backlink free directory. site rank

TrustDIR.org » Trusted SEO Web Directory » Ethical SEO » Better Traffic » Higher Sales

 

 

 

Top Hits       Articles & Tutorials       WEB SEO Directory Statistics       Latest Websites       Suggest Article  

Article Home » Computers » Security



Beyond the Hype The Hard Data on Enterprise Cloud Usage

Submitted on: Thu, 10 Oct 2013 01:47:54Views: 200
How pervasive is the use of cloud services? What are the most widely used file sharing services? Which widely used cloud services present the greatest risk to my organization? Is the adoption of cloud services rampant among companies like mine or is it primarily a Silicon Valley phenomenon?

These are a sample of questions we hear every day from companies of all sizes and across all industries and the raison d’être of the 2013 Cloud Adoption & Risk Report.

Questions that Need Answers

The 2013 Cloud Adoption & Risk Report answers these questions and many more based on cloud service usage data analyzed from more than 3 million users. To be clear, these are not survey response or self-reported numbers provided by cloud service providers looking to inflate their adoption stats. This is real data that provides insight on real users. The report is also the first to analyze not only the actual use of 2,204 cloud services, but also the security risks to the organization from the use of these cloud services.

Sample Findings

I’ve listed just a few sample findings here so make sure to take a look at the infographic below and download the full graphical report to get all the data.

Cloud is the New Wild Wild West

Usage data shows broad and rampant use of cloud services. 2,204 cloud services are in use by more than 3 million users. Most surprising, perhaps, is the average number of Cloud Security Services in use by an organization – 545.

We are making decisions based on what’s known, not based on what’s risky.

Low-risk services are blocked 40% more than high-risk services. To give you a specific example, Box (a low-risk file sharing service) was blocked 35% of the time whereas RapidGator (a high-risk file sharing service) was blocked only 1% of the time.

Cloud-based code repositories become mainstream.

Microsoft Developer Network is #1, but open source is not far behind with GitHub and SourceForge taking #2 and #3 respectively. The shift to open source code repositories presents security challenges as some sites are known to host malicious backdoors.

Too early to count Microsoft out.

The software giant dominates in the collaboration category with Office 365, Skype, and Yammer all among the top 10 collaboration services used. SkyDrive is the 3rd most widely used file sharing service.

File Sharing is a free-for-all.

19 file sharing cloud services are used by an organization on average, which impedes collaboration and increases security and compliance risks. Among the top 10 most widely used file sharing services, 4 are high-risk.


Skyhigh Networks, the cloud access security company, enables companies to embrace Cloud Security Software Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a “Cool Vendor” by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com or follow us on Twitter @skyhighnetworks. s.com or follow us on Twitter @skyhighnetworks.

» Latest news on : Security
» Google News for: Beyond the Hype The Hard Data on Enterprise Cloud Usage

Lates tweets about Computers / Security

From @BuyLocalNorfolk on Tue Feb 20 10:41:57 EST 2018
RT @CustomisedStaff: We like to rigorous test products before introducing them to customers. Smart locks by @YaleRealLiving installed by @…
From @lovepepperh on Tue Feb 20 10:41:57 EST 2018
RT @realDonaldTrump: A woman I don’t know and, to the best of my knowledge, never met, is on the FRONT PAGE of the Fake News Washington Pos…
From @Rhetticent on Tue Feb 20 10:41:57 EST 2018
RT @CharlieDaniels: If America ever falls it will not be an outside power or more powerful nation, there is no such thing. It will be the t…
From @Masada1948 on Tue Feb 20 10:41:56 EST 2018
RT @dannydanon: We're getting ready for a special @UN Security Council meeting with Palestinian leader Mahmoud Abbas. As always, we will s…
From @tinbender2 on Tue Feb 20 10:41:56 EST 2018
RT @realDonaldTrump: A woman I don’t know and, to the best of my knowledge, never met, is on the FRONT PAGE of the Fake News Washington Pos…
From @silent_plzzzz on Tue Feb 20 10:41:56 EST 2018
RT @gabeeno: His name is Gul Zarin from Tehsil Kabal, Swat. Security forces took his son 9 years back. Since then he does not know anything…
From @realllz on Tue Feb 20 10:41:56 EST 2018
RT @TeamPelosi: FACT: the #GOPTaxScam delivers $1.3 trillion to corporate America. Also a FACT: the #TrumpBudget cuts Medicare by $500 bi…
From @teokee on Tue Feb 20 10:41:56 EST 2018
RT @realDonaldTrump: A woman I don’t know and, to the best of my knowledge, never met, is on the FRONT PAGE of the Fake News Washington Pos…
From @DeirdreWassell on Tue Feb 20 10:41:56 EST 2018
Make it real at #DellTechWorld. Discover the @DellTech ecosystem of IT infrastructure, applications, devices and se… https://t.co/jVAEtWz5Jz
From @danielwje on Tue Feb 20 10:41:55 EST 2018
@Gatwick_Airport Why do you insist on merging your premium security and regular security lines at peak times in LGW… https://t.co/DPf9YqTXii
Copyright © 2008 - 2011     VIC Consulting - WEB Development, website promotion & SEO services
Autos neuves et usagées | Ottawa used cars, furniture & real estate | Toronto Computers Security
Follow webseodirectory on Twitter