Executive Insights for Building Trust in the Cloud

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9
Previous Next

Click through for insights for executives from EY for creating a cloud environment that is secure, trusted and audit-ready.

Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

Not that long ago, cloud computing was little more than a speck on the horizon. We heard reports of it rapidly becoming a mainstream technology, but it had yet to make a meaningful impact on our technology landscape. According to EY's Global Information Security Survey, in 2010, 30 percent of respondents indicated that their organization used or was planning to use cloud computing-based services. In 2011, the percentage had risen to 44 percent. By 2012, cloud computing had reached a technological tipping point: Almost 60 percent of survey respondents said their organization was using or planned to use cloud computing services. And yet, 38 percent of respondents said that they had not taken any measures to mitigate the risks of using cloud computing services. This disruptive technology was advancing faster than many could secure it.


A more recent Forrester Research report suggests that for 73 percent of surveyed businesses in Europe and North America, security remains a major concern when considering cloud computing.

One of the first principles of improving information security is taking control of your environment. It would therefore feel counterintuitive for an organization to surrender control of its IT infrastructure and data to a third party. And yet this approach may offer the best opportunity to address increasingly complex security and privacy challenges. Rather than becoming an organization's worst security nightmare, cloud computing platforms may offer its best hope to create a more secure IT environment by strengthening controls and improving information and security capabilities.

Here are five insights for executives from EY for creating an environment that is secure, trusted and audit-ready.

 

More Slideshows

Analytics8-290x195 Four Steps to Ensure Your Big Data Investment Pays Off

Big Data became the buzzword du jour to describe the vast collection of information that could be synthesized and used to help us make smarter decisions faster. But how do we profit from it? ...  More >>

infra21-190x128 What International Conferencing Trends Tell Us About the World

The conference call is a common business practice across the globe. But can conferencing usage help us learn about cultural trends? ...  More >>

Social5-290x195 Four Ways to Unlock Value from the Internet of Things

IoT examples can be categorized into four basic usage scenarios, each of which presents clear business opportunities for end-user organizations. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.