Beyond the Hype The Hard Data on Enterprise Cloud Usage
|Submitted on: Thu, 10 Oct 2013 01:47:54||Views: 257|
How pervasive is the use of cloud services? What are the most widely used file sharing services? Which widely used cloud services present the greatest risk to my organization? Is the adoption of cloud services rampant among companies like mine or is it primarily a Silicon Valley phenomenon?
These are a sample of questions we hear every day from companies of all sizes and across all industries and the raison dâÃªtre of the 2013 Cloud Adoption & Risk Report.
Questions that Need Answers
The 2013 Cloud Adoption & Risk Report answers these questions and many more based on cloud service usage data analyzed from more than 3 million users. To be clear, these are not survey response or self-reported numbers provided by cloud service providers looking to inflate their adoption stats. This is real data that provides insight on real users. The report is also the first to analyze not only the actual use of 2,204 cloud services, but also the security risks to the organization from the use of these cloud services.
Iâve listed just a few sample findings here so make sure to take a look at the infographic below and download the full graphical report to get all the data.
Cloud is the New Wild Wild West
Usage data shows broad and rampant use of cloud services. 2,204 cloud services are in use by more than 3 million users. Most surprising, perhaps, is the average number of Cloud Security Services in use by an organization â 545.
We are making decisions based on whatâs known, not based on whatâs risky.
Low-risk services are blocked 40% more than high-risk services. To give you a specific example, Box (a low-risk file sharing service) was blocked 35% of the time whereas RapidGator (a high-risk file sharing service) was blocked only 1% of the time.
Cloud-based code repositories become mainstream.
Microsoft Developer Network is #1, but open source is not far behind with GitHub and SourceForge taking #2 and #3 respectively. The shift to open source code repositories presents security challenges as some sites are known to host malicious backdoors.
Too early to count Microsoft out.
The software giant dominates in the collaboration category with Office 365, Skype, and Yammer all among the top 10 collaboration services used. SkyDrive is the 3rd most widely used file sharing service.
File Sharing is a free-for-all.
19 file sharing cloud services are used by an organization on average, which impedes collaboration and increases security and compliance risks. Among the top 10 most widely used file sharing services, 4 are high-risk.
Skyhigh Networks, the cloud access security company, enables companies to embrace Cloud Security Software Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a âCool Vendorâ by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com or follow us on Twitter @skyhighnetworks. s.com or follow us on Twitter @skyhighnetworks.
» Latest news on : Security
» Google News for: Beyond the Hype The Hard Data on Enterprise Cloud Usage
Lates tweets about Computers / Security
From @Jacque2700 on Sat Feb 16 03:38:49 EST 2019|
RT @UKMoments: Dozens of Indian paramilitary men are killed as militants attack their convoy with an explosive-laden vehicle in what is bei…
From @HanifAhmadzai on Sat Feb 16 03:38:48 EST 2019
RT @ARG_AFG: Secretary of State for Defense of UK @GavinWilliamson met with President @ashrafghani in the sidelines of #MSC2019. They discu…
From @radhikamadhu on Sat Feb 16 03:38:48 EST 2019
RT @mitalisaran: Surely we should be trying to get to the bottom of why there have been 1,708 terrorist attacks in J&K in the last four yea…
From @MelindaMazoue on Sat Feb 16 03:38:48 EST 2019
RT @ABC: Instead of supporting his claim of an "invasion," the numbers from Pres. Trump's own Department of Homeland Security show that ill…
From @fnordland on Sat Feb 16 03:38:47 EST 2019
RT @BleepinComputer: 18,000 Android Apps Track Users by Violating Advertising ID Policies - by @serghei
From @vboken888 on Sat Feb 16 03:38:47 EST 2019
RT @IsraeliPM: To my dear friend, Prime Minister of India @narendramodi, we stand with you, the security forces and the people of India fol…
From @EmilsonNunesCo2 on Sat Feb 16 03:38:47 EST 2019
RT @SecPompeo: The U.S. condemns yesterday’s horrific terror attack on Indian security forces. My thoughts and prayers are with the victims…
From @JohnLowe56 on Sat Feb 16 03:38:47 EST 2019
@OldLondonW14 Is that Bromyard? (I dare say does not exist now, used to be Uxbridge Road, just before Acton becomes… https://t.co/iMAnvsgfJa
From @afolatunji on Sat Feb 16 03:38:46 EST 2019
@WOkene I just hope you will understand what should be normal procedures when doing things,policemen shooting in th… https://t.co/5KScbZ9uvV
From @JyotiR_Dash on Sat Feb 16 03:38:46 EST 2019
RT @RanaAyyub: It is time to mourn and grieve but this tragedy also calls for introspection. The last couple of years our national security…
Copyright © 2008 - 2011 VIC Consulting - WEB Development, website promotion & SEO services
Autos neuves et usagées |
Ottawa used cars, furniture & real estate |
Toronto Computers Security