Five Reasons to Take Cloud Security More Seriously

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Next

Third-Party Apps

Fact: More than 45,000 installs of third-party cloud applications by privileged users were discovered by CloudLock.

The Cybersecurity Risk: Since privileged users are often super administrators with an extensive access scope, they represent a heightened cybersecurity risk and, as such, no third-party applications should be connected to these accounts. The excessive access scope of many third-party cloud applications becomes problematic if the application is compromised or malicious by design - or simply may be externalizing sensitive information unbeknownst to end users.

The adoption of public cloud applications continues to accelerate for both organizations and individuals at an exponential rate — evidenced across the massive growth in the volume of accounts, files, collaboration, and connected third-party cloud applications. In fact, the volume of files stored in public cloud applications per organization in 2015 has ballooned to 1.2 million, a 10x increase from 2014.

Adopting cloud technologies affords organizations a wide range of benefits, including dramatic reductions in total cost of ownership, increased flexibility and scalability, the transition from capital expenditure to operational expenditure, and a substantial boost to employee capabilities.

Meanwhile, the volume of sensitive corporate data in public cloud applications is growing, with organizations storing 100,000 sensitive files in cloud platforms on average. Forrester Research further explains:

"Sensitive data is moving to the cloud, beyond the protection of your perimeter controls. … As this occurs, the amount of data, and, most importantly, the amount of sensitive or 'toxic' data the enterprise stores in these software-as-a-service (SaaS) and infrastructure-as-a-service (IaaS) platforms is increasing by the day - and regardless of its locations, S&R pros still need to protect it effectively." - Forrester Research (2015, March). Market Overview: Cloud Data Protection Solutions

How great is the cyber risk in the cloud? According to a recent CloudLock report entitled "Cloud Cybersecurity Report: The Extended Perimeter," it might be greater than you think.

 

Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

 
More Slideshows

RKONITGrowthFlexibility0x Building High-Growth IT: 5 Things to Know Now

Five factors IT pros need to consider when strategizing and constructing a computing platform built for growth and flexibility. ...  More >>

DataCtr11-290x195 5 Essential Elements in Building an Agile Data Center

Five key areas that are critical for successful data center modernization efforts include speed, quality of service (QoS), disaster recovery, predictive data analytics and manageability at scale. ...  More >>

cloud47-290x195 Multi-Cloud 101: 7 Things You Need to Know

Many organizations are beginning to consider use of a multi-cloud strategy, in which multiple cloud solutions are leveraged for a more complete and purpose-built cloud architecture. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.