Cloud Security Research Reveals Challenges, Areas of Growth in Upcoming Years

Cloud Security Research Reveals Challenges, Areas of Growth in Upcoming Years

While cloud services are becoming increasingly popular for business use, cyberattacks on cloud services are also growing. This has prompted a rise in cloud security software.

Two reports on cloud security were recently released: The 2019 Cloud Security Report and the Global Cloud Security Software Market report. The latter is a five-year forecast that covers 2019 through 2024. These reports showed where growth lies within the cloud security market and what challenges are presented to businesses who use or are looking to use cloud services.

Many businesses are actively transitioning to cloud services, and as a result, it's anticipated the cloud security market will grow at a CAGR of 4.98% over the next five years. In 2018, the market was valued at USD $28.1 billion, and it is anticipated to reach a market value of USD 35.6 billion by 2024.

Technology is rapidly changing and becoming more complex, leaving room for the addition of innovative technologies such as cloud services for operations and data management. In addition, there is an increasing number of expensive cloud-related cyberattacks. According to the 2018 Cost of a Data Breach Study by Ponemon Institute, the average cost of a data breach in 2018 was USD 3.86 million. The ease of cloud services use combined with the high cost and increasing rate of cloud-related attacks is driving the cloud security market to rapid growth.

The 2019 Cloud Security Report showed the drive behind why the market is experiencing such large growth, as 64 percent of respondents said data loss and leakage is their top cloud security concern.

The biggest perceived vulnerabilities to cloud security are unauthorized access through misuse of employee credentials and improper access controls accounts, and insecure interfaces and APIs accounts. Both individually accounted for 42 percent of the perceived vulnerabilities.

The Global Cloud Security Software Market report found that one of the key market trends is Intrusion Detection and Prevention Software. According to Insider Threat 2018 report, 63 percent of insider exploits are detected through IDPS.

About the Author

Kaitlyn DeHaven is the Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Securing the Future

    Two security experts sit down with Security Today’s editor in chief Ralph C. Jensen to discuss what they see emerging and changing over the next several years along with how security stakeholders can harness these innovations into opportunities. Read Now

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

  • Creating More Versatility

    Today, AI has become top of mind for most security professionals. It is the topic of conversation in the technology world and continues to transform the way data is used to make important business decisions. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities