The State of Cloud Computing Security

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14
Previous Next

Click through to see key finding from a survey from the Ponemon Institute, sponsored by CA Technologies.

One of the most heated debates in all of enterprise computing these days centers on the security of cloud computing. One IT camp argues that cloud computing is inherently more secure because of the ability to invest in all the policies and expertise required to make the overall IT environment secure.

The other camp argues just as vociferously that the centralization of IT into a few cloud computing platforms makes it easier for the bad guys to focus their efforts and that, once breached, hundreds of thousands of records will be as risk because of all the shared infrastructure inherent to the cloud computing model.

Into the midst of this debate comes a new study from the Ponemon Institute that was funded by CA Technologies. The study of 642 IT executives in the U.S and another 283 from Europe, the Middle East and Africa finds that about half of worldwide IT organizations said that no one in their organization evaluates cloud computing providers for security. Worse yet, half said they were pretty sure that no one in their organizations knew about every cloud computing service that end users in their company were storing data on.

Larry Ponemon, chairman of the Ponemon Institute, says the study clearly shows that at the moment the risk factors with cloud computing are high because not all cloud computing providers have the same level of security. In addition, there is no security rating system in place for cloud computing, so business users can’t even rely on third-party security validations.

Lina Liberti, vice president of marketing for security management at CA Technologies, said the real issue is the total lack of transparency between cloud computing providers and internal IT organizations. The end result is that IT organizations don’t want to take responsibility for things like external cloud computing providers that they can’t manage. Of course, business users have lots of good reasons for wanting to use cloud computing services, but with those decisions they also need to be fully cognizant of the associated risks that they are taking responsibility for.

Longer term, Ponemon notes, there is a potential for cloud computing to actually result in more secure enterprise computing environments because as both public and private cloud computing platforms evolve, IT organizations will get a second chance to rethink their entire approach to security, especially as awareness of cloud computing security issues heighten and the work being done by the Cloud Security Alliance continues to evolve.

In the meantime, Ponemon advises both IT organizations and the end users they serve to proceed with caution.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security51-190x128 Tips for Avoiding Phishing Email Traps

During this time of year, people make more online transactions than usual, so it's essential to be extra careful when sending financial and/or personal information. ...  More >>

Holiday16-290x195 The Top 12 Scams of the Holidays 2014

The holidays are upon us -- children are making their lists, families are pulling out the holiday decorations and hanging their stockings with care and, unfortunately, cyber criminals are trying to steal your presents. ...  More >>

Holiday15-290x195 Shopping Simplified: 15 Tech Gifts for $50 and Under

We've compiled this lineup of 15 high-tech items to simplify shopping this season. Some are just fun to use and a few of these devices are things that just about everyone should own. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date