Click me
Transcribed

2014 Data Breaches: Impacts on 2015 Cloud Adoption

2014 BREACHES IMPACTS ON 2015 CLOUD ADOPTION 2014 has become known as the "Year of the Breach" due to the large number of successful attacks on well-known institutions across the retail, financial services, healthcare and government sectors. What are the implications for public cloud adoption in 2015 and beyond? TOP BLOCKERS TO CLOUD ADOPTION LARGE BREACHES ARE DOMINATING THE HEADLINES AND CAUSING CONCERNS FOR THOSE PLANNING LARGE CLOUD DEPLOYMENTS 63% 38% SECURITY CONSIDERATIONS AROUND THE DATA' PRIVACY REGULATION PREVENTS DATA FROM BEING PHYSICALLY STORED OFF-SITE 3245 5467 5789 2789 (123) 567-9102 NASDAQ RETAIL FINANCIAL HEALTHCARE GOVERNEMENT 64,668,672 1,182,492 7,787,832 6,473,879 RECORDS BREACHED IN 2014 RECORDS BREACHED IN 2014 RECORDS BREACHED IN 20142 RECORDS BREACHED IN 2014 NASDAQ US POST OFFICE, STATE TARGET, HOME DEPOT, NEIMAN MARCUS, DAIRY QUEEN COMMUNITY HEALTH SYSTEMS DEPARTMENT CLOUD SECURITY'S SILVER LINING IN 2015? CLOUD ACCESS SECURITY BROKERS Gartner's recent Infrastructure Protection report indicates that Cloud Access Security Brokers (CASBS) will play a larger role in helping enforce security policies based upon what they consider to be the four key pillars of complete cloud security: visibility, compliance, data security and threat prevention. With companies wanting to more aggressively put business-critical enterprise functions in the cloud in the coming years, CASBS serve as on premise or hosted software that acts as a control point to secure cloud services, generally offering a range of capabilities including encryption, tokenization, auditing, data loss prevention (DLP), access control and anomaly detection. 'http://research.gigaom.com/chart/key-blockers-to-adoption-of-the-cloud/ 2 Identity Theft Resource Center O Perspecsys Making the Public Cloud Private

2014 Data Breaches: Impacts on 2015 Cloud Adoption

shared by matthew0011 on Dec 25
189 views
0 shares
0 comments
2014 has become known as the "year of the data breach." There were a number of high-profile breach events in 2014, reinforcing the need for a solid plan to protect sensitive information. How will this...

Publisher

Perspecsys

Category

Business
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size