SlideShare a Scribd company logo
1 of 16
Download to read offline
Cloud Security Survey Global
Executive Summary
Corporate Marketing
August 2012




                       1       8/15/2012   Copyright 2012 Trend Micro Inc.
Objective And Methodology
      Objectives:
      • To understand more about global and regional virtualization and cloud
        adoption rates and barriers to adoption.
      • To explore trends within the area of cloud technology and virtualization
        practices.
      Methodology:
      • An online survey was conducted in June 2012 in seven countries: the
        US, Canada, the UK, Germany, Japan, India, and Brazil. This was the first
        year including Brazil and the second year for the other six countries.
      • 1,400 respondents (200 per country) were surveyed: all were purchase
        decision makers or key influencers for one or more of the following three
        solutions/services:
          – Cloud Computing Services,
          – Server Virtualization, and/or
          – Virtual Desktop Infrastructure (VDI).
      • Companies were limited to 500+ employees.


8/15/2012   Copyright 2012 Trend Micro Inc.   2
Executive Summary




8/15/2012     Copyright 2012 Trend Micro Inc.   3
Cloud Is Not Secure. Almost Half Experienced Data
      Security Lapse Or Issue In The Last 12 Months
    • Globally, 47% of the respondents who are currently using a cloud computing service
      reported they have experienced a data security lapse or issue with the cloud service their
      company is using within the last 12 months. India had the highest incidence (67%), followed
      by Brazil (55%).
    • Incidence of data security lapse or issue increased from 43% in 2011 to 46% (excluding
      Brazil, which was not surveyed in 2011) in 2012. India had the biggest increase of
      12%, followed by Japan (7% increase) and Canada (6% increase).




                                                                                                         N/A


            Q: Has your organization experienced a data security lapse or issue with the cloud service your
            company is using within the last 12 months?
8/15/2012       Copyright 2012 Trend Micro Inc.                         4
Increased Adoption of Cloud Service
      Correlated With Higher Incidence Of Data
      Security Lapse Or Issue
    • With the adoption rate of cloud services increasing from 2011 to
      2012, there was also an increase in the incidence of data security lapse
      or issue with the cloud services companies are using. This correlation is
      particularly strong in India and Canada.


                                                                                                                Incidence Of Data
                                                                                                                Security Lapse Or
                                                                                                                Issue With Cloud
                                                                                                  N/A           Service (%)




                                                                                                                Cloud Service
                                                                                                                Adoption Rate* (%)
                                                                                                  N/A

   Q: Has your organization experienced a data security lapse or issue with the cloud service your company is
   using within the last 12 months?
   *Cloud Service Adoption Rate: % of corporate decision makers who reported their company has currently
   deployed or is piloting public or private cloud                      5
8/15/2012       Copyright 2012 Trend Micro Inc.
Enterprises Are Concerned About Using
      Cloud Computing Services
     • More than half of the respondents indicated that apprehension over security is a
       key reason holding back their adoption of cloud technique and that shared storage
       is vulnerable without encryption.
     • More than half expressed more willingness to consider using the cloud if cloud
       providers took a more hands on approach to securing data or if they knew more
       about how to secure their data in the cloud.
                                                    Disagree             Neither Disagree Nor Agree
                                                                        Neither Disagree Nor Disagree          Agree

                                             Shared storage is vulnerable           11%          34%                         55%            2012
                                                        without encryption          10%          35%                         55%            2011
  If cloud service providers took a more hands on approach to securing our          11%          36%                         53%            2012
    company data, this would increase our consideration of using the cloud          13%            41%                        47%           2011
                               Apprehension over security is a key reason           13%           34%                        53%            2012
                           holding back our adoption of cloud technologies           15%           35%                        50%           2011
                     An easy to administer cloud encryption service would           12%          36%                         53%            2012
       give us reason to consider using more cloud services/cloud vendors           12%           39%                         49%           2011
               If we knew more about how to secure our data in the cloud,           13%           34%                        53%            2012
                   this would increase our consideration of using the cloud         12%           39%                         49%           2011
                                   We do not use public cloud services for           16%           34%                        50%           2012
                             any of our data that has security requirements          16%               36%                    47%           2011
                                          Shared infrastructure of any kind         14%            36%                        50%           2012
                                                                is too risky         17%               37%                     46%          2011
                                      A guaranteed SLA would drive us to            10%           40%                         50%           2012
                        use more cloud computing services/cloud vendors             12%           39%                         49%           2011
                                                                               0%          20%           40%           60%         80%   100%



Q: How much do you agree or disagree with the following statements about cloud vendors / cloud computing services?
8/15/2012       Copyright 2012 Trend Micro Inc.                              6
Not All Cloud Providers Meet Enterprise
      IT Security Requirements

     • Four in ten respondents indicated their IT security requirements are not
       being met by current cloud providers / offerings.

                                           Disagree           Neither Disagree Nor Agree          Agree

                      2012-The lack of cloud computing standards prevents cloud to
                                             cloud portability                             18%    38%         44%
                      2011-The lack of cloud computing standards prevents cloud to
                                             cloud portability                             18%    37%         44%
                       2012-Our support service needs are not being met by current
                                    cloud offerings / cloud providers                      24%     34%        42%
                       2011-Our support service needs are not being met by current
                                    cloud offerings / cloud providers                       25%    37%        38%
                       2012-Our IT requirements are not being met by current cloud
                                       offerings / cloud providers                          25%    34%        41%
                       2011-Our IT requirements are not being met by current cloud
                                       offerings / cloud providers                          27%     35%       38%
                     2012-Our IT Security requirements are not being met by current
                                   cloud offerings / cloud providers                        28%     32%       40%
                     2011-Our IT Security requirements are not being met by current
                                   cloud offerings / cloud providers                        25%    36%        40%
                       2012-Our business requirements are not being met by current
                                    cloud offerings / cloud providers
                                                                                            27%    33%        40%
                       2011-Our business requirements are not being met by current
                                    cloud offerings / cloud providers                       26%     36%       38%

                                                                                      0%                50%         100%

            Q: How much do you agree or disagree with the following statements about the current set of cloud
                computing service offerings in the market?

8/15/2012   Copyright 2012 Trend Micro Inc.                                           7
Some Enterprises Don’t Even Know
  They Are Actually Using A Cloud
  Computing Service
• There is still confusion
  about what cloud
  computing services exactly
  are. When presented with
  a list of cloud
  services, 94% of the
  respondents said they are
  currently using at least one
  of them. However, 9% of
  these respondents
  indicated, on the other
  hand, that their company
  has no plans to deploy
  cloud computing services.
  This is consistent with
  2011 where 7% said the
  same.


            Q: Which, if any, of the following vendors / services does your company currently use?

8/15/2012   Copyright 2012 Trend Micro Inc.                       8
More Enterprises Are Moving To
     The Cloud Quickly
     • In 2011 slightly over 10% of the respondents had cloud computing services
       in production. This almost doubled to 20% in 2012 for both public and
       private cloud services. Close to half are either implementing or piloting.




              Q: With regards to the following steps, please indicate where your company is – in
                  terms of usage/deployment (In Production; Implementing; In Trials/Piloting; In
                  Discussions; No Plans To Deploy):
                       • Public Cloud
                       • Private Cloud
                       • Hybrid apps – part in cloud, part local
8/15/2012   Copyright 2012 Trend Micro Inc.                  9
And More Applications Are Moving
     To The Cloud; More Servers and
     Endpoints Are Being Virtualized
     • For companies that have public cloud or hybrid apps currently in
       production, an average of 46% of the existing applications are already
       deployed in the cloud. An average of 53% of the new applications will be
       deployed in the cloud.
     • For companies that have server virtualization currently in production, an
       average of 46% of their servers are currently virtualized. In the next 12
       months, an average of 63% of their servers will be virtualized.
     • For companies that have VDI currently in production, an average of 44% of
       their endpoints are currently virtualized. In the next 12 months, an average
       of 63% of their endpoints will be virtualized.
     • The 2012 results are consistent with 2011 results.
            – The percentage of endpoints currently virtualized increased slightly from 42% in 2011 to 44%
              in 2012.
            – The percentage of endpoints that will be virtualized increased by 3% from 2011 to 2012.

              Qs: What percentage of your company’s:
                 • % of EXISTING applications deployed in the cloud; % of NEW applications to be deployed in the cloud?
                 • % of Endpoints CURRENTLY Virtualized; % of Endpoints that WILL BE virtualized in the next 12 months?
                 • % of Servers CURRENTLY Virtualized; % of Servers that WILL BE virtualized in the next 12 months?
8/15/2012       Copyright 2012 Trend Micro Inc.                     10
Security Is Important, But Performance and
      Availability Are Equally Important
     • Security and performance/availability of cloud services continue to be the
       dominant barriers in adopting cloud computing services.

               Concerns over security (of data or cloud                             54%
                          infrastructure)                                          50%
             Performance / Availability of cloud service                           50%
                                                                                  48%
                              Unclear cost benefits / ROI                 30%
                                                                           34%
              Lack of transparency about data center                  25%
             facilities, hardware, and disaster recovery                27%
                                              Compliance                 29%
                                                                        27%
                   Billing and tracking of services used              24%
                                                                       26%                           2012
                Complexity in integrating the cloud with                 29%                         2011
                       existing IT operations                          26%
                               Lack of access to our data            22%
                                                                      25%
                 Potential lock-in to the cloud service /              25%
               Proprietary data models used by cloud…                 25%
              Internal resistance / Internal inertia to do               28%
                         things the same way                         23%
            Current offerings do not meet our business              20%
                               needs                                20%
                                                            0%   20%       40%       60%       80%    100%




                      Q: What risks/barriers do you perceive in adopting cloud computing services?
8/15/2012   Copyright 2012 Trend Micro Inc.                       11
Encryption Is A Key Measure Taken
      To Secure Data In The Cloud
     •        For those who have public cloud in production, the vast majority,
              87-89% said they encrypt their data stored in the cloud and keep a 1:1
              copy of all data that is synched to the cloud. This is a slight increase
              from 2011.




         Qs: Does your company encrypt any of your data stored in the cloud?
            Does your company keep a 1:1 copy of all data that is synched to the public cloud data?


8/15/2012        |Copyright 2012 Trend Micro Inc.                      12
Companies That Have Server
      Virtualization In Production Have A
      Tendency To Also Move To The Cloud

     • Use of server virtualization was significantly correlated to cloud services
       usage.
     • Consistent with 2011 numbers, in 2012, of the 848 respondents who
       have Server Virtualization in production or in pilot:
            – 71% also have VDI in production/pilot
            – 65% have Private Cloud Computing in production/pilot
            – 62% have Public Cloud Computing in production/pilot
     • Of the remaining 552 respondents:
            – Only 25% also have VDI in production/pilot
            – Only 24% have Private Cloud Computing in production/pilot
            – Only 26% have Public Cloud Computing in production/pilot


                   Q: Which of the following best describes your organization’s use of the following technologies?
                      (Currently Piloting; Currently Deployed / in Production; Planning To Deploy; Have No Plans To
                      Deploy; Not Sure /Don’t Know)
                        • Server Virtualization
                        • VDI
                        • Private Cloud
                        • Public Cloud
8/15/2012     Copyright 2012 Trend Micro Inc.                        13
Appendix
            Usage of Cloud Computing Services, Server
            Virtualization and VDI




8/15/2012       Copyright 2012 Trend Micro Inc.    14
Adoption/Usage of Server
      Virtualization, VDI, Pubic Cloud and
     •Private Cloud for the various technologies is highest in the US
       Overall, adoption rate
            and the UK, and is lowest in Japan.
     • Adoption rate for all 4 technologies increased significantly in Canada.
     • Adoption of public cloud and server virtualization also increased
       significantly in India.

     % that have currently deployed or are         TOTAL       US      JAPAN      INDIA    GERMANY         UK      CANADA BRAZIL
       piloting among decision makers*
                                                  2011 2012 2011 2012 2011 2012 2011 2012 2011 2012 2011 2012 2011 2012    2012

                                                  59% 61% 70% 71% 58% 60% 51% 59% 61% 67% 68% 63% 47% 56%                  50%
     Server Virtualization
                                                  52% 53% 62% 62% 42% 40% 48% 52% 55% 53% 63% 64% 45% 55%                  47%
     VDI
                                                  46% 48% 56% 57% 34% 39% 42% 43% 54% 54% 51% 53% 38% 48%                  47%
     Private Cloud
                                                  45% 48% 54% 52% 37% 38% 38% 49% 48% 49% 52% 53% 42% 51%                  46%
     Public Cloud
     *Decision makers: Enterprise IT professionals who make purchase decisions for cloud computing services, server
     virtualization or Virtual Desktop infrastructure (VDI) solutions.
     Q: Which of the following best describes your organization’s use of the following technologies? (Currently
     Piloting; Currently Deployed / in Production; Planning To Deploy Within The Next 6 Months; Planning To Deploy In
     The Next 7 To 12 Months; Planning To Deploy But Do Not Know When; Have No Plans To Deploy; Not Sure /Don’t
     Know)
           • Server Virtualization
           • VDI
           • Private Cloud
           • Public Cloud                                              15
8/15/2012       Copyright 2012 Trend Micro Inc.
Thank You!


8/15/2012    Copyright 2012 Trend Micro Inc.   16

More Related Content

What's hot

The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...Radware
 
VMware Cloud Infrastructure and Management on NetApp
VMware Cloud Infrastructure and Management on NetAppVMware Cloud Infrastructure and Management on NetApp
VMware Cloud Infrastructure and Management on NetAppNetApp
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityPeopleWorks IN
 
SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)SolarWinds
 
Winning Support For Your Intranet / Intranet 2.0 Initiatives June 2009
Winning Support For Your Intranet / Intranet 2.0 Initiatives June 2009Winning Support For Your Intranet / Intranet 2.0 Initiatives June 2009
Winning Support For Your Intranet / Intranet 2.0 Initiatives June 2009Prescient Digital Media
 
Virtualization Survey Results
Virtualization Survey ResultsVirtualization Survey Results
Virtualization Survey Resultsgtsimarketing
 
Access, Align and Assimilate
Access, Align and AssimilateAccess, Align and Assimilate
Access, Align and AssimilateInnoTech
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:HyTrust
 
Idge dell private cloud2014 qp #2
Idge dell private cloud2014 qp #2Idge dell private cloud2014 qp #2
Idge dell private cloud2014 qp #2jmariani14
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management ServicesMarlabs
 
Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)INSPIRIT BRASIL
 
On line e-learning certificate 01
On line e-learning certificate 01On line e-learning certificate 01
On line e-learning certificate 01Ajlan Al-Ajlan
 
Va\\lue of e-safebusiness solutions
Va\\lue of e-safebusiness solutionsVa\\lue of e-safebusiness solutions
Va\\lue of e-safebusiness solutionsiansadler
 

What's hot (19)

The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...
 
VMware Cloud Infrastructure and Management on NetApp
VMware Cloud Infrastructure and Management on NetAppVMware Cloud Infrastructure and Management on NetApp
VMware Cloud Infrastructure and Management on NetApp
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and Simplicity
 
SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)
 
Winning Support For Your Intranet / Intranet 2.0 Initiatives June 2009
Winning Support For Your Intranet / Intranet 2.0 Initiatives June 2009Winning Support For Your Intranet / Intranet 2.0 Initiatives June 2009
Winning Support For Your Intranet / Intranet 2.0 Initiatives June 2009
 
Virtualization Survey Results
Virtualization Survey ResultsVirtualization Survey Results
Virtualization Survey Results
 
Intranet 2.0 on a Budget
Intranet 2.0 on a BudgetIntranet 2.0 on a Budget
Intranet 2.0 on a Budget
 
Cloud email demystified
Cloud email demystifiedCloud email demystified
Cloud email demystified
 
Access, Align and Assimilate
Access, Align and AssimilateAccess, Align and Assimilate
Access, Align and Assimilate
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
Intranet 2 0 Tools
Intranet 2 0 ToolsIntranet 2 0 Tools
Intranet 2 0 Tools
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
 
Idge dell private cloud2014 qp #2
Idge dell private cloud2014 qp #2Idge dell private cloud2014 qp #2
Idge dell private cloud2014 qp #2
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)
 
SaaS Data Protection
SaaS Data ProtectionSaaS Data Protection
SaaS Data Protection
 
On line e-learning certificate 01
On line e-learning certificate 01On line e-learning certificate 01
On line e-learning certificate 01
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Va\\lue of e-safebusiness solutions
Va\\lue of e-safebusiness solutionsVa\\lue of e-safebusiness solutions
Va\\lue of e-safebusiness solutions
 

Viewers also liked

Cloud Computing Realities - Getting past the hype and setting your cloud stra...
Cloud Computing Realities - Getting past the hype and setting your cloud stra...Cloud Computing Realities - Getting past the hype and setting your cloud stra...
Cloud Computing Realities - Getting past the hype and setting your cloud stra...Compuware APM
 
Cloud Computing Industry Analysis
Cloud Computing Industry AnalysisCloud Computing Industry Analysis
Cloud Computing Industry AnalysisSumaya Shakir
 
Porter five forces analysis
Porter five forces analysisPorter five forces analysis
Porter five forces analysisspreet1304
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Michael Kaishar, MSIA | CISSP
 
Honolulu Budget Executive Summary
Honolulu Budget Executive SummaryHonolulu Budget Executive Summary
Honolulu Budget Executive SummaryHonolulu Civil Beat
 
Executive Summary: how to write
Executive Summary: how to writeExecutive Summary: how to write
Executive Summary: how to writeAna Thompson
 
What is the impact of cloud computing? - Jisc Digifest 2016
What is the impact of cloud computing? - Jisc Digifest 2016What is the impact of cloud computing? - Jisc Digifest 2016
What is the impact of cloud computing? - Jisc Digifest 2016Jisc
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002pgpmikey
 
How to write an Executive Summary for your Business Plan
How to write an Executive Summary for your Business PlanHow to write an Executive Summary for your Business Plan
How to write an Executive Summary for your Business PlanAbhilash Ravishankar
 
2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study2015 Future of Cloud Computing Study
2015 Future of Cloud Computing StudyNorth Bridge
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing StudyNorth Bridge
 

Viewers also liked (14)

Cloud Computing Realities - Getting past the hype and setting your cloud stra...
Cloud Computing Realities - Getting past the hype and setting your cloud stra...Cloud Computing Realities - Getting past the hype and setting your cloud stra...
Cloud Computing Realities - Getting past the hype and setting your cloud stra...
 
Cloud Computing Industry Analysis
Cloud Computing Industry AnalysisCloud Computing Industry Analysis
Cloud Computing Industry Analysis
 
Porter five forces analysis
Porter five forces analysisPorter five forces analysis
Porter five forces analysis
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
develop security policy
develop security policydevelop security policy
develop security policy
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
Honolulu Budget Executive Summary
Honolulu Budget Executive SummaryHonolulu Budget Executive Summary
Honolulu Budget Executive Summary
 
Executive Summary: how to write
Executive Summary: how to writeExecutive Summary: how to write
Executive Summary: how to write
 
What is the impact of cloud computing? - Jisc Digifest 2016
What is the impact of cloud computing? - Jisc Digifest 2016What is the impact of cloud computing? - Jisc Digifest 2016
What is the impact of cloud computing? - Jisc Digifest 2016
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
 
How to write an Executive Summary for your Business Plan
How to write an Executive Summary for your Business PlanHow to write an Executive Summary for your Business Plan
How to write an Executive Summary for your Business Plan
 
2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study
 

Similar to Cloud Security Concerns Rise With Adoption

RightScale State of the Cloud Report 2013
RightScale State of the Cloud Report 2013RightScale State of the Cloud Report 2013
RightScale State of the Cloud Report 2013arms8586
 
Cloud Essentials Launch
Cloud Essentials LaunchCloud Essentials Launch
Cloud Essentials LaunchCompTIA
 
SAP BusinessObjects BI OnDemand
SAP BusinessObjects BI OnDemandSAP BusinessObjects BI OnDemand
SAP BusinessObjects BI OnDemandPierre Leroux
 
2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by SyncsortPrecisely
 
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectData Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectNetskope
 
Cloud service providers survey breaking through the cloud adoption barriers- ...
Cloud service providers survey breaking through the cloud adoption barriers- ...Cloud service providers survey breaking through the cloud adoption barriers- ...
Cloud service providers survey breaking through the cloud adoption barriers- ...Christophe Monnier
 
Cloud adaption
Cloud adaptionCloud adaption
Cloud adaptionAccenture
 
What’s Driving Enterprise Cloud Adoption? The Buyers Speak Out | Webinar
What’s Driving Enterprise Cloud Adoption? The Buyers Speak Out | WebinarWhat’s Driving Enterprise Cloud Adoption? The Buyers Speak Out | Webinar
What’s Driving Enterprise Cloud Adoption? The Buyers Speak Out | WebinarEverest Group
 
Webinar Deck: What's Driving Enterprise Cloud Adoption? The Buyers Speak Out
Webinar Deck: What's Driving Enterprise Cloud Adoption?The Buyers Speak OutWebinar Deck: What's Driving Enterprise Cloud Adoption?The Buyers Speak Out
Webinar Deck: What's Driving Enterprise Cloud Adoption? The Buyers Speak OutEverest Group
 
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 years
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 yearsThe Cloud and Mobility Pivot - How MSPs can retool for the next 5 years
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 yearsJay McBain
 
Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012itandlaw
 
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Veritas Technologies LLC
 
Cloud Computing in Indonesia
Cloud Computing in IndonesiaCloud Computing in Indonesia
Cloud Computing in IndonesiaHeru Sutadi
 
The Cloud Revolution
The Cloud RevolutionThe Cloud Revolution
The Cloud RevolutionAll Covered
 
Cloud service providers in pune
Cloud service providers in puneCloud service providers in pune
Cloud service providers in puneAnshita Dixit
 
Cloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned AboutCloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned AboutLuong Trung Thanh
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesEMC
 
cloud computing risks
cloud computing riskscloud computing risks
cloud computing risksLorie Vela
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paperDavid Gould
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01promediakw
 

Similar to Cloud Security Concerns Rise With Adoption (20)

RightScale State of the Cloud Report 2013
RightScale State of the Cloud Report 2013RightScale State of the Cloud Report 2013
RightScale State of the Cloud Report 2013
 
Cloud Essentials Launch
Cloud Essentials LaunchCloud Essentials Launch
Cloud Essentials Launch
 
SAP BusinessObjects BI OnDemand
SAP BusinessObjects BI OnDemandSAP BusinessObjects BI OnDemand
SAP BusinessObjects BI OnDemand
 
2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort
 
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectData Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier Effect
 
Cloud service providers survey breaking through the cloud adoption barriers- ...
Cloud service providers survey breaking through the cloud adoption barriers- ...Cloud service providers survey breaking through the cloud adoption barriers- ...
Cloud service providers survey breaking through the cloud adoption barriers- ...
 
Cloud adaption
Cloud adaptionCloud adaption
Cloud adaption
 
What’s Driving Enterprise Cloud Adoption? The Buyers Speak Out | Webinar
What’s Driving Enterprise Cloud Adoption? The Buyers Speak Out | WebinarWhat’s Driving Enterprise Cloud Adoption? The Buyers Speak Out | Webinar
What’s Driving Enterprise Cloud Adoption? The Buyers Speak Out | Webinar
 
Webinar Deck: What's Driving Enterprise Cloud Adoption? The Buyers Speak Out
Webinar Deck: What's Driving Enterprise Cloud Adoption?The Buyers Speak OutWebinar Deck: What's Driving Enterprise Cloud Adoption?The Buyers Speak Out
Webinar Deck: What's Driving Enterprise Cloud Adoption? The Buyers Speak Out
 
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 years
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 yearsThe Cloud and Mobility Pivot - How MSPs can retool for the next 5 years
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 years
 
Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012
 
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
 
Cloud Computing in Indonesia
Cloud Computing in IndonesiaCloud Computing in Indonesia
Cloud Computing in Indonesia
 
The Cloud Revolution
The Cloud RevolutionThe Cloud Revolution
The Cloud Revolution
 
Cloud service providers in pune
Cloud service providers in puneCloud service providers in pune
Cloud service providers in pune
 
Cloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned AboutCloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned About
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud Strategies
 
cloud computing risks
cloud computing riskscloud computing risks
cloud computing risks
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paper
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 

More from Комсс Файквэе

Rp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xgRp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xgКомсс Файквэе
 
Hta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingHta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingКомсс Файквэе
 

More from Комсс Файквэе (20)

Ksb 2013 ru
Ksb 2013 ruKsb 2013 ru
Ksb 2013 ru
 
Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013
 
Rp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xgRp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xg
 
Apwg trends report_q2_2013
Apwg trends report_q2_2013Apwg trends report_q2_2013
Apwg trends report_q2_2013
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 
Scimp paper
Scimp paperScimp paper
Scimp paper
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Hta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingHta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijacking
 
Analitika web 2012_positive_technologies
Analitika web 2012_positive_technologiesAnalitika web 2012_positive_technologies
Analitika web 2012_positive_technologies
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
B intelligence report-08-2013.en-us
B intelligence report-08-2013.en-usB intelligence report-08-2013.en-us
B intelligence report-08-2013.en-us
 
Dtl 2013 q2_home.1.2
Dtl 2013 q2_home.1.2Dtl 2013 q2_home.1.2
Dtl 2013 q2_home.1.2
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
Kaspersky lab av_test_whitelist_test_report
Kaspersky lab av_test_whitelist_test_reportKaspersky lab av_test_whitelist_test_report
Kaspersky lab av_test_whitelist_test_report
 
The modern-malware-review-march-2013
The modern-malware-review-march-2013 The modern-malware-review-march-2013
The modern-malware-review-march-2013
 
Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2
 
Panda labs annual-report-2012
Panda labs annual-report-2012Panda labs annual-report-2012
Panda labs annual-report-2012
 
H02 syllabus
H02 syllabusH02 syllabus
H02 syllabus
 
Course reader-title
Course reader-titleCourse reader-title
Course reader-title
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Cloud Security Concerns Rise With Adoption

  • 1. Cloud Security Survey Global Executive Summary Corporate Marketing August 2012 1 8/15/2012 Copyright 2012 Trend Micro Inc.
  • 2. Objective And Methodology Objectives: • To understand more about global and regional virtualization and cloud adoption rates and barriers to adoption. • To explore trends within the area of cloud technology and virtualization practices. Methodology: • An online survey was conducted in June 2012 in seven countries: the US, Canada, the UK, Germany, Japan, India, and Brazil. This was the first year including Brazil and the second year for the other six countries. • 1,400 respondents (200 per country) were surveyed: all were purchase decision makers or key influencers for one or more of the following three solutions/services: – Cloud Computing Services, – Server Virtualization, and/or – Virtual Desktop Infrastructure (VDI). • Companies were limited to 500+ employees. 8/15/2012 Copyright 2012 Trend Micro Inc. 2
  • 3. Executive Summary 8/15/2012 Copyright 2012 Trend Micro Inc. 3
  • 4. Cloud Is Not Secure. Almost Half Experienced Data Security Lapse Or Issue In The Last 12 Months • Globally, 47% of the respondents who are currently using a cloud computing service reported they have experienced a data security lapse or issue with the cloud service their company is using within the last 12 months. India had the highest incidence (67%), followed by Brazil (55%). • Incidence of data security lapse or issue increased from 43% in 2011 to 46% (excluding Brazil, which was not surveyed in 2011) in 2012. India had the biggest increase of 12%, followed by Japan (7% increase) and Canada (6% increase). N/A Q: Has your organization experienced a data security lapse or issue with the cloud service your company is using within the last 12 months? 8/15/2012 Copyright 2012 Trend Micro Inc. 4
  • 5. Increased Adoption of Cloud Service Correlated With Higher Incidence Of Data Security Lapse Or Issue • With the adoption rate of cloud services increasing from 2011 to 2012, there was also an increase in the incidence of data security lapse or issue with the cloud services companies are using. This correlation is particularly strong in India and Canada. Incidence Of Data Security Lapse Or Issue With Cloud N/A Service (%) Cloud Service Adoption Rate* (%) N/A Q: Has your organization experienced a data security lapse or issue with the cloud service your company is using within the last 12 months? *Cloud Service Adoption Rate: % of corporate decision makers who reported their company has currently deployed or is piloting public or private cloud 5 8/15/2012 Copyright 2012 Trend Micro Inc.
  • 6. Enterprises Are Concerned About Using Cloud Computing Services • More than half of the respondents indicated that apprehension over security is a key reason holding back their adoption of cloud technique and that shared storage is vulnerable without encryption. • More than half expressed more willingness to consider using the cloud if cloud providers took a more hands on approach to securing data or if they knew more about how to secure their data in the cloud. Disagree Neither Disagree Nor Agree Neither Disagree Nor Disagree Agree Shared storage is vulnerable 11% 34% 55% 2012 without encryption 10% 35% 55% 2011 If cloud service providers took a more hands on approach to securing our 11% 36% 53% 2012 company data, this would increase our consideration of using the cloud 13% 41% 47% 2011 Apprehension over security is a key reason 13% 34% 53% 2012 holding back our adoption of cloud technologies 15% 35% 50% 2011 An easy to administer cloud encryption service would 12% 36% 53% 2012 give us reason to consider using more cloud services/cloud vendors 12% 39% 49% 2011 If we knew more about how to secure our data in the cloud, 13% 34% 53% 2012 this would increase our consideration of using the cloud 12% 39% 49% 2011 We do not use public cloud services for 16% 34% 50% 2012 any of our data that has security requirements 16% 36% 47% 2011 Shared infrastructure of any kind 14% 36% 50% 2012 is too risky 17% 37% 46% 2011 A guaranteed SLA would drive us to 10% 40% 50% 2012 use more cloud computing services/cloud vendors 12% 39% 49% 2011 0% 20% 40% 60% 80% 100% Q: How much do you agree or disagree with the following statements about cloud vendors / cloud computing services? 8/15/2012 Copyright 2012 Trend Micro Inc. 6
  • 7. Not All Cloud Providers Meet Enterprise IT Security Requirements • Four in ten respondents indicated their IT security requirements are not being met by current cloud providers / offerings. Disagree Neither Disagree Nor Agree Agree 2012-The lack of cloud computing standards prevents cloud to cloud portability 18% 38% 44% 2011-The lack of cloud computing standards prevents cloud to cloud portability 18% 37% 44% 2012-Our support service needs are not being met by current cloud offerings / cloud providers 24% 34% 42% 2011-Our support service needs are not being met by current cloud offerings / cloud providers 25% 37% 38% 2012-Our IT requirements are not being met by current cloud offerings / cloud providers 25% 34% 41% 2011-Our IT requirements are not being met by current cloud offerings / cloud providers 27% 35% 38% 2012-Our IT Security requirements are not being met by current cloud offerings / cloud providers 28% 32% 40% 2011-Our IT Security requirements are not being met by current cloud offerings / cloud providers 25% 36% 40% 2012-Our business requirements are not being met by current cloud offerings / cloud providers 27% 33% 40% 2011-Our business requirements are not being met by current cloud offerings / cloud providers 26% 36% 38% 0% 50% 100% Q: How much do you agree or disagree with the following statements about the current set of cloud computing service offerings in the market? 8/15/2012 Copyright 2012 Trend Micro Inc. 7
  • 8. Some Enterprises Don’t Even Know They Are Actually Using A Cloud Computing Service • There is still confusion about what cloud computing services exactly are. When presented with a list of cloud services, 94% of the respondents said they are currently using at least one of them. However, 9% of these respondents indicated, on the other hand, that their company has no plans to deploy cloud computing services. This is consistent with 2011 where 7% said the same. Q: Which, if any, of the following vendors / services does your company currently use? 8/15/2012 Copyright 2012 Trend Micro Inc. 8
  • 9. More Enterprises Are Moving To The Cloud Quickly • In 2011 slightly over 10% of the respondents had cloud computing services in production. This almost doubled to 20% in 2012 for both public and private cloud services. Close to half are either implementing or piloting. Q: With regards to the following steps, please indicate where your company is – in terms of usage/deployment (In Production; Implementing; In Trials/Piloting; In Discussions; No Plans To Deploy): • Public Cloud • Private Cloud • Hybrid apps – part in cloud, part local 8/15/2012 Copyright 2012 Trend Micro Inc. 9
  • 10. And More Applications Are Moving To The Cloud; More Servers and Endpoints Are Being Virtualized • For companies that have public cloud or hybrid apps currently in production, an average of 46% of the existing applications are already deployed in the cloud. An average of 53% of the new applications will be deployed in the cloud. • For companies that have server virtualization currently in production, an average of 46% of their servers are currently virtualized. In the next 12 months, an average of 63% of their servers will be virtualized. • For companies that have VDI currently in production, an average of 44% of their endpoints are currently virtualized. In the next 12 months, an average of 63% of their endpoints will be virtualized. • The 2012 results are consistent with 2011 results. – The percentage of endpoints currently virtualized increased slightly from 42% in 2011 to 44% in 2012. – The percentage of endpoints that will be virtualized increased by 3% from 2011 to 2012. Qs: What percentage of your company’s: • % of EXISTING applications deployed in the cloud; % of NEW applications to be deployed in the cloud? • % of Endpoints CURRENTLY Virtualized; % of Endpoints that WILL BE virtualized in the next 12 months? • % of Servers CURRENTLY Virtualized; % of Servers that WILL BE virtualized in the next 12 months? 8/15/2012 Copyright 2012 Trend Micro Inc. 10
  • 11. Security Is Important, But Performance and Availability Are Equally Important • Security and performance/availability of cloud services continue to be the dominant barriers in adopting cloud computing services. Concerns over security (of data or cloud 54% infrastructure) 50% Performance / Availability of cloud service 50% 48% Unclear cost benefits / ROI 30% 34% Lack of transparency about data center 25% facilities, hardware, and disaster recovery 27% Compliance 29% 27% Billing and tracking of services used 24% 26% 2012 Complexity in integrating the cloud with 29% 2011 existing IT operations 26% Lack of access to our data 22% 25% Potential lock-in to the cloud service / 25% Proprietary data models used by cloud… 25% Internal resistance / Internal inertia to do 28% things the same way 23% Current offerings do not meet our business 20% needs 20% 0% 20% 40% 60% 80% 100% Q: What risks/barriers do you perceive in adopting cloud computing services? 8/15/2012 Copyright 2012 Trend Micro Inc. 11
  • 12. Encryption Is A Key Measure Taken To Secure Data In The Cloud • For those who have public cloud in production, the vast majority, 87-89% said they encrypt their data stored in the cloud and keep a 1:1 copy of all data that is synched to the cloud. This is a slight increase from 2011. Qs: Does your company encrypt any of your data stored in the cloud? Does your company keep a 1:1 copy of all data that is synched to the public cloud data? 8/15/2012 |Copyright 2012 Trend Micro Inc. 12
  • 13. Companies That Have Server Virtualization In Production Have A Tendency To Also Move To The Cloud • Use of server virtualization was significantly correlated to cloud services usage. • Consistent with 2011 numbers, in 2012, of the 848 respondents who have Server Virtualization in production or in pilot: – 71% also have VDI in production/pilot – 65% have Private Cloud Computing in production/pilot – 62% have Public Cloud Computing in production/pilot • Of the remaining 552 respondents: – Only 25% also have VDI in production/pilot – Only 24% have Private Cloud Computing in production/pilot – Only 26% have Public Cloud Computing in production/pilot Q: Which of the following best describes your organization’s use of the following technologies? (Currently Piloting; Currently Deployed / in Production; Planning To Deploy; Have No Plans To Deploy; Not Sure /Don’t Know) • Server Virtualization • VDI • Private Cloud • Public Cloud 8/15/2012 Copyright 2012 Trend Micro Inc. 13
  • 14. Appendix Usage of Cloud Computing Services, Server Virtualization and VDI 8/15/2012 Copyright 2012 Trend Micro Inc. 14
  • 15. Adoption/Usage of Server Virtualization, VDI, Pubic Cloud and •Private Cloud for the various technologies is highest in the US Overall, adoption rate and the UK, and is lowest in Japan. • Adoption rate for all 4 technologies increased significantly in Canada. • Adoption of public cloud and server virtualization also increased significantly in India. % that have currently deployed or are TOTAL US JAPAN INDIA GERMANY UK CANADA BRAZIL piloting among decision makers* 2011 2012 2011 2012 2011 2012 2011 2012 2011 2012 2011 2012 2011 2012 2012 59% 61% 70% 71% 58% 60% 51% 59% 61% 67% 68% 63% 47% 56% 50% Server Virtualization 52% 53% 62% 62% 42% 40% 48% 52% 55% 53% 63% 64% 45% 55% 47% VDI 46% 48% 56% 57% 34% 39% 42% 43% 54% 54% 51% 53% 38% 48% 47% Private Cloud 45% 48% 54% 52% 37% 38% 38% 49% 48% 49% 52% 53% 42% 51% 46% Public Cloud *Decision makers: Enterprise IT professionals who make purchase decisions for cloud computing services, server virtualization or Virtual Desktop infrastructure (VDI) solutions. Q: Which of the following best describes your organization’s use of the following technologies? (Currently Piloting; Currently Deployed / in Production; Planning To Deploy Within The Next 6 Months; Planning To Deploy In The Next 7 To 12 Months; Planning To Deploy But Do Not Know When; Have No Plans To Deploy; Not Sure /Don’t Know) • Server Virtualization • VDI • Private Cloud • Public Cloud 15 8/15/2012 Copyright 2012 Trend Micro Inc.
  • 16. Thank You! 8/15/2012 Copyright 2012 Trend Micro Inc. 16