SlideShare a Scribd company logo
1 of 28
Download to read offline
O F T H E
S T A T E
C L O U D
2015
A recent study by the Cloud Security
Alliance investigated how companies are
using cloud apps
What they found may surprise you
Employees are racing to use cloud apps,
but their companies are more hesitant
when it comes to moving to the cloud
The average employee
actively uses 28 cloud
apps at work
But most companies are
MOVING
WITH CAUTION
11%
Not a priority
45%
Moving with caution
33%
Full steam ahead
15%
Early stages of investigation
That’s because IT professionals read
the same news as everyone else
So it’s not surprising that security is the
top barrier to cloud projects
Concern about the security of data 73%
Concern about regulatory compliance 38%
Loss of control over IT services 38%
Knowledge and experience of both
IT and business managers 34%
Concern over compromised
accounts or insider threats 30%
Concern over business continuity
or disaster recovery 28%
After Target lost $162 million
in a data breach, security is
not just an IT concern
20%
Not Sure
19%
No
61%
Yes
Security of data in the cloud is an executive-level and
board-level concern at a majority of companies
(Is cloud security an executive or board-level concern at your company?)
The challenge is that most cloud usage is in
a company’s blind spot
With so many free and low-cost
apps available, employees are
bringing their own apps to work
And using them to store company data
In many cases, employees do not evaluate
the security controls of these apps, or even
read the terms and conditions
I agree to the terms & conditions.
Accept
Producing what’s called
Shadow IT
Shadow IT
noun | /ʃædoʊ ɑɪ tʰi/
Information technology employees
bring to work without the knowledge
or permission of the IT department.
say they don’t know how many cloud apps are in
use at their company...
72% of IT professionals
say they don’t know how many cloud apps are in
use at their company...
72% of IT professionals
72%
Don’t know,
but want to know
20%
Don’t know,
and don’t care
8%
Know
But they want to know
Regardless of how many apps there are,
employees want more
of IT professionals
receive requests from
business users for new
cloud apps each month
79%
These are the most frequently requested
cloud app categories
(Within IT professionals who
receive requests, percentage
of professionals who receive
requests for each category)
80%File sharing and collaboration
Box, Dropbox, Google Docs, Office 365, etc.
41%Communication
HipChat, Skype, Webex, Yammer, etc.
38%Social media
Facebook, LinkedIn, Twitter, etc.
27%Content sharing
Flickr, Instagram, Pinterest, YouTube, etc.
20%Enterprise content management
Saperion, OpenText, SpringCM, etc.
20%Development
Codehaus, Github, MSDN, SourceForge, etc.
20%Marketing
Hubspot, Mail Chimp, Marketo, etc.
18%Sales productivity
Clari, ClearSlide Infer, RelatelQ, etc.
16%Business intelligence
Birst, Tableau, QlikView, Teradata, etc.
Despite security concerns,
cloud apps make employees
18.8% more productive
They also reduce IT cost by
15.1%
With cloud apps
Without cloud apps
And crucially, these companies also grow
than those that don’t take advantage of
the cloud
19.6% faster
To balance these benefits with potential
risks, companies are investing in security
Cloud security tops the list of security priorities
(Percent of IT professionals who rate projects “very important”)
Firewall/proxy
Mobile device managemenet
Endpoint protection
Cloud security 42%
Intrusion prevention 41%
35%
29%
29%
Log management 23%
DOWNLOAD NOW
Brought to you by
The Cloud Encryption Handbook:
Alexandra Boldyreva , Ph.D. Computer Science,
M.S., B.S. Applied Mathematics
Paul Grubbs, B.S., Mathematics, Computer Science
ENCRYPTION SCHEMES
AND THEIR RELATIVE
STRENGTHS AND
WEAKNESSES
http://bit.ly/CSASurvey2015
Download the full report
to get all the findings
Cloud Adoption Practices
& Priorities Survey Report
January 2015

More Related Content

What's hot

The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) Lori MacVittie
 
Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Prayukth K V
 
Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital WorkplaceCitrix
 
Apple and ibm partnership
Apple and ibm partnershipApple and ibm partnership
Apple and ibm partnershipteam-abr
 
Infographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroInfographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroIBM Security
 
Blockchain 101 for Financial Services
Blockchain 101 for Financial ServicesBlockchain 101 for Financial Services
Blockchain 101 for Financial ServicesAppian
 
Trends in Cloud Computing 2016
Trends in Cloud Computing 2016Trends in Cloud Computing 2016
Trends in Cloud Computing 2016CompTIA
 
Cloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and RecoveryCloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and RecoveryRapidScale
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene Microsoft
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIBM Security
 
[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud[Infographic] Productivity in the Cloud
[Infographic] Productivity in the CloudRapidScale
 
2014 Technology Predictions
2014 Technology Predictions2014 Technology Predictions
2014 Technology Predictionse-Zest Solutions
 
State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights Lori MacVittie
 
Not Using Cloud? 5 Stats Show You're Already Behind
Not Using Cloud?  5 Stats Show You're Already BehindNot Using Cloud?  5 Stats Show You're Already Behind
Not Using Cloud? 5 Stats Show You're Already BehindAvni Rajput
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...Black Duck by Synopsys
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeSysfore Technologies
 
In Cloud We Trust
In Cloud We TrustIn Cloud We Trust
In Cloud We TrustRapidScale
 
Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?shawnnewman
 

What's hot (20)

The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change)
 
Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015
 
Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Apple and ibm partnership
Apple and ibm partnershipApple and ibm partnership
Apple and ibm partnership
 
Infographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroInfographic: Cloud Security Superhero
Infographic: Cloud Security Superhero
 
Blockchain 101 for Financial Services
Blockchain 101 for Financial ServicesBlockchain 101 for Financial Services
Blockchain 101 for Financial Services
 
Trends in Cloud Computing 2016
Trends in Cloud Computing 2016Trends in Cloud Computing 2016
Trends in Cloud Computing 2016
 
Cloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and RecoveryCloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and Recovery
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud
 
2014 Technology Predictions
2014 Technology Predictions2014 Technology Predictions
2014 Technology Predictions
 
State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights
 
Not Using Cloud? 5 Stats Show You're Already Behind
Not Using Cloud?  5 Stats Show You're Already BehindNot Using Cloud?  5 Stats Show You're Already Behind
Not Using Cloud? 5 Stats Show You're Already Behind
 
2019 Technology Trends
2019 Technology Trends 2019 Technology Trends
2019 Technology Trends
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | Sysfore
 
In Cloud We Trust
In Cloud We TrustIn Cloud We Trust
In Cloud We Trust
 
Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?
 

Viewers also liked

How to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouHow to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouSkyhigh Networks
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines Skyhigh Networks
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaAsheem Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - FranticMiika Puputti
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSkyhigh Networks
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve JobsHubSpot
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Cloud Predictions 2016
Cloud Predictions 2016Cloud Predictions 2016
Cloud Predictions 2016Aaron Klein
 
Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Alert Logic
 

Viewers also liked (11)

How to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouHow to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink You
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud Predictions 2016
Cloud Predictions 2016Cloud Predictions 2016
Cloud Predictions 2016
 
Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016
 

Similar to State of the Cloud in 2015

Cloud for Busieness Managers: the Good, the Bad and de Ugly
Cloud for Busieness Managers: the Good, the Bad and de UglyCloud for Busieness Managers: the Good, the Bad and de Ugly
Cloud for Busieness Managers: the Good, the Bad and de UglyMiguel Garcia
 
Cloud for Business Managers
Cloud for Business ManagersCloud for Business Managers
Cloud for Business ManagersMiguel Garcia
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsArgyle Executive Forum
 
Ibm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryIbm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryEmisor Digital
 
Cloud Native Development
Cloud Native DevelopmentCloud Native Development
Cloud Native DevelopmentLCDF
 
The 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportThe 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportibossCyber
 
2019 Data Trends Survey Results
2019 Data Trends Survey Results2019 Data Trends Survey Results
2019 Data Trends Survey ResultsPrecisely
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsBitglass
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceBlueboxer2014
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudySoftchoice Corporation
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationCloudLock
 
Data Trends for 2019: Extracting Value from Data
Data Trends for 2019: Extracting Value from DataData Trends for 2019: Extracting Value from Data
Data Trends for 2019: Extracting Value from DataPrecisely
 

Similar to State of the Cloud in 2015 (20)

Cloud for Busieness Managers: the Good, the Bad and de Ugly
Cloud for Busieness Managers: the Good, the Bad and de UglyCloud for Busieness Managers: the Good, the Bad and de Ugly
Cloud for Busieness Managers: the Good, the Bad and de Ugly
 
Cloud for Business Managers
Cloud for Business ManagersCloud for Business Managers
Cloud for Business Managers
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
Ibm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryIbm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summary
 
Cloud Native Development
Cloud Native DevelopmentCloud Native Development
Cloud Native Development
 
The 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportThe 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends Report
 
2019 Data Trends Survey Results
2019 Data Trends Survey Results2019 Data Trends Survey Results
2019 Data Trends Survey Results
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud Threats
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
Data Trends for 2019: Extracting Value from Data
Data Trends for 2019: Extracting Value from DataData Trends for 2019: Extracting Value from Data
Data Trends for 2019: Extracting Value from Data
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

State of the Cloud in 2015

  • 1. O F T H E S T A T E C L O U D 2015
  • 2. A recent study by the Cloud Security Alliance investigated how companies are using cloud apps
  • 3. What they found may surprise you
  • 4. Employees are racing to use cloud apps, but their companies are more hesitant when it comes to moving to the cloud
  • 5. The average employee actively uses 28 cloud apps at work
  • 6. But most companies are MOVING WITH CAUTION 11% Not a priority 45% Moving with caution 33% Full steam ahead 15% Early stages of investigation
  • 7. That’s because IT professionals read the same news as everyone else
  • 8. So it’s not surprising that security is the top barrier to cloud projects Concern about the security of data 73% Concern about regulatory compliance 38% Loss of control over IT services 38% Knowledge and experience of both IT and business managers 34% Concern over compromised accounts or insider threats 30% Concern over business continuity or disaster recovery 28%
  • 9. After Target lost $162 million in a data breach, security is not just an IT concern
  • 10. 20% Not Sure 19% No 61% Yes Security of data in the cloud is an executive-level and board-level concern at a majority of companies (Is cloud security an executive or board-level concern at your company?)
  • 11. The challenge is that most cloud usage is in a company’s blind spot
  • 12. With so many free and low-cost apps available, employees are bringing their own apps to work
  • 13. And using them to store company data
  • 14. In many cases, employees do not evaluate the security controls of these apps, or even read the terms and conditions I agree to the terms & conditions. Accept
  • 16. Shadow IT noun | /ʃædoʊ ɑɪ tʰi/ Information technology employees bring to work without the knowledge or permission of the IT department.
  • 17. say they don’t know how many cloud apps are in use at their company... 72% of IT professionals
  • 18. say they don’t know how many cloud apps are in use at their company... 72% of IT professionals 72% Don’t know, but want to know 20% Don’t know, and don’t care 8% Know But they want to know
  • 19. Regardless of how many apps there are, employees want more
  • 20. of IT professionals receive requests from business users for new cloud apps each month 79%
  • 21. These are the most frequently requested cloud app categories
  • 22. (Within IT professionals who receive requests, percentage of professionals who receive requests for each category) 80%File sharing and collaboration Box, Dropbox, Google Docs, Office 365, etc. 41%Communication HipChat, Skype, Webex, Yammer, etc. 38%Social media Facebook, LinkedIn, Twitter, etc. 27%Content sharing Flickr, Instagram, Pinterest, YouTube, etc. 20%Enterprise content management Saperion, OpenText, SpringCM, etc. 20%Development Codehaus, Github, MSDN, SourceForge, etc. 20%Marketing Hubspot, Mail Chimp, Marketo, etc. 18%Sales productivity Clari, ClearSlide Infer, RelatelQ, etc. 16%Business intelligence Birst, Tableau, QlikView, Teradata, etc.
  • 23. Despite security concerns, cloud apps make employees 18.8% more productive
  • 24. They also reduce IT cost by 15.1%
  • 25. With cloud apps Without cloud apps And crucially, these companies also grow than those that don’t take advantage of the cloud 19.6% faster
  • 26. To balance these benefits with potential risks, companies are investing in security
  • 27. Cloud security tops the list of security priorities (Percent of IT professionals who rate projects “very important”) Firewall/proxy Mobile device managemenet Endpoint protection Cloud security 42% Intrusion prevention 41% 35% 29% 29% Log management 23%
  • 28. DOWNLOAD NOW Brought to you by The Cloud Encryption Handbook: Alexandra Boldyreva , Ph.D. Computer Science, M.S., B.S. Applied Mathematics Paul Grubbs, B.S., Mathematics, Computer Science ENCRYPTION SCHEMES AND THEIR RELATIVE STRENGTHS AND WEAKNESSES http://bit.ly/CSASurvey2015 Download the full report to get all the findings Cloud Adoption Practices & Priorities Survey Report January 2015