Survey Shows Cloud Infrastructure Security A Major ChallengeSurvey Shows Cloud Infrastructure Security A Major Challenge
Two-thirds of IT security professionals say that network security has become more difficult over the last two years with growing complexity in managing heterogeneous network environments.
March 29, 2016

A new report finds that CISOs struggle with right policies and processes to keep up with deployments of a myriad of cloud technologies.
The survey of 150 security professionals, commissioned by network security vendor Tufin and Enterprise Strategy Group, indicates the major factors in securing IT infrastructure are the increasing number of devices joining the network, more technologies in use, and a rise in new applications being deployed.
Some 69% of organizations are still in the process of adopting and applying security policies to their cloud infrastructure, and 63% say network security challenges in the past two years have inceased with the shift towards cloud computing, whether public, private, or hybrid.
The survey also shows that of all the organizations operating private/public cloud services, 49% believe their security team lacks the high level of skills required to secure cloud infrastructure. They also struggle to obtain similar visibility and security controls into the cloud environment as in their physical network.
According to Ruvi Kitov, CEO and co-founder of Tufin, organizations are increasingly moving their mission-critical applications to the cloud to modernize IT operations, but are facing issues keeping security policies in place due to a resource gap.
Around 90% of security professionals agreed that network security operations automation is critical to their IT initiatives, and 85% of them believed that automation can help their operations team to do more with existing resources, improve execution of security policies, and reduce human errors resulting in security misconfiguration.
See the full findings of the survey here.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023