SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
CLOUD ADOPTION
& RISK IN EUROPE
REPORT
Q2 2015 Published Q3 2015
Cloud Adoption and Risk in Europe Report – Q2 2015
TABLE OF CONTENTS
INTRODUCTION
OVERVIEW OF CLOUD ADOPTION
INSIDER THREATS IN THE CLOUD
COMPROMISED CREDENTIALS
MULTI-FACTOR AUTHENTICATION
THERE’S NO TYPICAL USER
HEAD IN THE CLOUDS
SAFE STORAGE FOR EUROPEAN DATA
THE CLOUD NEVER SLEEPS
THE TOP CLOUD SERVICES
05
06
03
01
09
07
11
12
13
08
Cloud Adoption and Risk in Europe Report – Q2 2015
INTRODUCTION
01
1
http://www.cio.com/article/2929806/cloud-computing/the-cloud-s-game-changer-is-competitive-advantage.html
2
http://www.businesscloudnews.com/2015/05/12/cloud-adoption-nudges-past-80-per-cent-in-the-uk-survey/
3
http://www.bitkom.org/de/presse/81149_80724.aspx
4
5
http://www.v3.co.uk/v3-uk/news/2405608/g-cloud-sales-pass-gbp550m-mark
6
7
https://www.skyhighnetworks.com/cloud-security-blog/gartner-companies-spend-just-3-8-of-cloud-budgets-on-security
“The biggest impact of the cloud is the ability to accelerate the rate of innovation for the
business,” says Frank Gens, senior vice president and chief analyst at IDC1
. This is as true
in Europe as anywhere else in the world.
Cloud computing continues to grow in Europe, with a recent survey2
of UK-based IT
decision-makers showing that 84% are using cloud services today and most expect cloud
adoption to continue to grow. The German IT association BITKOM quoted growth in
enterprise cloud of 46% to 6.4B Euros in the last year3
and in Sweden currently 64% of
enterprise data is hosted in the cloud with an expectation that this will grow to 93% within
two years4
. This is not just a business phenomenon either, with the UK government
G-Cloud platform showing sales of over £500M by March 20155
.
Given the focus on winning enterprises as customers, cloud service providers (CSPs) are
increasing their investments to support industry security standards. At Skyhigh, we believe
this is important for enterprises to securely embrace the cloud. However only 2.8% of the
CSPs in our global cloud registry have achieved ISO 27001 compliance, and so far only two
vendors (Microsoft and Dropbox) have announced that they have achieved the relatively
new ISO 27018 code of practice for personal data protection in public clouds. With the
daily arrival of new services that lackproper certifications, the overall percentage of CSPs
with ISO certification is declining.
European regulators are also taking ever-stronger attitudes to data loss and unfortunately,
cloud is one of the possible conduits for data exfiltration. Our data shows that on
initial review, IT is generally aware of less than 10% of the services in use inside their
organisations and Gartner quotes that companies spend just 3.8% of their cloud budget
on security7
.
Cloud Adoption and Risk in Europe Report – Q2 2015
To better understand these trends and the risks in cloud adoption, Skyhigh publishes this
Cloud Adoption & Risk in Europe report.
What makes this report unique is that it’s based on actual usage data for over 2.5 million
employees in European organizations, rather than surveys that ask people to self-
report their behavior. In this quarter’s report, we explore insider threats within these
organizations and expose a worldwide black market of stolen login credentials that cyber
criminals use to gain access to sensitive information in cloud services. We also detail the
Top 20 enterprise and consumer cloud services in Europe, the top cloud services used to
connect with partners, and how prolific one employee can be in terms of cloud usage and
high-risk behavior.
02
Cloud Adoption and Risk in Europe Report – Q2 2015
The average European organization uses 987 cloud services, an impresive growth of
61% over the same quarter a year ago, casting aside doubt that cloud use is mainstream
throughout Europe. Another way of looking at this is that the average company is adding
more than one new cloud service per day, reminding us that this is a rapidly changing
market and the IT department needs constant updates to be able to manage both shadow
and sanctioned cloud adoption. The average European organization uploads 12.3 TB to
the cloud each month, an amount equal to around 7.6 million copies of War and Peace in
digital form (at 1.7 MB per copy).
When employees bring cloud services into the work environment for increased
productivity and efficiency without the knowledge or approval of IT, they may not
realize the risk they’re introducing to the organization. Just 7.0% of cloud services meet
enterprise security and compliance requirements, as rated by Skyhigh’s CloudTrust
Program. Only 15.4% support multi-factor authentication, 2.8% have ISO 27001
certification, and 9.4% encrypt data stored at rest. Considering how much data European
organizations upload to the cloud each month without proper controls, this data could be
at risk for exfiltration.
03
AVERAGE NUMBER OF
CLOUD SERVICES
IN USE BY EUROPEAN ORGANIZATIONS
2014 Q1 2014 Q42014 Q2 2014 Q3 2015 Q1
724
782
614588
805
2015 Q2
987
OVERVIEW OF CLOUD ADOPTION
Cloud Adoption and Risk in Europe Report – Q2 2015
03
-
nization uses far fewer services, it is worth noting that the minimum number of services we have
seen in Europe is 507, from a company with less than 200 employees; while the highest number
of services we have seen in Europe is greater than 3,000.
Of the 987 cloud services in use by the average European organization, the most popular cate-
gory is collaboration with 226 cloud services. This category includes services such as Microsoft
services per organization (e.g. SourceForge, GitHub, etc.), content sharing with 54 services (e.g.
with 38 services (Dropbox, Google Drive, etc.).
04
The average organization in Europe uses
many cloud services in each category
Business intelligence
Collaboration
Content sharing
Development
File sharing
Social media
Tracking
21
226
54
80
38
49
34
Cloud Adoption and Risk in Europe Report – Q2 2015
04
A cloud service may be secure, but employees can still use it in risky ways. While Edward
Snowden is the most well-known example of an insider threat, most insider threat incidents are
quiet and may not be uncovered by the company at the time, if at all. Consider the example of
a salesperson that leaves a company knowingly or unknowingly with customer contact informa-
tion when he or she decides to change employers. In many cases, the organization has no easy
way to detect this type of behavior.
We surveyed organizations in partnership with the Cloud Security Alliance and found that just
18% of organizations knew of an insider threat incident in the last year. However, examining
actual anomaly detection data collected across European users, we found that 87% of organiza-
tions had behavior indicative of an insider threat in the last quarter alone. While not all of these
events turn out to be malicious activity, the incidence of potentially destructive behavior by
employees is much higher than most European organizations realize.
05
of European companies
surveyed reported an
insider threat incident in
the last year
Just 18%
Have you had an
INSIDER THREAT
INCIDENT?
of European companies had
behavior indicative of an
insider threat in the last
quarter alone
But 87%
perception reality
87%
YES
NO 63%
NOT SURE 19%
YES 18%
INSIDER THREATS IN THE CLOUD
Cloud Adoption and Risk in Europe Report – Q2 2015
05
There were more software vulnerabilities discovered and more data breaches in 2014 than any
year on record. Following one of the largest breaches of the year, eBay prompted 145 million
users to change their passwords after cyber criminals compromised their account credentials.
University of Cambridge shows that 31% of passwords are re-used in multiple places. With the
We found that 72.1% of European organizations have exposure to compromised credentials.
While this number is lower than the overall average of 91.7% across the globe, even more
concerning is that 8.5% of employees at European companies have at least one compromised
this capability, we recommend European organizations use strong, unique passwords for each
cloud service and change them regularly to limit exposure to compromised credentials.
06
of European companies have at least
one employee whose credentials are
compromised
of employees at European
companies have at least one
credential compromised
72.1% 8.5%
The darknet is home to
millions of compromised passwords
COMPROMISED CREDENTIALS
Cloud Adoption and Risk in Europe Report – Q2 2015
06
The Lastpass data breach, which occurred in June 2015, brought to light the importance and
only have to KNOW something (a name and password), but also have to HAVE something (a
token or more commonly pre-authenticated a mobile device) to gain access to an account. Any
loss of just a name and password is less of a concern as multi-factor authentication requires
that any criminal will also need to get hold of, or spoof, an additional device before accessing
the compromised service.
We strongly recommend that enterprises consider multi-factor authentication as a key
component of safe cloud services. Currently only 15.4% of the 12,000+ cloud services support
multi-factor authentication, we hope that this will increase in time.
07
SUPPORT FOR
MULTI-FACTOR
AUTHENTICATION
REMAINS LOW
84.6%Not Supported
15.4%
Supported
MULTI-FACTOR AUTHENTICATION
Cloud Adoption and Risk in Europe Report – Q2 2015
07
cloud services used by 175 users to determine whether people had the same or similar
patterns of usage.
What we found is that not all users have the same patterns, and that there are 31 possible
accessed it and 25 of the 31 possible combinations were regularly in use. Our results show
of the services. This goes to show that you can’t assume or predict how your users will use
services your users need.
08
CLOUD USAGE
IS NOT UNIFORM
ACROSS USERS
Box
1
5
6
3
7
3
14
9
3
4
9
8 6
12
8
11
7
4
3
6
4
1
2
26
2
Office 365
Google Drive
Dropbox
Salesforce
THERE’S NO TYPICAL USER
Cloud Adoption and Risk in Europe Report – Q2 2015
08
The average European employee uses 23 distinct cloud services including seven
collaboration services, four file-sharing services, three social media services, and three
content sharing services. What’s troubling is that each employee is tracked by, on average,
four marketing analytics and advertising services. These services are used to deliver
targeted ads to users across the Internet, but they are also increasingly used by cyber
criminals to determine the sites employees frequent most. Armed with this information,
criminals attempt to compromise these sites in order to ultimately compromise the
organization in what’s known as a watering hole attack.
However, there are employees whose cloud usage is even more prolific. The most
prolific cloud user across all European employees in our study uses an impressive 594
cloud services, including 101 collaboration services, 38 development services, 38 IT
management services, and 22 content sharing services. While their behavior may be
done with good intensions, unchecked cloud usage can also expose European
organizations to risk.
09
THE MOST PROLIFIC
CLOUD USER in Europe
At work this employee uses
594 cloud services
CONTENT SHARING
25
IT MANAGEMENT
31
38 DEVELOPMENT
101COLLABORATION 17.8%HIGH-RISK SERVICES
5.6%INDUSTRY AVERAGE
HEAD IN THE CLOUDS
Cloud Adoption and Risk in Europe Report – Q2 2015
09
10
Chances are, most of the services in use by this individual are not known by the IT
department. Out of the 594 services, 106 are high-risk, compared to 5.6% across all
cloud services globally. These services are often considered high-risk because they lack
security controls, have onerous terms and conditions that claim ownership of uploaded
data, or are hosted in high-risk countries without strong data protections. Among the
high-risk services in use by this cloud collector are CodeHaus, a service that is used to
store source code, DiffNow, a service used to highlight differences between 2 files, and
DocumentCloud, a service used to share text documents like contracts.
Cloud Adoption and Risk in Europe Report – Q2 2015 11
The European Union (EU) has taken a lead in data privacy since 1995 and every EU
member country country has a regime that defines data protection legislation for the
country. The EU is also strengthening the existing laws with expectations of a new Data
Protection Regulation being agreed upon by the end of 2015.
One of the areas covered by the existing directive and new regulation is where data on
European individuals can be transferred. Except in exceptional circumstances, data on
individuals should stay in Europe, the European Economic Area, within countries with
“equivalent data privacy regulations” or within U.S. services that have signed up for the
U.S. government’s Safe Harbor agreement.
Skyhigh’s global cloud registry tracks over 12,000 cloud services. We found that 14.3%
of cloud providers store data inside the EU, 3.6% are in countries with equivalent
data protection and 17.1% are U.S.-hosted and have signed up for the Safe Harbor
regulations—this means that 64.9% are not safe for EU data. While the gap between
European data privacy requirements and the reality of cloud services in use today is
substantial, it is shrinking. In Q4 of 2014, 74.3% of services were not suitable to host
EU data.
SAFE STORAGE FOR EUROPEAN DATA
Hosted in country with
equivalent privacy3.6%
US hosted with Safe Harbor
17.2%
14.3% Hosted in the EU
64.9% Cloud Services that
should not hold EU Data
European companies are using many
cloud services that do not meet data
residency requirements
A Safe Place for EU Personal Data
Cloud Adoption and Risk in Europe Report – Q2 2015
THE CLOUD NEVER SLEEPS
Flexible working has probably been one of the significant changes in the last decade,
balancing home life and work life to the benefit of both the employee and employer.
One aspect of this is the amount of work being conducted during what would normally
be considered weekends. We analyzed usage by day of the week and found European
employees are most prolific in cloud usage on Fridays, while cloud usage for their
American counterparts peaks on Tuesdays and declines the remainder of the week.
However, weekend usage did not fully drop to zero, reminding IT departments that
there may be risks happening around the clock; as risk to the organization doesn’t
stop for the weekend.
12
Mon. Tues. Wed. Thurs. Fri. Sat. Sun.
Cloud Usage by Day of Week
Percentage of cloud usage for each day of the week
14.6%
18.4%
15.0%
18.0%
19.5%
6.8%
7.8%
Cloud Adoption and Risk in Europe Report – Q2 2015
From the perspective of a software company, developing a cloud service is very different
from software installed by the customer. The cloud has freed developers to reimagine
enterprise software with delightful user experiences, innovative new features, and access
from mobile devices. With faster release cycles and updates that occur immediately
across all customers, cloud applications are not only more cost effective to manage,
they’re often first to market with innovative features. That’s why an increasing number
of European organizations are deploying the top enterprise cloud services – not because
they’re the best cloud version available but because they are the best software available,
period. That’s also why we wanted to look at the top services based on user count.
13
THE TOP CLOUD SERVICES
TOP 20
ENTERPRISE
CLOUD
SERVICES
1. Microsoft Office 365
2. Salesforce
3. Oracle RightNow
4. Cisco Webex
5. ServiceNow
6. Oracle Taleo
7. Box
8. Jive
9. Concur
10. Zendesk
11. Workday
12. ADP
13. SAP Human Capital
Management
14. SAS OnDemand
15. SuccessFactors
16. Yammer
17. GoToMeeting
18. Blue Jeans
19. NetSuite
20t. OpenText BPM
in Europe
Cloud Adoption and Risk in Europe Report – Q2 2015
Consumer-grade cloud services today are so good that they can easily rival enterprise
software. It’s no wonder then, that employees bring cloud services to work in order to do
their jobs better. However, these services can also increase organizational risk. In order to
exfiltrate sensitive data undetected, cyber criminals deploy an array of sophisticated kill
chains that leverage consumer cloud services. Skyhigh has detected attacks using Twitter
to exfiltrate data 140 characters at a time and another that encoded stolen data into
videos that were uploaded to YouTube.
14
TOP 20
CONSUMER
CLOUD
SERVICES
1. Facebook
2. Linkedin
3. Flickr
4. YouTube
5. Twitter
6. Dropbox
7. Pinterest
8. Gmail
9. Vimeo
10. StumbleUpon
11. Tumblr
12. Instagram
13. Google Drive
14. Yahoo! Mail
15. VK
16. SlideShare
17. Spotify
18. Evernote
19. Skype
20. Xing
at work
in Europe
Cloud Adoption and Risk in Europe Report – Q2 2015
ABOUT SKYHIGH NETWORKS
Skyhigh Networks, the cloud security and enablement company, helps enterprises
safely adopt cloud services while meeting their security, compliance, and governance
requirements. Over 400 enterprises including Aetna, Cisco, DIRECTV, HP, and Western
Union use Skyhigh to gain visibility into all cloud services in use and their associated
risk; analyze cloud usage to identify security breaches, compromised accounts, and
insider threats; and seamlessly enforce security policies with encryption, data loss
prevention, contextual access control, and activity monitoring. Headquartered in
Campbell, Calif., Skyhigh Networks is backed by Greylock Partners, Sequoia Capital,
and Salesforce.com. For more information, visit us at www.skyhighnetworks.com,
and follow us on Twitter @skyhighnetworks.
15
REQUEST COMPLIMENTARY
CLOUD AUDIT
“With Skyhigh we
discovered a wide
range of services,
allowing us to
understand their
associated risks
and put in place
policies to protect
corporate data.”
Steve Martino
VP Information Security
If you’d like to learn the
scope of Shadow IT at your
company, including detailed
statistics profiled in this
report, sign up for a
complimentary cloud audit
bit.ly/ComplimentaryCloudAudit
UNCOVER SHADOW IT

Mais conteúdo relacionado

Mais procurados

UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013Martin Jordan
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research TechSci Research
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012Charmaine Servado
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerDigital Transformation EXPO Event Series
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Reportaccenture
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationCloudLock
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Topsec Technology
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...Symantec
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
GFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetGFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetAndre Muscat
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityRow Murray
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them SrikanthRaju7
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCigniti Technologies Ltd
 
Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009mattdriscoll
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSPaul Walsh
 

Mais procurados (20)

UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
GFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetGFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business Datasheet
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
 
Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 

Semelhante a CLOUD ADOPTION TRENDS

Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Cloud Reality Check 2015 - NTT Communications
Cloud Reality Check 2015 - NTT CommunicationsCloud Reality Check 2015 - NTT Communications
Cloud Reality Check 2015 - NTT CommunicationsRob Steggles
 
Preparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights sharedPreparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights sharedThe Economist Media Businesses
 
Economist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation CloudEconomist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation CloudHitachi Vantara
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeCapgemini
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19The Quarantine Report: Cybersecurity Impact Assessment for COVID-19
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19Alex Smirnoff
 
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...Black Duck by Synopsys
 
Ascending cloud: The adoption of cloud computing in five industries
Ascending cloud: The adoption of cloud computing in five industriesAscending cloud: The adoption of cloud computing in five industries
Ascending cloud: The adoption of cloud computing in five industriesThe Economist Media Businesses
 
Application usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countriesApplication usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countriesHe Hariyadi
 
Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security reportGabe Akisanmi
 
KPN Ventures research series: cyber security investment landscape
KPN Ventures research series: cyber security investment landscapeKPN Ventures research series: cyber security investment landscape
KPN Ventures research series: cyber security investment landscapeHerman Kienhuis
 
KPN Ventures Research Series: Cyber Security Investment Landscape
KPN Ventures Research Series: Cyber Security Investment LandscapeKPN Ventures Research Series: Cyber Security Investment Landscape
KPN Ventures Research Series: Cyber Security Investment Landscapekpnventures
 
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Black Duck by Synopsys
 

Semelhante a CLOUD ADOPTION TRENDS (20)

Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Cloud Reality Check 2015 - NTT Communications
Cloud Reality Check 2015 - NTT CommunicationsCloud Reality Check 2015 - NTT Communications
Cloud Reality Check 2015 - NTT Communications
 
Preparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights sharedPreparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights shared
 
Economist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation CloudEconomist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation Cloud
 
The New Style of Business
The New Style of Business The New Style of Business
The New Style of Business
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Presentation gdl
Presentation gdlPresentation gdl
Presentation gdl
 
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19The Quarantine Report: Cybersecurity Impact Assessment for COVID-19
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19
 
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
 
Ascending cloud: The adoption of cloud computing in five industries
Ascending cloud: The adoption of cloud computing in five industriesAscending cloud: The adoption of cloud computing in five industries
Ascending cloud: The adoption of cloud computing in five industries
 
Application usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countriesApplication usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countries
 
Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security report
 
KPN Ventures research series: cyber security investment landscape
KPN Ventures research series: cyber security investment landscapeKPN Ventures research series: cyber security investment landscape
KPN Ventures research series: cyber security investment landscape
 
KPN Ventures Research Series: Cyber Security Investment Landscape
KPN Ventures Research Series: Cyber Security Investment LandscapeKPN Ventures Research Series: Cyber Security Investment Landscape
KPN Ventures Research Series: Cyber Security Investment Landscape
 
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
 

Mais de Prayukth K V

IoT and OT Threat Landscape Report 2023
IoT and OT Threat Landscape Report 2023IoT and OT Threat Landscape Report 2023
IoT and OT Threat Landscape Report 2023Prayukth K V
 
Marketing niche tech
Marketing niche techMarketing niche tech
Marketing niche techPrayukth K V
 
State of the internet of things (IoT) market 2016 edition
State of the internet of things (IoT) market 2016 editionState of the internet of things (IoT) market 2016 edition
State of the internet of things (IoT) market 2016 editionPrayukth K V
 
Architecture for India's Smart Cities project
Architecture for India's Smart Cities projectArchitecture for India's Smart Cities project
Architecture for India's Smart Cities projectPrayukth K V
 
Top global Fintech start-ups 2015-16
Top global Fintech start-ups 2015-16Top global Fintech start-ups 2015-16
Top global Fintech start-ups 2015-16Prayukth K V
 
Social media marketing planning guide for 2016
Social media marketing planning guide for 2016Social media marketing planning guide for 2016
Social media marketing planning guide for 2016Prayukth K V
 
State of marketing leadership 2015
State of marketing leadership 2015State of marketing leadership 2015
State of marketing leadership 2015Prayukth K V
 
Drones and the Internet of Things: realising the potential of airborne comput...
Drones and the Internet of Things: realising the potential of airborne comput...Drones and the Internet of Things: realising the potential of airborne comput...
Drones and the Internet of Things: realising the potential of airborne comput...Prayukth K V
 
India's draft Internet of Things -policy
India's draft Internet of Things -policyIndia's draft Internet of Things -policy
India's draft Internet of Things -policyPrayukth K V
 
All about the HP split
All about the HP splitAll about the HP split
All about the HP splitPrayukth K V
 
CRM predicts and forecast 2018
CRM predicts and forecast 2018CRM predicts and forecast 2018
CRM predicts and forecast 2018Prayukth K V
 
Aviation industry IT trends 2015
Aviation industry IT trends 2015Aviation industry IT trends 2015
Aviation industry IT trends 2015Prayukth K V
 
Finnish software industry survey - 2015
Finnish software industry survey - 2015Finnish software industry survey - 2015
Finnish software industry survey - 2015Prayukth K V
 
How the internet of things is shaping up
How the internet of things is shaping upHow the internet of things is shaping up
How the internet of things is shaping upPrayukth K V
 
Evolving a wearables marketing strategy in 2015
Evolving a wearables marketing strategy in 2015Evolving a wearables marketing strategy in 2015
Evolving a wearables marketing strategy in 2015Prayukth K V
 
Leadership lessons for 2015
Leadership lessons for 2015Leadership lessons for 2015
Leadership lessons for 2015Prayukth K V
 
Linkedin Vs Facebook
Linkedin Vs FacebookLinkedin Vs Facebook
Linkedin Vs FacebookPrayukth K V
 
Social Media Stats 2015
Social Media Stats 2015Social Media Stats 2015
Social Media Stats 2015Prayukth K V
 
Internet of things - Future of energy and utilities
Internet of things - Future of energy and utilitiesInternet of things - Future of energy and utilities
Internet of things - Future of energy and utilitiesPrayukth K V
 

Mais de Prayukth K V (20)

IoT and OT Threat Landscape Report 2023
IoT and OT Threat Landscape Report 2023IoT and OT Threat Landscape Report 2023
IoT and OT Threat Landscape Report 2023
 
Marketing niche tech
Marketing niche techMarketing niche tech
Marketing niche tech
 
State of the internet of things (IoT) market 2016 edition
State of the internet of things (IoT) market 2016 editionState of the internet of things (IoT) market 2016 edition
State of the internet of things (IoT) market 2016 edition
 
Architecture for India's Smart Cities project
Architecture for India's Smart Cities projectArchitecture for India's Smart Cities project
Architecture for India's Smart Cities project
 
Top global Fintech start-ups 2015-16
Top global Fintech start-ups 2015-16Top global Fintech start-ups 2015-16
Top global Fintech start-ups 2015-16
 
Social media marketing planning guide for 2016
Social media marketing planning guide for 2016Social media marketing planning guide for 2016
Social media marketing planning guide for 2016
 
State of marketing leadership 2015
State of marketing leadership 2015State of marketing leadership 2015
State of marketing leadership 2015
 
Drones and the Internet of Things: realising the potential of airborne comput...
Drones and the Internet of Things: realising the potential of airborne comput...Drones and the Internet of Things: realising the potential of airborne comput...
Drones and the Internet of Things: realising the potential of airborne comput...
 
India's draft Internet of Things -policy
India's draft Internet of Things -policyIndia's draft Internet of Things -policy
India's draft Internet of Things -policy
 
All about the HP split
All about the HP splitAll about the HP split
All about the HP split
 
CRM predicts and forecast 2018
CRM predicts and forecast 2018CRM predicts and forecast 2018
CRM predicts and forecast 2018
 
Aviation industry IT trends 2015
Aviation industry IT trends 2015Aviation industry IT trends 2015
Aviation industry IT trends 2015
 
Finnish software industry survey - 2015
Finnish software industry survey - 2015Finnish software industry survey - 2015
Finnish software industry survey - 2015
 
How the internet of things is shaping up
How the internet of things is shaping upHow the internet of things is shaping up
How the internet of things is shaping up
 
Evolving a wearables marketing strategy in 2015
Evolving a wearables marketing strategy in 2015Evolving a wearables marketing strategy in 2015
Evolving a wearables marketing strategy in 2015
 
Leadership lessons for 2015
Leadership lessons for 2015Leadership lessons for 2015
Leadership lessons for 2015
 
Linkedin Vs Facebook
Linkedin Vs FacebookLinkedin Vs Facebook
Linkedin Vs Facebook
 
Smart cities 2020
Smart cities 2020Smart cities 2020
Smart cities 2020
 
Social Media Stats 2015
Social Media Stats 2015Social Media Stats 2015
Social Media Stats 2015
 
Internet of things - Future of energy and utilities
Internet of things - Future of energy and utilitiesInternet of things - Future of energy and utilities
Internet of things - Future of energy and utilities
 

Último

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Último (20)

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

CLOUD ADOPTION TRENDS

  • 1. CLOUD ADOPTION & RISK IN EUROPE REPORT Q2 2015 Published Q3 2015
  • 2. Cloud Adoption and Risk in Europe Report – Q2 2015 TABLE OF CONTENTS INTRODUCTION OVERVIEW OF CLOUD ADOPTION INSIDER THREATS IN THE CLOUD COMPROMISED CREDENTIALS MULTI-FACTOR AUTHENTICATION THERE’S NO TYPICAL USER HEAD IN THE CLOUDS SAFE STORAGE FOR EUROPEAN DATA THE CLOUD NEVER SLEEPS THE TOP CLOUD SERVICES 05 06 03 01 09 07 11 12 13 08
  • 3. Cloud Adoption and Risk in Europe Report – Q2 2015 INTRODUCTION 01 1 http://www.cio.com/article/2929806/cloud-computing/the-cloud-s-game-changer-is-competitive-advantage.html 2 http://www.businesscloudnews.com/2015/05/12/cloud-adoption-nudges-past-80-per-cent-in-the-uk-survey/ 3 http://www.bitkom.org/de/presse/81149_80724.aspx 4 5 http://www.v3.co.uk/v3-uk/news/2405608/g-cloud-sales-pass-gbp550m-mark 6 7 https://www.skyhighnetworks.com/cloud-security-blog/gartner-companies-spend-just-3-8-of-cloud-budgets-on-security “The biggest impact of the cloud is the ability to accelerate the rate of innovation for the business,” says Frank Gens, senior vice president and chief analyst at IDC1 . This is as true in Europe as anywhere else in the world. Cloud computing continues to grow in Europe, with a recent survey2 of UK-based IT decision-makers showing that 84% are using cloud services today and most expect cloud adoption to continue to grow. The German IT association BITKOM quoted growth in enterprise cloud of 46% to 6.4B Euros in the last year3 and in Sweden currently 64% of enterprise data is hosted in the cloud with an expectation that this will grow to 93% within two years4 . This is not just a business phenomenon either, with the UK government G-Cloud platform showing sales of over £500M by March 20155 . Given the focus on winning enterprises as customers, cloud service providers (CSPs) are increasing their investments to support industry security standards. At Skyhigh, we believe this is important for enterprises to securely embrace the cloud. However only 2.8% of the CSPs in our global cloud registry have achieved ISO 27001 compliance, and so far only two vendors (Microsoft and Dropbox) have announced that they have achieved the relatively new ISO 27018 code of practice for personal data protection in public clouds. With the daily arrival of new services that lackproper certifications, the overall percentage of CSPs with ISO certification is declining. European regulators are also taking ever-stronger attitudes to data loss and unfortunately, cloud is one of the possible conduits for data exfiltration. Our data shows that on initial review, IT is generally aware of less than 10% of the services in use inside their organisations and Gartner quotes that companies spend just 3.8% of their cloud budget on security7 .
  • 4. Cloud Adoption and Risk in Europe Report – Q2 2015 To better understand these trends and the risks in cloud adoption, Skyhigh publishes this Cloud Adoption & Risk in Europe report. What makes this report unique is that it’s based on actual usage data for over 2.5 million employees in European organizations, rather than surveys that ask people to self- report their behavior. In this quarter’s report, we explore insider threats within these organizations and expose a worldwide black market of stolen login credentials that cyber criminals use to gain access to sensitive information in cloud services. We also detail the Top 20 enterprise and consumer cloud services in Europe, the top cloud services used to connect with partners, and how prolific one employee can be in terms of cloud usage and high-risk behavior. 02
  • 5. Cloud Adoption and Risk in Europe Report – Q2 2015 The average European organization uses 987 cloud services, an impresive growth of 61% over the same quarter a year ago, casting aside doubt that cloud use is mainstream throughout Europe. Another way of looking at this is that the average company is adding more than one new cloud service per day, reminding us that this is a rapidly changing market and the IT department needs constant updates to be able to manage both shadow and sanctioned cloud adoption. The average European organization uploads 12.3 TB to the cloud each month, an amount equal to around 7.6 million copies of War and Peace in digital form (at 1.7 MB per copy). When employees bring cloud services into the work environment for increased productivity and efficiency without the knowledge or approval of IT, they may not realize the risk they’re introducing to the organization. Just 7.0% of cloud services meet enterprise security and compliance requirements, as rated by Skyhigh’s CloudTrust Program. Only 15.4% support multi-factor authentication, 2.8% have ISO 27001 certification, and 9.4% encrypt data stored at rest. Considering how much data European organizations upload to the cloud each month without proper controls, this data could be at risk for exfiltration. 03 AVERAGE NUMBER OF CLOUD SERVICES IN USE BY EUROPEAN ORGANIZATIONS 2014 Q1 2014 Q42014 Q2 2014 Q3 2015 Q1 724 782 614588 805 2015 Q2 987 OVERVIEW OF CLOUD ADOPTION
  • 6. Cloud Adoption and Risk in Europe Report – Q2 2015 03 - nization uses far fewer services, it is worth noting that the minimum number of services we have seen in Europe is 507, from a company with less than 200 employees; while the highest number of services we have seen in Europe is greater than 3,000. Of the 987 cloud services in use by the average European organization, the most popular cate- gory is collaboration with 226 cloud services. This category includes services such as Microsoft services per organization (e.g. SourceForge, GitHub, etc.), content sharing with 54 services (e.g. with 38 services (Dropbox, Google Drive, etc.). 04 The average organization in Europe uses many cloud services in each category Business intelligence Collaboration Content sharing Development File sharing Social media Tracking 21 226 54 80 38 49 34
  • 7. Cloud Adoption and Risk in Europe Report – Q2 2015 04 A cloud service may be secure, but employees can still use it in risky ways. While Edward Snowden is the most well-known example of an insider threat, most insider threat incidents are quiet and may not be uncovered by the company at the time, if at all. Consider the example of a salesperson that leaves a company knowingly or unknowingly with customer contact informa- tion when he or she decides to change employers. In many cases, the organization has no easy way to detect this type of behavior. We surveyed organizations in partnership with the Cloud Security Alliance and found that just 18% of organizations knew of an insider threat incident in the last year. However, examining actual anomaly detection data collected across European users, we found that 87% of organiza- tions had behavior indicative of an insider threat in the last quarter alone. While not all of these events turn out to be malicious activity, the incidence of potentially destructive behavior by employees is much higher than most European organizations realize. 05 of European companies surveyed reported an insider threat incident in the last year Just 18% Have you had an INSIDER THREAT INCIDENT? of European companies had behavior indicative of an insider threat in the last quarter alone But 87% perception reality 87% YES NO 63% NOT SURE 19% YES 18% INSIDER THREATS IN THE CLOUD
  • 8. Cloud Adoption and Risk in Europe Report – Q2 2015 05 There were more software vulnerabilities discovered and more data breaches in 2014 than any year on record. Following one of the largest breaches of the year, eBay prompted 145 million users to change their passwords after cyber criminals compromised their account credentials. University of Cambridge shows that 31% of passwords are re-used in multiple places. With the We found that 72.1% of European organizations have exposure to compromised credentials. While this number is lower than the overall average of 91.7% across the globe, even more concerning is that 8.5% of employees at European companies have at least one compromised this capability, we recommend European organizations use strong, unique passwords for each cloud service and change them regularly to limit exposure to compromised credentials. 06 of European companies have at least one employee whose credentials are compromised of employees at European companies have at least one credential compromised 72.1% 8.5% The darknet is home to millions of compromised passwords COMPROMISED CREDENTIALS
  • 9. Cloud Adoption and Risk in Europe Report – Q2 2015 06 The Lastpass data breach, which occurred in June 2015, brought to light the importance and only have to KNOW something (a name and password), but also have to HAVE something (a token or more commonly pre-authenticated a mobile device) to gain access to an account. Any loss of just a name and password is less of a concern as multi-factor authentication requires that any criminal will also need to get hold of, or spoof, an additional device before accessing the compromised service. We strongly recommend that enterprises consider multi-factor authentication as a key component of safe cloud services. Currently only 15.4% of the 12,000+ cloud services support multi-factor authentication, we hope that this will increase in time. 07 SUPPORT FOR MULTI-FACTOR AUTHENTICATION REMAINS LOW 84.6%Not Supported 15.4% Supported MULTI-FACTOR AUTHENTICATION
  • 10. Cloud Adoption and Risk in Europe Report – Q2 2015 07 cloud services used by 175 users to determine whether people had the same or similar patterns of usage. What we found is that not all users have the same patterns, and that there are 31 possible accessed it and 25 of the 31 possible combinations were regularly in use. Our results show of the services. This goes to show that you can’t assume or predict how your users will use services your users need. 08 CLOUD USAGE IS NOT UNIFORM ACROSS USERS Box 1 5 6 3 7 3 14 9 3 4 9 8 6 12 8 11 7 4 3 6 4 1 2 26 2 Office 365 Google Drive Dropbox Salesforce THERE’S NO TYPICAL USER
  • 11. Cloud Adoption and Risk in Europe Report – Q2 2015 08 The average European employee uses 23 distinct cloud services including seven collaboration services, four file-sharing services, three social media services, and three content sharing services. What’s troubling is that each employee is tracked by, on average, four marketing analytics and advertising services. These services are used to deliver targeted ads to users across the Internet, but they are also increasingly used by cyber criminals to determine the sites employees frequent most. Armed with this information, criminals attempt to compromise these sites in order to ultimately compromise the organization in what’s known as a watering hole attack. However, there are employees whose cloud usage is even more prolific. The most prolific cloud user across all European employees in our study uses an impressive 594 cloud services, including 101 collaboration services, 38 development services, 38 IT management services, and 22 content sharing services. While their behavior may be done with good intensions, unchecked cloud usage can also expose European organizations to risk. 09 THE MOST PROLIFIC CLOUD USER in Europe At work this employee uses 594 cloud services CONTENT SHARING 25 IT MANAGEMENT 31 38 DEVELOPMENT 101COLLABORATION 17.8%HIGH-RISK SERVICES 5.6%INDUSTRY AVERAGE HEAD IN THE CLOUDS
  • 12. Cloud Adoption and Risk in Europe Report – Q2 2015 09 10 Chances are, most of the services in use by this individual are not known by the IT department. Out of the 594 services, 106 are high-risk, compared to 5.6% across all cloud services globally. These services are often considered high-risk because they lack security controls, have onerous terms and conditions that claim ownership of uploaded data, or are hosted in high-risk countries without strong data protections. Among the high-risk services in use by this cloud collector are CodeHaus, a service that is used to store source code, DiffNow, a service used to highlight differences between 2 files, and DocumentCloud, a service used to share text documents like contracts.
  • 13. Cloud Adoption and Risk in Europe Report – Q2 2015 11 The European Union (EU) has taken a lead in data privacy since 1995 and every EU member country country has a regime that defines data protection legislation for the country. The EU is also strengthening the existing laws with expectations of a new Data Protection Regulation being agreed upon by the end of 2015. One of the areas covered by the existing directive and new regulation is where data on European individuals can be transferred. Except in exceptional circumstances, data on individuals should stay in Europe, the European Economic Area, within countries with “equivalent data privacy regulations” or within U.S. services that have signed up for the U.S. government’s Safe Harbor agreement. Skyhigh’s global cloud registry tracks over 12,000 cloud services. We found that 14.3% of cloud providers store data inside the EU, 3.6% are in countries with equivalent data protection and 17.1% are U.S.-hosted and have signed up for the Safe Harbor regulations—this means that 64.9% are not safe for EU data. While the gap between European data privacy requirements and the reality of cloud services in use today is substantial, it is shrinking. In Q4 of 2014, 74.3% of services were not suitable to host EU data. SAFE STORAGE FOR EUROPEAN DATA Hosted in country with equivalent privacy3.6% US hosted with Safe Harbor 17.2% 14.3% Hosted in the EU 64.9% Cloud Services that should not hold EU Data European companies are using many cloud services that do not meet data residency requirements A Safe Place for EU Personal Data
  • 14. Cloud Adoption and Risk in Europe Report – Q2 2015 THE CLOUD NEVER SLEEPS Flexible working has probably been one of the significant changes in the last decade, balancing home life and work life to the benefit of both the employee and employer. One aspect of this is the amount of work being conducted during what would normally be considered weekends. We analyzed usage by day of the week and found European employees are most prolific in cloud usage on Fridays, while cloud usage for their American counterparts peaks on Tuesdays and declines the remainder of the week. However, weekend usage did not fully drop to zero, reminding IT departments that there may be risks happening around the clock; as risk to the organization doesn’t stop for the weekend. 12 Mon. Tues. Wed. Thurs. Fri. Sat. Sun. Cloud Usage by Day of Week Percentage of cloud usage for each day of the week 14.6% 18.4% 15.0% 18.0% 19.5% 6.8% 7.8%
  • 15. Cloud Adoption and Risk in Europe Report – Q2 2015 From the perspective of a software company, developing a cloud service is very different from software installed by the customer. The cloud has freed developers to reimagine enterprise software with delightful user experiences, innovative new features, and access from mobile devices. With faster release cycles and updates that occur immediately across all customers, cloud applications are not only more cost effective to manage, they’re often first to market with innovative features. That’s why an increasing number of European organizations are deploying the top enterprise cloud services – not because they’re the best cloud version available but because they are the best software available, period. That’s also why we wanted to look at the top services based on user count. 13 THE TOP CLOUD SERVICES TOP 20 ENTERPRISE CLOUD SERVICES 1. Microsoft Office 365 2. Salesforce 3. Oracle RightNow 4. Cisco Webex 5. ServiceNow 6. Oracle Taleo 7. Box 8. Jive 9. Concur 10. Zendesk 11. Workday 12. ADP 13. SAP Human Capital Management 14. SAS OnDemand 15. SuccessFactors 16. Yammer 17. GoToMeeting 18. Blue Jeans 19. NetSuite 20t. OpenText BPM in Europe
  • 16. Cloud Adoption and Risk in Europe Report – Q2 2015 Consumer-grade cloud services today are so good that they can easily rival enterprise software. It’s no wonder then, that employees bring cloud services to work in order to do their jobs better. However, these services can also increase organizational risk. In order to exfiltrate sensitive data undetected, cyber criminals deploy an array of sophisticated kill chains that leverage consumer cloud services. Skyhigh has detected attacks using Twitter to exfiltrate data 140 characters at a time and another that encoded stolen data into videos that were uploaded to YouTube. 14 TOP 20 CONSUMER CLOUD SERVICES 1. Facebook 2. Linkedin 3. Flickr 4. YouTube 5. Twitter 6. Dropbox 7. Pinterest 8. Gmail 9. Vimeo 10. StumbleUpon 11. Tumblr 12. Instagram 13. Google Drive 14. Yahoo! Mail 15. VK 16. SlideShare 17. Spotify 18. Evernote 19. Skype 20. Xing at work in Europe
  • 17. Cloud Adoption and Risk in Europe Report – Q2 2015 ABOUT SKYHIGH NETWORKS Skyhigh Networks, the cloud security and enablement company, helps enterprises safely adopt cloud services while meeting their security, compliance, and governance requirements. Over 400 enterprises including Aetna, Cisco, DIRECTV, HP, and Western Union use Skyhigh to gain visibility into all cloud services in use and their associated risk; analyze cloud usage to identify security breaches, compromised accounts, and insider threats; and seamlessly enforce security policies with encryption, data loss prevention, contextual access control, and activity monitoring. Headquartered in Campbell, Calif., Skyhigh Networks is backed by Greylock Partners, Sequoia Capital, and Salesforce.com. For more information, visit us at www.skyhighnetworks.com, and follow us on Twitter @skyhighnetworks. 15
  • 18. REQUEST COMPLIMENTARY CLOUD AUDIT “With Skyhigh we discovered a wide range of services, allowing us to understand their associated risks and put in place policies to protect corporate data.” Steve Martino VP Information Security If you’d like to learn the scope of Shadow IT at your company, including detailed statistics profiled in this report, sign up for a complimentary cloud audit bit.ly/ComplimentaryCloudAudit UNCOVER SHADOW IT