Security Standoff In The Cloud?

CA Technologies and the Ponemon Institute, an independent research firm specializing in privacy, data protection and information security policy, recently released a study that shows cloud providers and cloud consumers are not aligned on cloud security. Their conflicting views on focus, priority and responsibility suggest a pending security standoff between cloud providers and cloud users.

The study, "Security of Cloud Computing Providers," indicates that cloud providers are more focused on delivering the benefits of cost and speed of deployment, the top two reasons cited for migrating to cloud computing. The majority of cloud providers (79 percent) allocate just 10 percent or less of IT resources to security or control-related activities. This result is consistent with the finding that less than half of the respondents agree or strongly agree that security is a priority.

"The focus on reduced cost and faster deployment may be sufficient for cloud providers now, but as organizations reach the point where increasingly sensitive data and applications are all that remains to migrate to the cloud, they will quickly reach an impasse," said Mike Denning, general manager, Security, CA Technologies. "If the risk of breach outweighs potential cost savings and agility, we may reach a point of 'cloud stall' -- where cloud adoption slows or stops -- until organizations believe cloud security is as good as or better than enterprise security."

Additional key findings include:

  • Less than 20 percent of cloud providers across the U.S. and Europe view security as a competitive advantage. Fewer than 30 percent of respondents consider security as an important responsibility. Less than 27 percent of respondents feel their cloud services substantially protect and secure customer information.
  • The majority of cloud providers (69 percent) believe security is primarily the responsibility of the cloud user; this contrasts with 35 percent of cloud users who believe security is their responsibility. Just 16 percent of cloud providers feel security is a shared responsibility, compared to 33 percent of cloud users who believe the duty should be shared. Thirty-two percent of both cloud providers and cloud users say security is the responsibility of the provider.
  • Cloud providers and cloud users disagree widely on the degree to which they saw intellectual property (IP) being too sensitive for the cloud. Sixty-eight percent of cloud users felt their IP was too risky for cloud use, compared to just 42 percent of cloud providers.

"Given the well-publicized concerns about the potential risks to organizations' sensitive and confidential information in the cloud, we believe it is only a matter of time until users of cloud computing solutions will demand enhanced security systems," said Dr. Larry Ponemon, chairman and founder, Ponemon Institute. "However, until this happens, users of cloud computing should be aware of their responsibility to assess the risks before migrating to the cloud. They should thoroughly vet providers and their applications and infrastructure for their ability to safeguard information. Finally, cloud users and providers should consider the importance of joint responsibility to create a secure computing environment."

Featured

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

  • Optimizing Security and Business Performance with Clarity and Control

    In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification. Read Now

  • Father of Georgia School Shooting Suspect Charged in Connection With Attack

    Colin Gray, the father of the 14-year-old Georgia school shooting suspect, has also been charged in connection with the attack. The 54-year-old father was charged with four counts of involuntary manslaughter, two counts of second-degree murder and eight counts of cruelty to children. More charges are expected. Read Now

  • Enhancing Security and Business Intelligence

    From border security to parking lots, ALPR has gained traction across multiple use cases as the technology becomes more accurate and affordable than ever. I spoke with Jason Cook, business development director at Vaxtor, a leader in ALPR AI-based analytics, and Rui Barbosa, category manager, Surveillance Products at i-PRO, a maker of AI-enabled security cameras, to delve into the latest advancements and applications of ALPR technology. Automated License Plate Recognition (ALPR) has transformed significantly over the years, evolving from a niche technology into a powerful tool for a wide range of applications, particularly in border security. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3