Security Standoff In The Cloud?

CA Technologies and the Ponemon Institute, an independent research firm specializing in privacy, data protection and information security policy, recently released a study that shows cloud providers and cloud consumers are not aligned on cloud security. Their conflicting views on focus, priority and responsibility suggest a pending security standoff between cloud providers and cloud users.

The study, "Security of Cloud Computing Providers," indicates that cloud providers are more focused on delivering the benefits of cost and speed of deployment, the top two reasons cited for migrating to cloud computing. The majority of cloud providers (79 percent) allocate just 10 percent or less of IT resources to security or control-related activities. This result is consistent with the finding that less than half of the respondents agree or strongly agree that security is a priority.

"The focus on reduced cost and faster deployment may be sufficient for cloud providers now, but as organizations reach the point where increasingly sensitive data and applications are all that remains to migrate to the cloud, they will quickly reach an impasse," said Mike Denning, general manager, Security, CA Technologies. "If the risk of breach outweighs potential cost savings and agility, we may reach a point of 'cloud stall' -- where cloud adoption slows or stops -- until organizations believe cloud security is as good as or better than enterprise security."

Additional key findings include:

  • Less than 20 percent of cloud providers across the U.S. and Europe view security as a competitive advantage. Fewer than 30 percent of respondents consider security as an important responsibility. Less than 27 percent of respondents feel their cloud services substantially protect and secure customer information.
  • The majority of cloud providers (69 percent) believe security is primarily the responsibility of the cloud user; this contrasts with 35 percent of cloud users who believe security is their responsibility. Just 16 percent of cloud providers feel security is a shared responsibility, compared to 33 percent of cloud users who believe the duty should be shared. Thirty-two percent of both cloud providers and cloud users say security is the responsibility of the provider.
  • Cloud providers and cloud users disagree widely on the degree to which they saw intellectual property (IP) being too sensitive for the cloud. Sixty-eight percent of cloud users felt their IP was too risky for cloud use, compared to just 42 percent of cloud providers.

"Given the well-publicized concerns about the potential risks to organizations' sensitive and confidential information in the cloud, we believe it is only a matter of time until users of cloud computing solutions will demand enhanced security systems," said Dr. Larry Ponemon, chairman and founder, Ponemon Institute. "However, until this happens, users of cloud computing should be aware of their responsibility to assess the risks before migrating to the cloud. They should thoroughly vet providers and their applications and infrastructure for their ability to safeguard information. Finally, cloud users and providers should consider the importance of joint responsibility to create a secure computing environment."

Featured

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.