{"id":6360,"date":"2015-08-13T10:25:12","date_gmt":"2015-08-13T10:25:12","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=6360"},"modified":"2018-05-22T08:02:54","modified_gmt":"2018-05-22T08:02:54","slug":"it-managers-are-still-puzzled-with-security-in-the-cloud","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/it-managers-are-still-puzzled-with-security-in-the-cloud\/","title":{"rendered":"IT Managers are still puzzled with Security in the Cloud"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-6361 aligncenter\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/08\/CloudSecurity-and-IT-managers.jpg\" alt=\"CloudSecurity and IT managers\" width=\"681\" height=\"397\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/08\/CloudSecurity-and-IT-managers.jpg 681w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/08\/CloudSecurity-and-IT-managers-300x175.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/08\/CloudSecurity-and-IT-managers-660x385.jpg 660w\" sizes=\"auto, (max-width: 681px) 100vw, 681px\" \/><\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/it-managers-are-still-puzzled-with-security-in-the-cloud\/#Presentation\" >Presentation:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/it-managers-are-still-puzzled-with-security-in-the-cloud\/#Present_Scenario\" >Present Scenario:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/it-managers-are-still-puzzled-with-security-in-the-cloud\/#Lack_of_confidence\" >Lack of confidence<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esds.co.in\/blog\/it-managers-are-still-puzzled-with-security-in-the-cloud\/#What_are_the_solutions\" >What are the solutions?<\/a><\/li><\/ul><\/nav><\/div>\n\n<h2><span class=\"ez-toc-section\" id=\"Presentation\"><\/span>Presentation:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">Recent studies and surveys show that CIOs and CISOs are struggling to design security in the cloud and in particular that of sensitive data.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Present_Scenario\"><\/span>Present Scenario:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">Many companies have begun transitioning to the Cloud, without establishing operational junction with the tools they exploit to protect data stored on the site. This is one of the main lessons of a global survey conducted by the Ponemon Institute on behalf of Informatica (data integration).<\/p>\n<p style=\"text-align: justify;\">According to their survey 528 CIOs and IT professionals in the European security whose answers were chosen up are generally the same concerns as their 1035 counterparts surveyed the rest of the planet.<\/p>\n<p style=\"text-align: justify;\">In this case they show particular concerns about their inability to determine where to store sensitive data from their company and how they are exposed to computer attacks.<\/p>\n<p style=\"text-align: justify;\">Thus, these technical profiles that play key role in decision making considering the adoption of the <a href=\"https:\/\/www.esds.co.in\/blog\/mobility-and-cloud-computing\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong>mobile cloud computing solution<\/strong><\/span><\/a> along with evaluating necessary standard compliance certifications (Read More &#8211; <a href=\"https:\/\/www.esds.co.in\/blog\/why-cios-are-still-inclined-to-itil-to-align-it-with-business\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong>Why CIOs are still inclined to ITIL to align IT with Business?<\/strong><\/span><\/a>) and real time infrastructure monitoring tools.<\/p>\n<p style=\"text-align: justify;\">During the past year, 57% fear of not knowing how to identify sensitive data in their company, increased to 64% in 2015. Their estimates vary greatly also on the percentage of data that can be described as confidential \u2013 about a third of those hosted in the Cloud would be\u2026<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-6362 aligncenter\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/08\/Not-knowing-where-sensitive-data-is.jpg\" alt=\"Not knowing where sensitive data is\" width=\"363\" height=\"174\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/08\/Not-knowing-where-sensitive-data-is.jpg 363w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/08\/Not-knowing-where-sensitive-data-is-300x144.jpg 300w\" sizes=\"auto, (max-width: 363px) 100vw, 363px\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Lack_of_confidence\"><\/span>Lack of confidence<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">Companies that are generally fitted: 46% have an automated solution for detecting sensitive data stored on the site (37% in the Cloud). They also implement classification technologies (68%), monitoring (61%), and encryption (51%) and risk analysis (45%).<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-6363 aligncenter\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/08\/lack-of-confidence.jpg\" alt=\"lack of confidence\" width=\"372\" height=\"351\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/08\/lack-of-confidence.jpg 372w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/08\/lack-of-confidence-300x283.jpg 300w\" sizes=\"auto, (max-width: 372px) 100vw, 372px\" \/><\/p>\n<p style=\"text-align: justify;\">But the lack of confidence in these solutions is obvious. Illustration with procedures for monitoring access to sensitive information, implemented in 70% of cases for data on-site (29% for those in the Cloud), but considered \u201clow risk\u201d by only 22% of respondents.<\/p>\n<p style=\"text-align: justify;\">In light of these statistics, the Ponemon Institute concludes that \u201cit is unlikely\u201d that a company that fails to identify its sensitive data to determine the site knows what it transferred to the Cloud.<\/p>\n<p style=\"text-align: justify;\">Teaching that is particularly true for Europe, where we observe a certain resignation in the state: 33% of sensitive or confidential data stored in the Cloud are considered vulnerable (27%).<\/p>\n<p style=\"text-align: justify;\">Furthermore, less than a third of companies, 32% have confidence in their ability to curb data leakage; 31% in their management of user access; 30% in their ability to prioritize information.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_are_the_solutions\"><\/span>What are the solutions?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">Enterprises can use either a homegrown solution followed by a Cloud service provider\u2019s guidelines or should adopt the total solution offered by a cloud service provider with the consideration of open source or proprietary solutions for both on premises and in the Cloud.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Studies and surveys conducted among CIOs and CISOs show that Security in the cloud still remains unclear for IT managers\u2026<\/p>\n","protected":false},"author":24,"featured_media":6361,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[15],"tags":[299],"class_list":["post-6360","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing","tag-cloud-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/6360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=6360"}],"version-history":[{"count":5,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/6360\/revisions"}],"predecessor-version":[{"id":9044,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/6360\/revisions\/9044"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/6361"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=6360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=6360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=6360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}