What are you looking for ?
Infinidat
Articles_top

85% of Enterprises Keeping Sensitive Data in Cloud – Vormetric/451 Research

70% very or extremely concerned about it

Vormetric, Inc., in enterprise data security for physical, big data, public, private and hybrid cloud environments, announced the results of its cloud, big data and Internet of Things (IoT) focused edition of the 2016 Vormetric Data Threat Report (DTR) issued in conjunction with analyst firm 451 Research LLC.

Polling for the report features the responses of 1,100 senior IT security executives at large enterprises worldwide. This edition of the 4th annual report extends earlier findings in the global edition with a focus on the risks to data in emerging cloud, big data and IoT usage by enterprises.

To get both reports (registration needed)

Security is still an afterthought when it comes to adopting new technologies, often taking a back seat amidst the rush to stake a claim in a promising new market,” said Garrett Bekker, senior analyst, information security, 451 Research, and the author of the report. “We found that enterprises are storing sensitive data in just these types of environments – 85% in cloud, 50% in big data, and 33% in IoT. Many have strong concerns about the security of their data as a result.”

Storage of critical information
within cloud and big data environments
also continues to increase, adding to these concerns:

  • Cloud: 85% of respondents are using sensitive data in the cloud, up from 54% last year
  • Big data: 50% are using sensitive data within big data implementations, up from 31% previously

Focus on the Cloud
Even as they move forward with adopting cloud services, and in some cases believe that cloud environments are more secure than their local IT infrastructure, enterprises remain concerned about the security of their information.

When respondents were asked
about the top data security concerns for cloud services:

  • 70% (75% U.S.) note security breaches / attacks at the service provider
  • 66% (73% U.S.) cite increased vulnerabilities from shared infrastructure
  • 66% (70% U.S.) call out lack of control over the location of data
  • 65% (71% U.S.) select lack of a data privacy policy or privacy service level agreement

In addition, for cloud service providers who want
to grow their enterprise business,
respondents cited four top changes
that would increase their willingness to use cloud services:

  • 48% (49% U.S.) ask for encryption of data with enterprise key control on their premises
  • 36% (35% U.S.) desire detailed physical and IT security implementation information
  • 35% (34% U.S.) select encryption of their organization’s data within the service provider’s infrastructure
  • 27% (global and U.S.) also want exposure of security monitoring data for their information.

The most notable change from last year’s results concerned were encryption keys should be managed or stored. In the 2015 report, management of keys by service providers, or locally by the enterprise were very close to equally rated. This year enterprises seem to have realized that control and management of encryption keys is the critical link in securing their data in the cloud. Only 35% cite management of encryption keys by the cloud provider as a way to increase their usage of cloud, down from 53% last year.

Do You Know Location of Your Sensitive Data?
Vormetric,451 Research

At QTS, our data center, cloud, hosting and managed services offerings are designed to meet and exceed enterprise needs for compliance, safety and security,” said Peter Weber, chief product officer, QTS Realty Trust, Inc.The results of the report highlight the needs of organizations to work with partners like QTS to secure environments and help protect them from data breaches and meet compliance requirements while providing the flexibility needed to grow business.

Focus on big data
With 50% of all respondents planning to store sensitive information within big data environments (up from 31% last year), big data environments have become a much greater concern for enterprises as a possible point of compromise, and as a focus for compliance efforts. As these environments hold a growing share of an enterprise’s sensitive information, the challenges for organizations that need to secure their data grows. Essentially, the entire environment requires protection, as data migrates to wherever it is needed for analysis within big data implementations.

Results we found bear this out, with organizations seeing many potential points of concern.

The top 5 concerns included:

  • Security of the reports produced, as they may include sensitive data (42%)
  • Sensitive information may reside anywhere within the environment (41%)
  • Privacy violations from data originating in multiple countries (40%)
  • Privileged user access to protected data in the implementation (37%)
  • Lack of security frameworks and controls within the environment (33%)

In addition, big data projects frequently rely on cloud-based service delivery, causing double jeopardy issues. For many organizations the threats found in cloud environments are then added to their concerns with big data.

Focus on IoT
IoT promises to present a security hurdle of epic proportions,” emphasized Bekker. “Given the vast amounts of data that could theoretically be generated by IoT devices and platforms, much of it sensitive in nature, enterprises would be well served to develop corporate policies that clearly delineate what will be collected, who will have access, how the data is used, and how long it will be retained.”

Though only 33% of organizations expect
to have sensitive data within IoT implementations,
they have strong concerns about the safety of that information:

  • Protecting sensitive data generated by IoT (35%)
  • Privacy violations (30%)
  • Identifying which data is sensitive (29%)
  • Privileged user access to IoT data and devices (28%)
  • Attacks on IoT devices may impact critical operations (27%)

Fueling these concerns is also the intersection of IoT with big data, which has the potential to create a new class of risks. This class of risks centers on the potential for privacy violations when large, seemingly innocuous IoT data sets are combined, or are analyzed in conjunction with other information.

As cloud, big data and IoT adoption accelerates, these technologies continue to bring new sets of unique risks to organizations,” said Tina Stewart, VP marketing, Vormetric. “These risks are driven by the nature of these emerging technology solutions, and the breakneck speed at which new offerings are being developed. With the recent emergence of offerings that have increased data security options built in, or available through partners, service providers and offerings are gradually making available the security controls that enterprises need to meet regulatory and compliance obligations as well as other data security requirements. But there is still much work to be done.”

Source/Methodology
The data in this study is based on Web and phone interviews of 1,114 senior executives in Australia, Brazil, Germany, Japan, the UK and the U.S. Most have a major influence on or are the sole decision maker for IT at their respective companies. Respondents represented the following industries: automotive, education, energy, engineering, federal government, healthcare, IT, retail, and telecommunications.

Articles_bottom
AIC
ATTO
OPEN-E