Five Reasons to Take Cloud Security More Seriously

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Next

Policy Violations

Fact: As many as one in four employees, knowingly or not, violate corporate data security policy in public cloud applications.

The Cybersecurity Risk: Security policies tend to focus on two key areas: the type of sensitive content and the exposure of sensitive content. This means that one in four users are opening their organization up to potential data security and cybersecurity concerns in the form of inappropriate data storage or excessively accessible critical data assets.

The adoption of public cloud applications continues to accelerate for both organizations and individuals at an exponential rate — evidenced across the massive growth in the volume of accounts, files, collaboration, and connected third-party cloud applications. In fact, the volume of files stored in public cloud applications per organization in 2015 has ballooned to 1.2 million, a 10x increase from 2014.

Adopting cloud technologies affords organizations a wide range of benefits, including dramatic reductions in total cost of ownership, increased flexibility and scalability, the transition from capital expenditure to operational expenditure, and a substantial boost to employee capabilities.

Meanwhile, the volume of sensitive corporate data in public cloud applications is growing, with organizations storing 100,000 sensitive files in cloud platforms on average. Forrester Research further explains:

"Sensitive data is moving to the cloud, beyond the protection of your perimeter controls. … As this occurs, the amount of data, and, most importantly, the amount of sensitive or 'toxic' data the enterprise stores in these software-as-a-service (SaaS) and infrastructure-as-a-service (IaaS) platforms is increasing by the day - and regardless of its locations, S&R pros still need to protect it effectively." - Forrester Research (2015, March). Market Overview: Cloud Data Protection Solutions

How great is the cyber risk in the cloud? According to a recent CloudLock report entitled "Cloud Cybersecurity Report: The Extended Perimeter," it might be greater than you think.

 

Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

 
More Slideshows

infra98-190x128 To Converge or to Hyperconverge: Why Not Both?

While some organizations already know which infrastructure, converged or hyperconverged, might be best for their environment, many others have questions about how best to proceed. ...  More >>

RKONITGrowthFlexibility0x Building High-Growth IT: 5 Things to Know Now

Five factors IT pros need to consider when strategizing and constructing a computing platform built for growth and flexibility. ...  More >>

DataCtr11-290x195 5 Essential Elements in Building an Agile Data Center

Five key areas that are critical for successful data center modernization efforts include speed, quality of service (QoS), disaster recovery, predictive data analytics and manageability at scale. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.