Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:19 PM
Connect Directly

Survey: Organizations Are Cloud-Conflicted

Symantec survey finds less than 20 percent of organizations worldwide have fully implemented cloud services

A new global survey of organizations worldwide found that businesses are conflicted when it comes to cloud security: Beefing up security is the main goal for those going to the cloud, but most don't think it will actually do so.

Say what?

David Elliott, senior product marketing manager for the global cloud marketing team at Symantec, which conducted the telephone survey of 5,800 organizations in 28 different countries, says the apparent discrepancy in the responses was "a little bit of a surprise."

Some 87 percent say moving to the cloud won't affect or improve their security posture even though it's their No. 1 goal for doing it, Elliott says. "I think they are just concerned and don't know where to start. We think it's even more interesting that they consider it a top goal. They are conflicted."

A big part of the problem is experience with cloud technology. About half say their IT staff is "less than somewhat prepared" for the move to the cloud, and fewer than one in four IT staffers has experience in it. Those who have deployed cloud services relied heavily on third-party help, too: Close to 80 percent say they leaned heavily on the expertise of systems integrators, consultants, VARs, or professional services organizations.

"Half are also growing their IT staff for the cloud," Elliott says.

But while up to 81 percent are discussing cloud adoption, only 11 to 19 percent have fully implemented it. Some 19 percent have software-as-a-service; 17 percent, private infrastructure or platform-as-a-service; 17 percent, public infrastructure-as-a-service or platform-as-a-service; and 11 percent, hybrid infrastructure- or platform-as-a-service.

There's also a disconnect between their expectations and reality: Eighty-eight percent expected their cloud services to enhance their security, but only about 50 percent say it actually did.

A full copy of Symantec's new "State of the Cloud Survey" is available here (PDF) for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-08-02
IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a local user to exploit a vulnerability in Korn Shell (ksh) to gain root privileges. IBM X-Force ID: 201478.
PUBLISHED: 2021-08-02
aaPanel through 6.8.12 allows Cross-Site WebSocket Hijacking (CSWH) involving OS commands within WebSocket messages at a ws:// URL for /webssh (the victim must have configured Terminal with at least one host). Successful exploitation depends on the browser used by a potential victim (e.g., exploitat...
PUBLISHED: 2021-08-02
Specific MongoDB Rust Driver versions can include credentials used by the connection pool to authenticate connections in the monitoring event that is emitted when the pool is created. The user's logging infrastructure could then potentially ingest these events and unexpectedly leak the credentials. ...
PUBLISHED: 2021-08-02
A firmware validation issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software There is no firmware validation (e.g., cryptographic signature validation) during a File Upload for a firmware update.
PUBLISHED: 2021-08-02
A buffer overflow issue was discovered in the HMI3 Control Panel contained within the Swisslog Healthcare Nexus Panel, operated by released versions of software before Nexus Software A buffer overflow allows an attacker to overwrite an internal queue data structure and can lead to remote co...