DevOps tools

Cloud Security Solutions Still Puzzle Businesses

Cloud Security Solutions

Roughly one third of enterprises in North America experience troubles maintaining their cloud security due to the fast progress in cloud technologies and the complex nature of the cloud, a report by Threat Stack and the Enterprise Strategy Group reads. Other challenges include growing number and complexity of regulations, which prevents new business endeavors and slows down the pace of growth of current business operations in the cloud. Nonetheless, containerization is on the rise and hybrid environments gain popularity.

Cloud Security Challenges to Enterprises

One of the greatest concerns of North American businesses is the visibility of their cloud workloads. Close to two thirds, or 62 percent, want more visibility into cloud workloads, which is getting more and more difficult provided that 28 percent of businesses will run a hybrid cloud solution within a year. According to the survey, one fifth of businesses plan to run workloads on five different cloud service providers.

Only one in four enterprises is relying on native security controls provided by a cloud vendor, though. Some 54 percent of respondents use a combination of third-party and native controls while 53 percent consider production database server as the most critical type of cloud workload they must secure.

Cloud Solutions

(Image Source: Threat Stack and the Enterprise Strategy Group)

Other security challenges before businesses running cloud operations is the inability of security tools to prevent misconfiguration and software vulnerabilities. While the latter will not be fixed any time soon, cloud providers can think of better misconfiguration controls and automated protection. This is in line with respondents’ statement that security tools are unable to perform key tasks such as automation through integration of DevOps tools.

Furthermore, security tools are unable to secure visibility into system-level activity, enterprises complain. This is an alarming finding given that 31 percent of businesses cannot cope with the rapid pace of cloud developments, which means the above issues could only worsen in the next years.

Compliance Requirements Prevent New Business

More than half of businesses in North America are of opinion that security and compliance requirements slow down the sales process and their overall sales cycle. While 31 percent of all investment in cloud security is forced by the need to meet external compliance requirements, 59 percent of business say their sales process is slowing down because of such requirements and 57 percent complain about sales cycle delays.

Security compliance is obviously the major driving force behind investment in cloud security. Nonetheless, 26 percent of businesses surveyed say they experience difficulties achieving the required visibility to identify misconfigurations. This translates into failure to meet compliance requirements, which slows down further their overall business development.

Containerization Is Gaining Popularity

Another key finding is that some 42 percent of enterprises have already adopted containerized product applications, which in turn poses further cloud security risks. Containers introduce further layer of security and compliance issues provided that additional 23 percent of businesses are to deploy containerization over the next 12 months. Use of containers will double in the next 12 months with further 22 percent of enterprises beginning to test containers during the period.

Approximately one third of businesses express concerns over the lack of access to viable security solutions for containers and another one third is worried their current cybersecurity solution does not cover containers. Actually, containers represent the single most important security challenge bearing in mind that market penetration will reach about 90 percent as early as next year.

Thus, enterprises need to adopt an integrated security strategy instead of seeking multi point solutions or taking fragmented approach toward cloud security. Implementation of comprehensive intrusion detection platforms is another viable method to cope with the security challenges posed by cloud complexity, compliance, and increasing adoption of containers.

By Kiril V. Kirilov

Kiril Kirilov

Kiril V. Kirilov is covering IT and business and finance topics as a full-time journalist and freelance writer for over two decades. He also deals with all things content strategy and content marketing.

Kiril analyses all business and new technology trends across the tech industry. He is also founder of a content strategy service.

Cloud and the Convenience Solution

Cloud and the Convenience Solution

Cloud Mobility Buying a new phone is always an exciting endeavour. Whether you had just broken your phone (ouch) or ...
Our Computers Can Recognize Faces but Imagine Seeing Through an Animal’s Eyes. Now We Can.

Our Computers Can Recognize Faces but Imagine Seeing Through an Animal’s Eyes. Now We Can.

Seeing Through An Animal’s Eyes Computer Vision and Facial Recognition have gone from rare and difficult to increasingly available thanks ...
5 Pitfalls to Avoid when Selecting a Cloud-based Video Conferencing System

5 Pitfalls to Avoid when Selecting a Cloud-based Video Conferencing System

Cloud-based Video Conferencing System Pitfalls A recent survey revealed that three out of four executives predict that video conferencing will ...
Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share ...
Steps To Ensure A Successful Cloud IAM Environment

Steps To Ensure A Successful Cloud IAM Environment

Cloud IAM Environment Sales and implementations of identity and access management (IAM) solutions have drastically increased over the last couple ...
Future Data Scientists

Big Data: The Hot Commodity for Marketing in 2017 and Beyond?

Big Data: The Hot Commodity for Marketing Will the market for consumer data ever come to a breaking point? Let ...
Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, ...
Part 1 - Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even ...
Technology And Trends That Will Help Shape The Enterprise IT In 2018

Technology And Trends That Will Help Shape The Enterprise IT In 2018

Enterprise Trends In 2018 Enterprise Trends In 2018... The year 2017 was a landmark year for the Enterprise IT. On ...
73% Are Using Internet Of Things Data To Improve Their Business

73% Are Using Internet Of Things Data To Improve Their Business

Internet Of Things Data According to the Cisco Visual Networking Index, M2M connections will represent 46% of connected devices by ...