Click me
Transcribed

Data Security is Stormy in the Cloud

DATA SECURITY IS STORMY IN THE CLOUD FOR MOST COMPANIES, THE CLOUD HAS BECOME CRITICAL TO THEIR IT STRATEGIES.. US .BUT PROTECTING DATA IN THE 79% Tli UK CLOUD IS MORE DIFFICULT APAC 73% 71% Europe 63% Europe 78% UK 77% US 68% APAC 59% % of IT professionals who say cloud computing is very important % of IT professionals who say it is more difficult to protect sensitive data in the cloud using conventional security 8. 4 15 IT SECURITY IS OFTEN LEFT OUT OF DECISIONS ABOUT CLOUD SERVICES How often is the IT security team involved in the decision making process about cloud resources? 9% 9% Never Always 11% Most of the time 34% Some of the time 38% Rarely % 25 JK 3 33 6 Z 9. H. 3 9. 6 65 CLOUD SECURITY IS STORMY BECAUSE OF SHADOW IT 60% 51% 50% 46% 37% 38% 40% 35% 32% 28% 30% 24% 20% 10% 0% US UK Europe APAC % of Corporate Data stored in the cloud Data stored in the cloud that is NOT controlled by IT 1 5 2 F DATA SECURITY IN THE CLOUD IS LACKING 57% of companies are not proactive in managing compliance for privacy regulations for data in the cloud 57% of companies are not careful about sharing sensitive information in the cloud with third parties Only 34% of companies have policies that require the use of security measures such as encryption as a condition to using cloud services 4. 115 6 5 3 % 25 5 46 ENCRYPTION IS SEEN AS IMPORTANT ... Europe 76% APAC 74% .BUT IS NOT WIDELY UK 71% US IMPLEMENTED IN THE CLOUD 67% İiji US 38% Europe 35% UK 31% APAC 26% % of companies that use encryption to secure sensitive data in the cloud % of respondents say the ability to encrypt data is important 65 S D 35 F\ 6 G 4 56 41 33L 65Z 1 96 54 T9R 9 8 46S X46 54 5Y 3U 21 35 6 45 6 S2 5 F 6G H 56 4 K3 L 6 Z 5 19C V 33 N 3 4 THE CLOUD ALSO COMPLICATES USER ACCESS CONTROLS % of IT professionals say the management of identities is more difficult in the cloud US UK Europe APAC 69 68 70 63 percent percent percent percent D 35 F\6G4H 56 J 41]K33 LL 65Z 5 19C 9 6 X 6 5 V 33 N 3 4 B 6 R 99 E 8746S 5X46G 5465 Y 43 U 1 B 35 D 6 459 $ 87 D 161 35 F\6G 4 H 5 6 J 4 1] K33LL 65Z519C 96 65 V3 3 N 3 4 B 6 6 M MOST COMPANIES HAVE NOT WIDELY IMPLEMENTED MULTI-FACTOR AUTHENTICATION Use of multi-factor authentication for third-party access 48% 49% 46% 47% 50% 40% 30% 20% 10% 5% 5% 0% Yes No Unsure Employ multi-factor authentication to secure access to data in the cloud Deploy multi-factor authentication for internal employees' access to data in the cloud 6 Q1 W 5 E PWLE793 2P{66!A46Z64 A!6 A 6 4Z 5S 54 398893048LS 0 6+601 W5E G 44H 36 VE4 R4658+W 746% 065A4 X115 FOR MORE INFORMATION, VISIT: www2.SAFENET-INC.COM/CLOUD-SECURITY-RESEARCH/ THE afeNet Ponemon DATA PROTECTION COMPANY INSTITUIE

Data Security is Stormy in the Cloud

shared by SafeNet on Oct 31
42 views
0 shares
0 comments
In a data security study commissioned by SafeNet, the Ponemon Institute surveyed 1,864 IT and IT security professionals in the U.S., U.K., E.U, and Asia Pacific about the governance policies and secur...

Publisher

SafeNet, Inc.

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size