SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
THE DATA 
FACTORY 
12 Essential Facts on 
Enterprise Cloud 
Usage & Risk
The cloud is growing exponentially
AND 33% OF COMPANIES HAVE A 
“FULL STEAM AHEAD” 
attitude toward cloud adoption 
Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities”
They’re investing heavily in 
enterprise-grade cloud services
TOP 20 
ENTERPRISE 
CLOUD 
SERVICES 
1. Amazon Web Services 
2. Microsoft Office 365 
3. Salesforce 
4. Cisco WebEx 
5. Concur 
6. ServiceNow 
7. Box 
8. LivePerson 
9. Zendesk 
10. Yammer 
11. 
BMC Service 
Management 
12. Workday 
13. OpenText BPM 
14. OneDrive 
15. GoToMeeting 
16. NetSuite 
17. SuccessFactors 
18. SAS OnDemand 
19. Oracle Taleo 
20. Host Analytics
Meanwhile, there’s an explosion of 
apps employees are bringing to work 
with them
Meanwhile, there’s an explosion of 
apps employees are bringing to work 
with them 
This is called
72% of companies don’t 
of companies don’t 
know the scope of 
know the scope of 
Shadow IT in their 
in their organizations, 
organizations, but 
but want to know 
want to know 
Source: 2014 Cloud Security Alliance Survey 
“Cloud Adoption Practices and Priorities”
Consumer services may have a 
legitimate business use for some 
employees, but in many instances 
their use is unsanctioned
TOP 20 
CONSUMER 
CLOUD 
SERVICES 
in the workplace 
1. Facebook 
2. Twitter 
3. YouTube 
4. Linkedin 
5. Pinterest 
6. Gmail 
7. Instagram 
8. Tumblr 
9. Flickr 
10. Myspace 
11. Dropbox 
12. Yahoo! Mail 
13. Apple iCloud 
14. Google Drive 
15. Photobucket 
16. Spotify 
17. Shutterfly 
18. Slideshare 
19. Smugmug 
20. VK
REQUEST COMPLIMENTARY CLOUD AUDIT 
“With Skyhigh we 
discovered a wide 
range of services, 
allowing us to 
understand their 
associated risks 
and put in place 
policies to protect 
corporate data.” 
Steve Martino 
VP Information Security 
Tip: To learn what cloud apps 
are in use at your company, get a 
complimentary cloud audit
While many cloud services drive 
productivity and growth in the 
business, not all of them are secure
In response, 
IT tries to block them
However, you may not be 
blocking these apps as effectively 
as you think…
CLOUD ENFORCEMENT GAP 
Apple iCloud 
Dropbox 
Facebook 
Instagram 
Netflix 
Pandora 
Skype 
Tumblr 
Twitter 
YouTube 
The gap between 
what companies 
think they’re blocking 
and the actual 
block rates 
Intended Block Rate 
Source: 2014 Cloud Security Alliance Survey “Cloud 
Adoption Practices and Priorities” and Skyhigh Networks 
80% 
50% 
48% 
Cloud Enforcement Gap 
40% 
35% 
40% 
50% 
45% 
35% 
40% 
Actual Block Rate 
21% 
31% 
4% 
4% 
3% 
9% 
7% 
3% 
11% 
17%
Even if you want to block certain 
apps, it can be difficult to say no
49% Source: 2014 Cloud Security Alliance Survey “Cloud 
of IT professionals said they had 
been pressured into approving 
an unsecure app 
Adoption Practices and Priorities”
And even secure, sanctioned cloud 
services can be used in risky ways
Just 17% 
of companies surveyed 
reported an insider threat 
incident in the last year 
perception 
NO 52% 
NOT SURE 31% 
YES 17% 
Source: 2014 Cloud Security Alliance Survey “Cloud 
Adoption Practices and Priorities” and Skyhigh Networks 
Have you had an 
INSIDER THREAT 
INCIDENT?
Just 17% 
of companies surveyed 
reported an insider threat 
incident in the last year 
Have you had an 
INSIDER THREAT 
INCIDENT? 
But 85% 
of companies actually had 
an insider threat 
perception reality 
Source: 2014 Cloud Security Alliance Survey “Cloud 
Adoption Practices and Priorities” and Skyhigh Networks 
YES 
85% 
NO 52% 
NOT SURE 31% 
YES 17%
There will always be outliers, like this 
actual employee who may be the 
world’s worst cloud user
INTRODUCING THE CLOUD’S 
DR. EVIL 
(actual name changed to protect the accused) 
This employee used 182 high-risk 
cloud services at work, and uploaded 
data to each of these: 
SERVICE CATEGORY DATA UPLOAD RISK LEVEL 
SourceForge 
LiveLeak 
4Shared 
Codehaus 
ZippyShare 
Development 
Social Media 
File Sharing 
Development 
File Sharing 
9.3 GB 
557.7 MB 
2.6 GB 
199.6 MB 
3.0 GB 
HIGH 
HIGH 
HIGH 
HIGH 
HIGH
The good news is you can make 
progress by focusing on the top 
destinations of corporate data
Box 
Dropbox 
YouTube 
Microsoft Office 365 
Jive 
Cisco WebEx 
Facebook 
Salesforce 
Gmail 
Apple iCloud 
Google Drive 
23% 
11% 
9% 
7% 
5% 
5% 
5% 
4% 
4% 
4% 
3% 
80% 
OF DATA GOES TO 
JUST 11 
CLOUD SERVICES
Download the Full Report 
DOWNLOAD NOW 
CLOUD ADOPTION 
& RISK REPORT 
Q3 2014 
Published Q4 2014 
Get the full report with 
detailed statistics on the 
top cloud services, 
fastest growing apps, 
and risks you can avoid 
in the cloud.

Mais conteúdo relacionado

Destaque

Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
Asheem Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
Sergio Loureiro
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
Miika Puputti
 

Destaque (10)

The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and Sequoia
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Manual administracion riesgo
Manual administracion riesgoManual administracion riesgo
Manual administracion riesgo
 
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

The Data Factory: 12 Essential Facts on Enterprise Cloud Usage and Risk

  • 1. THE DATA FACTORY 12 Essential Facts on Enterprise Cloud Usage & Risk
  • 2. The cloud is growing exponentially
  • 3. AND 33% OF COMPANIES HAVE A “FULL STEAM AHEAD” attitude toward cloud adoption Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities”
  • 4. They’re investing heavily in enterprise-grade cloud services
  • 5. TOP 20 ENTERPRISE CLOUD SERVICES 1. Amazon Web Services 2. Microsoft Office 365 3. Salesforce 4. Cisco WebEx 5. Concur 6. ServiceNow 7. Box 8. LivePerson 9. Zendesk 10. Yammer 11. BMC Service Management 12. Workday 13. OpenText BPM 14. OneDrive 15. GoToMeeting 16. NetSuite 17. SuccessFactors 18. SAS OnDemand 19. Oracle Taleo 20. Host Analytics
  • 6. Meanwhile, there’s an explosion of apps employees are bringing to work with them
  • 7. Meanwhile, there’s an explosion of apps employees are bringing to work with them This is called
  • 8. 72% of companies don’t of companies don’t know the scope of know the scope of Shadow IT in their in their organizations, organizations, but but want to know want to know Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities”
  • 9. Consumer services may have a legitimate business use for some employees, but in many instances their use is unsanctioned
  • 10. TOP 20 CONSUMER CLOUD SERVICES in the workplace 1. Facebook 2. Twitter 3. YouTube 4. Linkedin 5. Pinterest 6. Gmail 7. Instagram 8. Tumblr 9. Flickr 10. Myspace 11. Dropbox 12. Yahoo! Mail 13. Apple iCloud 14. Google Drive 15. Photobucket 16. Spotify 17. Shutterfly 18. Slideshare 19. Smugmug 20. VK
  • 11. REQUEST COMPLIMENTARY CLOUD AUDIT “With Skyhigh we discovered a wide range of services, allowing us to understand their associated risks and put in place policies to protect corporate data.” Steve Martino VP Information Security Tip: To learn what cloud apps are in use at your company, get a complimentary cloud audit
  • 12. While many cloud services drive productivity and growth in the business, not all of them are secure
  • 13. In response, IT tries to block them
  • 14. However, you may not be blocking these apps as effectively as you think…
  • 15. CLOUD ENFORCEMENT GAP Apple iCloud Dropbox Facebook Instagram Netflix Pandora Skype Tumblr Twitter YouTube The gap between what companies think they’re blocking and the actual block rates Intended Block Rate Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities” and Skyhigh Networks 80% 50% 48% Cloud Enforcement Gap 40% 35% 40% 50% 45% 35% 40% Actual Block Rate 21% 31% 4% 4% 3% 9% 7% 3% 11% 17%
  • 16. Even if you want to block certain apps, it can be difficult to say no
  • 17. 49% Source: 2014 Cloud Security Alliance Survey “Cloud of IT professionals said they had been pressured into approving an unsecure app Adoption Practices and Priorities”
  • 18. And even secure, sanctioned cloud services can be used in risky ways
  • 19. Just 17% of companies surveyed reported an insider threat incident in the last year perception NO 52% NOT SURE 31% YES 17% Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities” and Skyhigh Networks Have you had an INSIDER THREAT INCIDENT?
  • 20. Just 17% of companies surveyed reported an insider threat incident in the last year Have you had an INSIDER THREAT INCIDENT? But 85% of companies actually had an insider threat perception reality Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities” and Skyhigh Networks YES 85% NO 52% NOT SURE 31% YES 17%
  • 21. There will always be outliers, like this actual employee who may be the world’s worst cloud user
  • 22. INTRODUCING THE CLOUD’S DR. EVIL (actual name changed to protect the accused) This employee used 182 high-risk cloud services at work, and uploaded data to each of these: SERVICE CATEGORY DATA UPLOAD RISK LEVEL SourceForge LiveLeak 4Shared Codehaus ZippyShare Development Social Media File Sharing Development File Sharing 9.3 GB 557.7 MB 2.6 GB 199.6 MB 3.0 GB HIGH HIGH HIGH HIGH HIGH
  • 23. The good news is you can make progress by focusing on the top destinations of corporate data
  • 24. Box Dropbox YouTube Microsoft Office 365 Jive Cisco WebEx Facebook Salesforce Gmail Apple iCloud Google Drive 23% 11% 9% 7% 5% 5% 5% 4% 4% 4% 3% 80% OF DATA GOES TO JUST 11 CLOUD SERVICES
  • 25. Download the Full Report DOWNLOAD NOW CLOUD ADOPTION & RISK REPORT Q3 2014 Published Q4 2014 Get the full report with detailed statistics on the top cloud services, fastest growing apps, and risks you can avoid in the cloud.