becomes a must. And then an important question arises: How do you decide when to integrate your enterprise app with…