Five Insights for Building Trust in the Cloud

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Five Insights for Building Trust in the Cloud-2 Next

What's the issue?

No longer considered an emerging technology, cloud computing services have entered the mainstream. Today, a significant majority of organizations have either adopted or are planning to adopt some form of cloud computing technology. Whether CIOs know it or not, their data and corporate boundaries have entered the cloud. Business units, departments and business partners are engaging directly with cloud services providers without first consulting IT: a phenomenon EY calls "cloud creep." The lines of our once clear corporate network boundaries are now blurry.

Some fear that communicating data over a public network will increase its vulnerability to cyber attacks. Others worry that cloud service providers offering the same infrastructure to multiple clients in multiple locations will not be able to maintain segregated confidentiality. Still others express concern that transmitting their data across international boundaries will expose them to diverse legal and regulatory requirements in jurisdictions with which they're unfamiliar.

Not that long ago, cloud computing was little more than a speck on the horizon. We heard reports of it rapidly becoming a mainstream technology, but it had yet to make a meaningful impact on our technology landscape. According to EY's Global Information Security Survey, in 2010, 30 percent of respondents indicated that their organization used or was planning to use cloud computing-based services. In 2011, the percentage had risen to 44 percent. By 2012, cloud computing had reached a technological tipping point: Almost 60 percent of survey respondents said their organization was using or planned to use cloud computing services. And yet, 38 percent of respondents said that they had not taken any measures to mitigate the risks of using cloud computing services. This disruptive technology was advancing faster than many could secure it.

A more recent Forrester Research report suggests that for 73 percent of surveyed businesses in Europe and North America, security remains a major concern when considering cloud computing.

One of the first principles of improving information security is taking control of your environment. It would therefore feel counterintuitive for an organization to surrender control of its IT infrastructure and data to a third party. And yet this approach may offer the best opportunity to address increasingly complex security and privacy challenges. Rather than becoming an organization's worst security nightmare, cloud computing platforms may offer its best hope to create a more secure IT environment by strengthening controls and improving information and security capabilities.

Here are five insights for executives from EY for creating an environment that is secure, trusted and audit-ready.


Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

More Slideshows

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

ArriaNLG-IoTAutomation0x Internet of Things Personified: Integration and Automation

The real value that the Internet of Things brings is at the intersection of gathering data and leveraging it. ...  More >>

SAPSocialCollabSuccess0x 6 Strategies for Being Successful with Social Collaboration

Enterprise social collaboration solutions are most successful when they contribute to business value and benefits that address company goals. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.