Online Security Solutions Still Puzzle Businesses

Cloud Security Solutions

Roughly one third of enterprises in North America experience troubles maintaining their cloud security due to the fast progress in cloud technologies and the complex nature of the cloud, a report by Threat Stack and the Enterprise Strategy Group reads. Other challenges include growing number and complexity of regulations, which prevents new business endeavors and slows down the pace of growth of current business operations in the cloud. Nonetheless, containerization is on the rise and hybrid environments gain popularity.

Cloud Security Challenges to Enterprises

One of the greatest concerns of North American businesses is the visibility of their cloud workloads. Close to two thirds, or 62 percent, want more visibility into cloud workloads, which is getting more and more difficult provided that 28 percent of businesses will run a hybrid cloud solution within a year. According to the survey, one fifth of businesses plan to run workloads on five different cloud Service Providers.

Only one in four enterprises is relying on native security controls provided by a cloud vendor, though. Some 54 percent of respondents use a combination of third-party and native controls while 53 percent consider production database server as the most critical type of cloud workload they must secure.

Cloud Solutions

(Image Source: Threat Stack and the Enterprise Strategy Group)

Other security challenges before businesses running cloud operations is the inability of security tools to prevent misconfiguration and software Vulnerabilities. While the latter will not be fixed any time soon, cloud providers can think of better misconfiguration controls and automated protection. This is in line with respondents’ statement that security tools are unable to perform key tasks such as automation through integration of DevOps tools.

Furthermore, security tools are unable to secure visibility into system-level activity, enterprises complain. This is an alarming finding given that 31 percent of businesses cannot cope with the rapid pace of cloud developments, which means the above issues could only worsen in the next years.

Compliance Requirements Prevent New Business

More than half of businesses in North America are of opinion that security and compliance requirements slow down the sales process and their overall sales cycle. While 31 percent of all investment in cloud security is forced by the need to meet external compliance requirements, 59 percent of business say their sales process is slowing down because of such requirements and 57 percent complain about sales cycle delays.

Security compliance is obviously the major driving force behind investment in cloud security. Nonetheless, 26 percent of businesses surveyed say they experience difficulties achieving the required visibility to identify misconfigurations. This translates into failure to meet compliance requirements, which slows down further their overall business development.

Containerization Is Gaining Popularity

Another key finding is that some 42 percent of enterprises have already adopted containerized product applications, which in turn poses further cloud security risks. Containers introduce further layer of security and compliance issues provided that additional 23 percent of businesses are to deploy containerization over the next 12 months. Use of containers will double in the next 12 months with further 22 percent of enterprises beginning to test containers during the period.

Approximately one third of businesses express concerns over the lack of access to viable security solutions for containers and another one third is worried their current cybersecurity solution does not cover containers. Actually, containers represent the single most important security challenge bearing in mind that market penetration will reach about 90 percent as early as next year.

Thus, enterprises need to adopt an integrated security strategy instead of seeking multi point solutions or taking fragmented approach toward cloud security. Implementation of comprehensive intrusion detection platforms is another viable method to cope with the security challenges posed by cloud complexity, compliance, and increasing adoption of containers.

By Kiril V. Kirilov

Data Fallout.png
The Manuscript.png
Disaster Recovery Plan.png
Twitbook.png
Security Breach 10 Useful Cloud Security Tools
Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense of security. Cloud computing has become a business solution for ...
Gilad David Maayan
What is Open Source Security? Open source software is now an inseparable part of most software projects. Research has estimated that as much as 90% of enterprise software is made up of open source components ...
Jen Klostermann
The Fintech Landscape The Nitty Gritty Although the COVID-19 pandemic has highlighted its existence, most of us have been using fintech in some form or another for quite some time. It’s a big part of ...
Oxylabs
A conversation with Aleksandras Šulženko – Product owner at Oxylabs.io In a global economy where change happens by the second, one of the best ways to keep up with industry information, including your competitors, is ...
Mike Whitmire
The Role of Accounting Software Running and healthy and growing organization isn’t easy. There are many moving parts that contribute to business health and they need to work in unison. Accounting, unfortunately, is often seen ...