burger menu
Cloud Threat Report 2019

Cloud Threat Report 2019

    Add to bookmarks

Defining Edge Intelligence: Closing Visibility Gaps with a Layered Defense Strategy

SUMMARY

Nearly two-thirds of this report's respondents state that cloud computing offers a more secure environment than they can provide on-premises. This idea has resulted in on-going and increasing cloud adoption and the majority of businesses have also increased the amount of critical data they have in the cloud.

Cloud computing is key to every detail of business operations, the report explains. Around half of all respondents think the majority of their business data will be stored in a public cloud by 2020. Speed and agility are two demanded factors by organizations nowadays along with higher expectations around security.

This report gives an overview of the cybersecurity challenges that companies face as they implement cloud services at a quick pace. The paper aims at giving IT experts relevant insights and suggestions to ensure that cybersecurity is a key business enabler. 

Securing cloud services entails a series of challenges, the paper says. One that deserves a special mention is the confusion level between the shared responsibility security model. A lack of clarity on cloud security has had a significant impact on many companies, with the introduction of malware and loss of data, the paper states. The report shows that 82% of cloud users have suffered security events as a consequence of the confusion around shared responsibility security models

The majority of companies in this study indicated that they have the policy to examine and approve cloud applications. However, there has been a significant annual increase in the concern that such policies are not being respected.

The research also found that 85% of respondents have plans to replace passwords with new forms of authentication. It also reveals that more than 50% of businesses surveyed are using machine learning for cybersecurity purposes.

OUTLINE

Executive Summary

Cloud Services Have Become More Business-critical

The Use of Cloud Services Continues to Grow

Confidence Has Increased the Strategic Nature of Cloud Services

Spotlight: The Sensitive Data Proxy

The Dependency on Cloud Services Is Compounding Cybersecurity Challenges

Cloud Security Is a Confusing Shared Responsibility

Security Visibility Has Become More Cloudy, Increasing Event Storms

Spotlight: Cloud Adoption Is Creating New Challenges and Exacerbating Old Ones

Today’s Diverse Threat Landscape Spans Core-to-edge

Phishing Attacks are Targeting Cloud Services

Multiple Attack Types, Vectors, and Methods Are of Concern

Spotlight: Third-party Risk

The Shadow IT Norm Creates a Policy Conundrum

IT is Seeking Alternatives to Passwords

Cloud and Mobility Are Complicating Identity and Access Management Strategies

Other Forms of Authentication Are Emerging

Spotlight: Expanding the Use of MFA with an Adaptive Approach 45 The People, Processes, and Technologies of a Cloud Security Program

Core-to-edge Security Requires a Defense-in-depth Strategy

Edge-based Controls Are Essential Security Technologies

Spotlight: The Role and Responsibility of the Cloud Security Architect

The Future in Focus: Scaling Security Operations with Machine Learning-powered

Analytics Machine Learning Is Becoming a Foundational Technology

IT Is Applying Machine Learning to Address Perennial Security Challenges

Spotlight: The Efficacy and Efficiency Benefits of Machine Learning

In Summary: The Cloud Security Imperative

Appendix

Research Methodology  

Participant Demographics 

Cloud Application Approval Policies Are Widely Disregarded

The Use of Shadow IT Applications Has Had Consequences

Spotlight: The Improper Use of Approved Cloud Applications 

Users Are Turning to Automation to Remedy Chronic Patching Problems 

SLAs and Compatibility Overshadow the Proven E ectiveness of Patching  

Organizations Have Strong Interest in Automated Patching to Eliminate Operational Obstacle  

Spotlight: Applying Autonomous Driving to Patch Management 

DETAILS

Overview

Researchfinder Rating
5 out of 5 stars
Title
Cloud Threat Report 2019
Sub-Title
Defining Edge Intelligence: Closing Visibility Gaps with a Layered Defense Strategy
Region
Global
Published
March 29, 2019
Publisher
KPMG , Oracle
Author(s)
Mary Ann Davidson, Greg Jensen, Tony Buffomante, Laeeq Ahmed, Brian Jensen, Doug Cahill
Price
FREE
Language
ENGLISH

Content

Number of Pages
60
Number of Tables
25
Number of Exhibits
0
Topics
cloud, security
Tags
automation, autonomous vehicles, cloud adoption, cloud applications, cloud computing, cloud security, cyber security, global, hybrid cloud, KPMG, machine learning, Oracle, security
Author(s)
Mary Ann Davidson, Greg Jensen, Tony Buffomante, Laeeq Ahmed, Brian Jensen, Doug Cahill
Methodology
This report is based on a survey of 456 cybersecurity and IT professionals from private-and public-sector organizations in United States and Canada, United Kingdom, Australia and Singapore. Respondents were required to be responsible for evaluating, purchasing, and managing cybersecurity technology products and services and to be highly familiar with their organization’s public cloud use.
EVALUATION

In-depth study about the cyber security challenges that companies face as cloud adoption increases.

Positives:

  • Well-structured
  • Understandable language
  • Useful tables with the report's findings
  • Great findings

 

Similiar Reports

Internet Trends 2019

FREE

2019 Global eCommerce Fraud Management Report

FREE

Internet of Things

FREE