Press Release: Cloud Security Survey Reveals Lack Of Business Policies Governing Rogue Cloud Usage

Cloud Security Survey Reveals Lack of Business Policies Governing Rogue Cloud Usage Even as Data Protection Remains Highest Concern with the Cloud

Forty Percent of Companies Deny Cloud Usage Despite Employee and Departmental Use of Web-Based Applications and Mobile Devices Outside of IT Control

Seattle, Wash. – November 6, 2012 – New research tracking trends and issues in cloud security revealed a growing gap between actual business cloud practices and related IT policies. The survey found that while nearly 20 percent of businesses have no clear security policies or standards around employee or departmental use of “cloud,” the majority do allow employees to use cloud services and access corporate data from cloud applications or connected devices. This policy versus utilization gap is consistent for both the 61 percent of respondents who said their company is using the cloud, as well as the remainder who reported not officially leveraging cloud services to-date.

The October 2012 research, sponsored by cloud backup provider Symform, surveyed nearly 500 companies across a wide range of industries and organizational size, with 18 percent representing enterprises, 34 percent from small to medium organizations, and 48 percent representing IT service providers or small businesses. The survey queried respondents about current cloud utilization, cloud security concerns and benefits, security policies and employee use of cloud services, applications and devices.

For many businesses, data growth is outpacing cloud adoption. Coupled with BYOD and the consumerization of IT, the survey reveals that many businesses are slow to acknowledge cloud adoption within their organization and, as a result, determine the proper IT security and policies to govern this cloud usage. In fact, of the 39 percent who said they are not using cloud, 65 percent claim to allow employees or teams to use cloud services and 35 percent allow employees to put company data in cloud applications.

This research validates how cloud applications and services are being purchased and managed increasingly by non-IT departments, and illustrates the need for IT to re-claim control from a policy and governance standpoint while still enabling the business to benefit from the cloud’s agility and cost-effectiveness,” said Margaret Dawson, vice president of product management at Symform. “I always advise IT leaders to be the centralized source of all IT policy, vendor criteria, compliance management and the definition of “trust” for their organizations. Cloud usage is inevitable but loss of control is not.

Despite the gap between cloud utilization and corresponding security policies, the Symform survey revealed that secure cloud backup is gaining credibility as a safe place to store or use data, with 50 percent of respondents believing even sensitive data can be secured in the cloud. However, credit card information was a huge exception, with 70 percent saying they would not put credit card data in the cloud. This aligns with the belief that the highest perceived benefit of the cloud is data protection. For those using the cloud, nearly 50 percent stated secure cloud storage services allow them to spend less time managing data protection and on IT security overall. For those not in the cloud, over 50 percent believe that better data protection would be the top benefit gained by moving services to the cloud.

The number one stated concern and key criteria for IT managers with the cloud was Access Controls. Other top security criteria when evaluating cloud services were auditing and tracking, securing data both in motion and at rest, vulnerability management and maintaining strong security service level agreements (SLAs). To alleviate their fears, companies of all sizes are turning to large technology vendors to gain advice and learn best practices on cloud security. While leading analyst and industry organizations such as Gartner, the Cloud Security Alliance and Black Hat scored well among respondents, the most trusted sources were Microsoft, Amazon, Apple, IBM and other IT vendors. In fact, Microsoft and Amazon received an equal 46 percent vote as the  top trusted source(s) on cloud security.

While not necessarily related to cloud security, the research did substantiate that Platform-as-a-Service (PaaS) is the slowest cloud platform to penetrate organizations, lagging well behind Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS). Only 39 percent of those using cloud reported leveraging PaaS, while 48 percent and 79 percent respectively said they were currently using IaaS and SaaS. PaaS again was the laggard when respondents were asked which cloud model they were least likely to adopt, with 48 percent of those already in the cloud and 70 percent of those not yet using cloud claiming they would not leverage a PaaS solution within the next 12 months.

For more information on the cloud security survey results, as well as other primary research sponsored by Symform, go to http://www.symform.com/join-the-revolution/resources/market-research/.

About Symform

The Symform Cloud Storage Network is a better way to store and backup all of your data. As the world’s first distributed and crowdsourced cloud based backup solution, Symform enables users to pay with bytes instead of bucks. Every business on the network contributes excess local drive space to the grid in exchange for secure, fast and reliable cloud data backup. Before data leaves the source device, it is encrypted and shredded, redundancy added, and then geo-distributed across the global network. With its proprietary and patented technology, Symform is building the world’s largest virtual datacenter using existing Internet infrastructure. Go to www.symform.com or email info@symform.com for more information.

Symform, Symform Global Cloud Storage Network, the Resilient Storage Architecture, and RAID-96 are trademarks of Symform, Inc. References to other companies and their products acknowledge the trademarks owned by their respective companies and are for reference purposes only.

Source: Symform

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Automated Application Discovery Introduced By Savision At Microsoft Ignite 2016

Automated Application Discovery Introduced By Savision At Microsoft Ignite 2016

Automated Application Discovery ATLANTA, GEORGIA – September 26, 2016 – Savision, a market leader in service-oriented monitoring solutions that unify IT operations with IT service management, today announced the release of its automated application discovery module for Unity iQ. Savision’s automated application discovery module offers an agentless, trigger-based discovery method that captures infrastructure elements, application dependencies, as well…

Three Ways To Secure The Enterprise Cloud

Three Ways To Secure The Enterprise Cloud

Secure The Enterprise Cloud Data is moving to the cloud. It is moving quickly and in enormous volumes. As this trend continues, more enterprise data will reside in the cloud and organizations will be faced with the challenge of entrusting even their most sensitive and critical data to a different security environment that comes with using…

Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines of a sci-fi movie universe. Thanks to technology introduced by products like Oculus Rift, consumers now have access to virtual environments with fully immersive graphic capabilities. As a result, companies have only just begun to…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored. Today’s cloud computing environment goes well beyond what most could even have imagined at the birth of modern computing and innovation in the field isn’t slowing. A Brief History Matillion’s interactive timeline of cloud begins…

Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data Future Today’s organizations should become more collaborative, virtual, adaptive, and agile in order to be successful in complex business world. They should be able to respond to changes and market needs. Many organizations found that the valuable data they possess and how they use it can make them different than others. In fact,…

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford to focus on anything…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…