SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Cloud computing




Companies and
 collaboration

                    @lorievela
Who uses cloud computing?


                        22%
                   Professional
                     Services
                       and
                  21% Education
                 and Public Sector



                           @lorievela
Cloud adoption

             60% business
            think it could be
               their most
              significant IT
                operating
            method in 2014
             but Security is
              still an issue
                   (63%)

                       @lorievela
Security and Risk
➢The top five cloud applications deployed
company-wide are website hosting (24%),
emailhosting (23%), database hosting (22%),
servers (22%) and storage (20%)
➢Security is deemed an ongoing issue that goes

beyond cloud (74%) but is certainly a priority
➢in evaluating and managing IT delivered via

cloud (80%)
➢43% say it will not prevent them adopting more

cloud services

                                           @lorievela
Cloud supply
➢As in 2010 the key requirement of a cloud
supplier is that they provide data security and
privacy (73%) – having strong business continuity
and disaster recovery processes has grown in
importance (70%), whilst providing performance
SLAs (67%) remains the third biggest
consideration
➢Most prefer to use a mix of cloud suppliers (71%)

rather than relying on a single service provider
(25%) Methodology overview


                                            @lorievela
Conclusions


✔Security factors prevail
✔Risk evaluation of cloud

✔Data privacy and contract issues

✔Quality assurance and transition management

✔Infrastructure and service provider business




                                          @lorievela
Key enablers of the process
                 ➢ease of transition
                 (58%),
                 ➢quality assurance

                 (55%)
                 ➢while regulations

                 on the
                 security and
                 control of
                 customer data
                 (54%)

                             @lorievela
SaaS




Software as a
   Service




          @lorievela
Paas

  Platform as a Service


          Iaas


Infrastructure as a Service


                     @lorievela
Security sticking points




             Security is a partiuclar
             issue for companies in
                UK and Germany




                               @lorievela
Attitudes
74% of CIOs think IT security
is a concern whether IT
systems
and applications are delivered
via the cloud or not. Against
this backdrop, the fact that
80% see security issues as a
priority when evaluating and
managing IT via cloud
services may in part be simply
due diligence in coming to
terms with a new approach

                      @lorievela
Cloud and Risk
         For many companies,
         risk is synonymous with
         security: compromises
         in security (45%) and
         brand damage as a
         result of performance
         issues or security
         incidents (42%) are
         pinpointed as specific
         business risks
         associated with
         adopting cloud
         services.
                         @lorievela
Deployment of
       cloud

Private clouds are
particularly popular as an
option in Spain (58%),
Germany (57%) and the
UK (56%) Community
Cloud 13%



                    @lorievela
Cloud suppliers
           providing data security
           and privacy (73%)
           emerges as the most
           important factor,
           followed by business
           continuity and disaster
           recovery processes
           (70%) and the
           provision of
           performance
           assurances / SLAs
           (67%)
Future business use of cloud
     services providers



                 only one in four
                 companies would
                 opt for a single
                 supplier




                             @lorievela
Cloud computing




                    Risk or future?


Report: European CIO Cloud, adrdressing security,
                                                    @lorievela
               risk and transition

Contenu connexe

Tendances

Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
Accenture Operations
 

Tendances (20)

The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshare
 
Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
 
Corrosion Management
Corrosion ManagementCorrosion Management
Corrosion Management
 
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
 
Scalar - a brief introduction
Scalar - a brief introductionScalar - a brief introduction
Scalar - a brief introduction
 
IDC FutureScape Exec Summary Cloud
IDC FutureScape Exec Summary CloudIDC FutureScape Exec Summary Cloud
IDC FutureScape Exec Summary Cloud
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Compliance
 

Similaire à cloud computing risks

Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366
Erik Ginalick
 
Ponemon cloud security study
Ponemon cloud security studyPonemon cloud security study
Ponemon cloud security study
Dome9 Security
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paper
David Gould
 
veritas-state-of-the-hybrid-cloud-report-2016
veritas-state-of-the-hybrid-cloud-report-2016veritas-state-of-the-hybrid-cloud-report-2016
veritas-state-of-the-hybrid-cloud-report-2016
Don Harrison
 

Similaire à cloud computing risks (20)

Keys to Successful Cloud Migrations - General Dynamics Information Technology
Keys to Successful Cloud Migrations - General Dynamics Information TechnologyKeys to Successful Cloud Migrations - General Dynamics Information Technology
Keys to Successful Cloud Migrations - General Dynamics Information Technology
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
 
Why businesses are moving to the Cloud?
Why businesses are moving to the Cloud?Why businesses are moving to the Cloud?
Why businesses are moving to the Cloud?
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366
 
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
 
2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort
 
Cloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and RecoveryCloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and Recovery
 
Ponemon cloud security study
Ponemon cloud security studyPonemon cloud security study
Ponemon cloud security study
 
Cloud computing - The Trailblazer of Digital Transformation
Cloud computing - The Trailblazer of Digital TransformationCloud computing - The Trailblazer of Digital Transformation
Cloud computing - The Trailblazer of Digital Transformation
 
2019 CIO Think Tank: Pathways to Multicloud Transformation
2019 CIO Think Tank: Pathways to Multicloud Transformation2019 CIO Think Tank: Pathways to Multicloud Transformation
2019 CIO Think Tank: Pathways to Multicloud Transformation
 
Cloud Adoption Trends
Cloud Adoption TrendsCloud Adoption Trends
Cloud Adoption Trends
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paper
 
2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud Strategies
 
The Cloud Revolution
The Cloud RevolutionThe Cloud Revolution
The Cloud Revolution
 
veritas-state-of-the-hybrid-cloud-report-2016
veritas-state-of-the-hybrid-cloud-report-2016veritas-state-of-the-hybrid-cloud-report-2016
veritas-state-of-the-hybrid-cloud-report-2016
 
The future of cloud computing infographic
The future of cloud computing infographicThe future of cloud computing infographic
The future of cloud computing infographic
 
Idge dell private cloud2014 qp #1
Idge dell private cloud2014 qp #1Idge dell private cloud2014 qp #1
Idge dell private cloud2014 qp #1
 
Enterprise Cloud Adoption Survey Results
Enterprise Cloud Adoption Survey ResultsEnterprise Cloud Adoption Survey Results
Enterprise Cloud Adoption Survey Results
 
Cloud for Busieness Managers: the Good, the Bad and de Ugly
Cloud for Busieness Managers: the Good, the Bad and de UglyCloud for Busieness Managers: the Good, the Bad and de Ugly
Cloud for Busieness Managers: the Good, the Bad and de Ugly
 

Plus de Lorie Vela (7)

Informe el trabajador_autonomo_y_si_2010
Informe el trabajador_autonomo_y_si_2010Informe el trabajador_autonomo_y_si_2010
Informe el trabajador_autonomo_y_si_2010
 
Guideteamworkcollaboration
GuideteamworkcollaborationGuideteamworkcollaboration
Guideteamworkcollaboration
 
The collaborative enterprise
The collaborative enterpriseThe collaborative enterprise
The collaborative enterprise
 
How important is collaboration
How important is collaborationHow important is collaboration
How important is collaboration
 
Aprendizaje colaborativo
Aprendizaje colaborativo Aprendizaje colaborativo
Aprendizaje colaborativo
 
Teamwork conflict management survey
Teamwork conflict management surveyTeamwork conflict management survey
Teamwork conflict management survey
 
Redes sociales y enseñanza
Redes sociales y enseñanzaRedes sociales y enseñanza
Redes sociales y enseñanza
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

cloud computing risks

  • 1. Cloud computing Companies and collaboration @lorievela
  • 2. Who uses cloud computing? 22% Professional Services and 21% Education and Public Sector @lorievela
  • 3. Cloud adoption 60% business think it could be their most significant IT operating method in 2014 but Security is still an issue (63%) @lorievela
  • 4. Security and Risk ➢The top five cloud applications deployed company-wide are website hosting (24%), emailhosting (23%), database hosting (22%), servers (22%) and storage (20%) ➢Security is deemed an ongoing issue that goes beyond cloud (74%) but is certainly a priority ➢in evaluating and managing IT delivered via cloud (80%) ➢43% say it will not prevent them adopting more cloud services @lorievela
  • 5. Cloud supply ➢As in 2010 the key requirement of a cloud supplier is that they provide data security and privacy (73%) – having strong business continuity and disaster recovery processes has grown in importance (70%), whilst providing performance SLAs (67%) remains the third biggest consideration ➢Most prefer to use a mix of cloud suppliers (71%) rather than relying on a single service provider (25%) Methodology overview @lorievela
  • 6. Conclusions ✔Security factors prevail ✔Risk evaluation of cloud ✔Data privacy and contract issues ✔Quality assurance and transition management ✔Infrastructure and service provider business @lorievela
  • 7. Key enablers of the process ➢ease of transition (58%), ➢quality assurance (55%) ➢while regulations on the security and control of customer data (54%) @lorievela
  • 8. SaaS Software as a Service @lorievela
  • 9. Paas Platform as a Service Iaas Infrastructure as a Service @lorievela
  • 10. Security sticking points Security is a partiuclar issue for companies in UK and Germany @lorievela
  • 11. Attitudes 74% of CIOs think IT security is a concern whether IT systems and applications are delivered via the cloud or not. Against this backdrop, the fact that 80% see security issues as a priority when evaluating and managing IT via cloud services may in part be simply due diligence in coming to terms with a new approach @lorievela
  • 12. Cloud and Risk For many companies, risk is synonymous with security: compromises in security (45%) and brand damage as a result of performance issues or security incidents (42%) are pinpointed as specific business risks associated with adopting cloud services. @lorievela
  • 13. Deployment of cloud Private clouds are particularly popular as an option in Spain (58%), Germany (57%) and the UK (56%) Community Cloud 13% @lorievela
  • 14. Cloud suppliers providing data security and privacy (73%) emerges as the most important factor, followed by business continuity and disaster recovery processes (70%) and the provision of performance assurances / SLAs (67%)
  • 15. Future business use of cloud services providers only one in four companies would opt for a single supplier @lorievela
  • 16. Cloud computing Risk or future? Report: European CIO Cloud, adrdressing security, @lorievela risk and transition