SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
THE DATA 
FACTORY 
12 Essential Facts on 
Enterprise Cloud 
Usage & Risk
The cloud is growing exponentially
AND 33% OF COMPANIES HAVE A 
“FULL STEAM AHEAD” 
attitude toward cloud adoption 
Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities”
They’re investing heavily in 
enterprise-grade cloud services
TOP 20 
ENTERPRISE 
CLOUD 
SERVICES 
1. Amazon Web Services 
2. Microsoft Office 365 
3. Salesforce 
4. Cisco WebEx 
5. Concur 
6. ServiceNow 
7. Box 
8. LivePerson 
9. Zendesk 
10. Yammer 
11. 
BMC Service 
Management 
12. Workday 
13. OpenText BPM 
14. OneDrive 
15. GoToMeeting 
16. NetSuite 
17. SuccessFactors 
18. SAS OnDemand 
19. Oracle Taleo 
20. Host Analytics
Meanwhile, there’s an explosion of 
apps employees are bringing to work 
with them
Meanwhile, there’s an explosion of 
apps employees are bringing to work 
with them 
This is called
72% of companies don’t 
of companies don’t 
know the scope of 
know the scope of 
Shadow IT in their 
in their organizations, 
organizations, but 
but want to know 
want to know 
Source: 2014 Cloud Security Alliance Survey 
“Cloud Adoption Practices and Priorities”
Consumer services may have a 
legitimate business use for some 
employees, but in many instances 
their use is unsanctioned
TOP 20 
CONSUMER 
CLOUD 
SERVICES 
in the workplace 
1. Facebook 
2. Twitter 
3. YouTube 
4. Linkedin 
5. Pinterest 
6. Gmail 
7. Instagram 
8. Tumblr 
9. Flickr 
10. Myspace 
11. Dropbox 
12. Yahoo! Mail 
13. Apple iCloud 
14. Google Drive 
15. Photobucket 
16. Spotify 
17. Shutterfly 
18. Slideshare 
19. Smugmug 
20. VK
REQUEST COMPLIMENTARY CLOUD AUDIT 
“With Skyhigh we 
discovered a wide 
range of services, 
allowing us to 
understand their 
associated risks 
and put in place 
policies to protect 
corporate data.” 
Steve Martino 
VP Information Security 
Tip: To learn what cloud apps 
are in use at your company, get a 
complimentary cloud audit
While many cloud services drive 
productivity and growth in the 
business, not all of them are secure
In response, 
IT tries to block them
However, you may not be 
blocking these apps as effectively 
as you think…
CLOUD ENFORCEMENT GAP 
Apple iCloud 
Dropbox 
Facebook 
Instagram 
Netflix 
Pandora 
Skype 
Tumblr 
Twitter 
YouTube 
The gap between 
what companies 
think they’re blocking 
and the actual 
block rates 
Intended Block Rate 
Source: 2014 Cloud Security Alliance Survey “Cloud 
Adoption Practices and Priorities” and Skyhigh Networks 
80% 
50% 
48% 
Cloud Enforcement Gap 
40% 
35% 
40% 
50% 
45% 
35% 
40% 
Actual Block Rate 
21% 
31% 
4% 
4% 
3% 
9% 
7% 
3% 
11% 
17%
Even if you want to block certain 
apps, it can be difficult to say no
49% Source: 2014 Cloud Security Alliance Survey “Cloud 
of IT professionals said they had 
been pressured into approving 
an unsecure app 
Adoption Practices and Priorities”
And even secure, sanctioned cloud 
services can be used in risky ways
Just 17% 
of companies surveyed 
reported an insider threat 
incident in the last year 
perception 
NO 52% 
NOT SURE 31% 
YES 17% 
Source: 2014 Cloud Security Alliance Survey “Cloud 
Adoption Practices and Priorities” and Skyhigh Networks 
Have you had an 
INSIDER THREAT 
INCIDENT?
Just 17% 
of companies surveyed 
reported an insider threat 
incident in the last year 
Have you had an 
INSIDER THREAT 
INCIDENT? 
But 85% 
of companies actually had 
an insider threat 
perception reality 
Source: 2014 Cloud Security Alliance Survey “Cloud 
Adoption Practices and Priorities” and Skyhigh Networks 
YES 
85% 
NO 52% 
NOT SURE 31% 
YES 17%
There will always be outliers, like this 
actual employee who may be the 
world’s worst cloud user
INTRODUCING THE CLOUD’S 
DR. EVIL 
(actual name changed to protect the accused) 
This employee used 182 high-risk 
cloud services at work, and uploaded 
data to each of these: 
SERVICE CATEGORY DATA UPLOAD RISK LEVEL 
SourceForge 
LiveLeak 
4Shared 
Codehaus 
ZippyShare 
Development 
Social Media 
File Sharing 
Development 
File Sharing 
9.3 GB 
557.7 MB 
2.6 GB 
199.6 MB 
3.0 GB 
HIGH 
HIGH 
HIGH 
HIGH 
HIGH
The good news is you can make 
progress by focusing on the top 
destinations of corporate data
Box 
Dropbox 
YouTube 
Microsoft Office 365 
Jive 
Cisco WebEx 
Facebook 
Salesforce 
Gmail 
Apple iCloud 
Google Drive 
23% 
11% 
9% 
7% 
5% 
5% 
5% 
4% 
4% 
4% 
3% 
80% 
OF DATA GOES TO 
JUST 11 
CLOUD SERVICES
Download the Full Report 
DOWNLOAD NOW 
CLOUD ADOPTION 
& RISK REPORT 
Q3 2014 
Published Q4 2014 
Get the full report with 
detailed statistics on the 
top cloud services, 
fastest growing apps, 
and risks you can avoid 
in the cloud.

Contenu connexe

En vedette

The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaSkyhigh Networks
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaAsheem Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - FranticMiika Puputti
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSkyhigh Networks
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve JobsHubSpot
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Manual administracion riesgo
Manual administracion riesgoManual administracion riesgo
Manual administracion riesgoCincoC
 
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)Jorge Millán Cabrera
 

En vedette (10)

The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and Sequoia
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Manual administracion riesgo
Manual administracion riesgoManual administracion riesgo
Manual administracion riesgo
 
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

The Data Factory: 12 Essential Facts on Enterprise Cloud Usage and Risk

  • 1. THE DATA FACTORY 12 Essential Facts on Enterprise Cloud Usage & Risk
  • 2. The cloud is growing exponentially
  • 3. AND 33% OF COMPANIES HAVE A “FULL STEAM AHEAD” attitude toward cloud adoption Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities”
  • 4. They’re investing heavily in enterprise-grade cloud services
  • 5. TOP 20 ENTERPRISE CLOUD SERVICES 1. Amazon Web Services 2. Microsoft Office 365 3. Salesforce 4. Cisco WebEx 5. Concur 6. ServiceNow 7. Box 8. LivePerson 9. Zendesk 10. Yammer 11. BMC Service Management 12. Workday 13. OpenText BPM 14. OneDrive 15. GoToMeeting 16. NetSuite 17. SuccessFactors 18. SAS OnDemand 19. Oracle Taleo 20. Host Analytics
  • 6. Meanwhile, there’s an explosion of apps employees are bringing to work with them
  • 7. Meanwhile, there’s an explosion of apps employees are bringing to work with them This is called
  • 8. 72% of companies don’t of companies don’t know the scope of know the scope of Shadow IT in their in their organizations, organizations, but but want to know want to know Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities”
  • 9. Consumer services may have a legitimate business use for some employees, but in many instances their use is unsanctioned
  • 10. TOP 20 CONSUMER CLOUD SERVICES in the workplace 1. Facebook 2. Twitter 3. YouTube 4. Linkedin 5. Pinterest 6. Gmail 7. Instagram 8. Tumblr 9. Flickr 10. Myspace 11. Dropbox 12. Yahoo! Mail 13. Apple iCloud 14. Google Drive 15. Photobucket 16. Spotify 17. Shutterfly 18. Slideshare 19. Smugmug 20. VK
  • 11. REQUEST COMPLIMENTARY CLOUD AUDIT “With Skyhigh we discovered a wide range of services, allowing us to understand their associated risks and put in place policies to protect corporate data.” Steve Martino VP Information Security Tip: To learn what cloud apps are in use at your company, get a complimentary cloud audit
  • 12. While many cloud services drive productivity and growth in the business, not all of them are secure
  • 13. In response, IT tries to block them
  • 14. However, you may not be blocking these apps as effectively as you think…
  • 15. CLOUD ENFORCEMENT GAP Apple iCloud Dropbox Facebook Instagram Netflix Pandora Skype Tumblr Twitter YouTube The gap between what companies think they’re blocking and the actual block rates Intended Block Rate Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities” and Skyhigh Networks 80% 50% 48% Cloud Enforcement Gap 40% 35% 40% 50% 45% 35% 40% Actual Block Rate 21% 31% 4% 4% 3% 9% 7% 3% 11% 17%
  • 16. Even if you want to block certain apps, it can be difficult to say no
  • 17. 49% Source: 2014 Cloud Security Alliance Survey “Cloud of IT professionals said they had been pressured into approving an unsecure app Adoption Practices and Priorities”
  • 18. And even secure, sanctioned cloud services can be used in risky ways
  • 19. Just 17% of companies surveyed reported an insider threat incident in the last year perception NO 52% NOT SURE 31% YES 17% Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities” and Skyhigh Networks Have you had an INSIDER THREAT INCIDENT?
  • 20. Just 17% of companies surveyed reported an insider threat incident in the last year Have you had an INSIDER THREAT INCIDENT? But 85% of companies actually had an insider threat perception reality Source: 2014 Cloud Security Alliance Survey “Cloud Adoption Practices and Priorities” and Skyhigh Networks YES 85% NO 52% NOT SURE 31% YES 17%
  • 21. There will always be outliers, like this actual employee who may be the world’s worst cloud user
  • 22. INTRODUCING THE CLOUD’S DR. EVIL (actual name changed to protect the accused) This employee used 182 high-risk cloud services at work, and uploaded data to each of these: SERVICE CATEGORY DATA UPLOAD RISK LEVEL SourceForge LiveLeak 4Shared Codehaus ZippyShare Development Social Media File Sharing Development File Sharing 9.3 GB 557.7 MB 2.6 GB 199.6 MB 3.0 GB HIGH HIGH HIGH HIGH HIGH
  • 23. The good news is you can make progress by focusing on the top destinations of corporate data
  • 24. Box Dropbox YouTube Microsoft Office 365 Jive Cisco WebEx Facebook Salesforce Gmail Apple iCloud Google Drive 23% 11% 9% 7% 5% 5% 5% 4% 4% 4% 3% 80% OF DATA GOES TO JUST 11 CLOUD SERVICES
  • 25. Download the Full Report DOWNLOAD NOW CLOUD ADOPTION & RISK REPORT Q3 2014 Published Q4 2014 Get the full report with detailed statistics on the top cloud services, fastest growing apps, and risks you can avoid in the cloud.