SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Cloud computing




Business and
collaboration

                    @lorievela
Who uses cloud computing?


                        22%
                   Professional
                     Services
                       and
                  21% Education
                 and Public Sector



                           @lorievela
Cloud adoption

            60% businesses
            think it could be
               their most
              significant IT
                operating
            method in 2014
             but Security is
              still an issue
                   (63%)

                       @lorievela
Security and Risk
➱The top five cloud applications deployed
company-wide are website hosting (24%),
emailhosting (23%), database hosting (22%),
servers (22%) and storage (20%)
➱Security is deemed an ongoing issue that goes

beyond the cloud (74%)
➱but is certainly a priority in evaluating and

managing IT delivered via cloud (80%)
➱43% say it will not prevent them adopting more

cloud services

                                           @lorievela
Cloud supply
➱As in 2010 the key requirement of a cloud
supplier is that they provide data security and
privacy (73%) – having strong business continuity
and disaster recovery processes has grown in
importance (70%), whilst providing performance
SLAs (67%) remains the third biggest
consideration
➱Most prefer to use a mix of cloud suppliers (71%)

rather than relying on a single service provider
(25%)


                                            @lorievela
Conclusions


✔Security factors prevail
✔Risk evaluation of cloud

✔Data privacy and contract issues

✔Quality assurance and transition management

✔Infrastructure and service provider business




                                          @lorievela
Key enablers of the process
                 ➱ease of transition
                 (58%),
                 ➱quality assurance

                 (55%)
                 ➱while regulations

                 on the
                 security and
                 control of
                 customer data
                 (54%)

                             @lorievela
SaaS




Software as a
   Service




          @lorievela
Paas

  Platform as a Service


          Iaas


Infrastructure as a Service


                     @lorievela
Security sticking points




             Security is a partiuclar
             issue for companies in
                UK and Germany




                               @lorievela
Attitudes
74% of CIOs think IT security
is a concern whether IT
systems
and applications are delivered
via the cloud or not. Against
this backdrop, the fact that
80% see security issues as a
priority when evaluating and
managing IT via cloud
services may in part be simply
due diligence in coming to
terms with a new approach

                      @lorievela
Cloud and Risk
         For many companies,
         risk is synonymous with
         security: compromises
         in security (45%) and
         brand damage as a
         result of performance
         issues or security
         incidents (42%) are
         pinpointed as specific
         business risks
         associated with
         adopting cloud
         services.
                         @lorievela
Deployment of
       cloud


Private clouds are
particularly popular as an
option in Spain (58%),
Germany (57%) and the
UK (56%)




                    @lorievela
Cloud suppliers
           providing data security
           and privacy (73%)
           emerges as the most
           important factor,
           followed by business
           continuity and disaster
           recovery processes
           (70%) and the
           provision of
           performance
           assurances / SLAs
           (67%)
Future business use of cloud
     services providers



                 only one in four
                 companies would
                 opt for a single
                 supplier




                             @lorievela
Cloud computing




                   Risk or future?


Report: European CIO Cloud, addressing security,
                                                   @lorievela
               risk and transition

Weitere Àhnliche Inhalte

Was ist angesagt?

The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNAaccenture
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Technology
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Accenture Operations
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesHugo Rodrigues
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementCHRIS CLIFFORD
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - IrelandAccenture Security
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing InnoTech
 
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...Veritas Technologies LLC
 
Scalar - a brief introduction
Scalar - a brief introductionScalar - a brief introduction
Scalar - a brief introductionScalar Decisions
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegifyflashnewsrelease
 
Next-Gen Security for SDDC Infographic
Next-Gen Security for SDDC InfographicNext-Gen Security for SDDC Infographic
Next-Gen Security for SDDC InfographicVMware Academy
 

Was ist angesagt? (20)

The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
 
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
 
Scalar - a brief introduction
Scalar - a brief introductionScalar - a brief introduction
Scalar - a brief introduction
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegify
 
Next-Gen Security for SDDC Infographic
Next-Gen Security for SDDC InfographicNext-Gen Security for SDDC Infographic
Next-Gen Security for SDDC Infographic
 

Ähnlich wie Cloudrisks

Keys to Successful Cloud Migrations - General Dynamics Information Technology
Keys to Successful Cloud Migrations - General Dynamics Information TechnologyKeys to Successful Cloud Migrations - General Dynamics Information Technology
Keys to Successful Cloud Migrations - General Dynamics Information TechnologyMarket Connections, Inc.
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAMPing Identity
 
Why businesses are moving to the Cloud?
Why businesses are moving to the Cloud?Why businesses are moving to the Cloud?
Why businesses are moving to the Cloud?Ospero
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Erik Ginalick
 
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First EnterprisesOpsRamp
 
2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by SyncsortPrecisely
 
Cloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and RecoveryCloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and RecoveryRapidScale
 
Cloud computing - The Trailblazer of Digital Transformation
Cloud computing - The Trailblazer of Digital TransformationCloud computing - The Trailblazer of Digital Transformation
Cloud computing - The Trailblazer of Digital TransformationRapidValue
 
Ponemon cloud security study
Ponemon cloud security studyPonemon cloud security study
Ponemon cloud security studyDome9 Security
 
2019 CIO Think Tank: Pathways to Multicloud Transformation
2019 CIO Think Tank: Pathways to Multicloud Transformation2019 CIO Think Tank: Pathways to Multicloud Transformation
2019 CIO Think Tank: Pathways to Multicloud TransformationIBM
 
2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index ReportAndrew James
 
Cloud Adoption Trends
Cloud Adoption TrendsCloud Adoption Trends
Cloud Adoption TrendsExtreme Networks
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paperDavid Gould
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesEMC
 
veritas-state-of-the-hybrid-cloud-report-2016
veritas-state-of-the-hybrid-cloud-report-2016veritas-state-of-the-hybrid-cloud-report-2016
veritas-state-of-the-hybrid-cloud-report-2016Don Harrison
 
The Cloud Revolution
The Cloud RevolutionThe Cloud Revolution
The Cloud RevolutionAll Covered
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxcVidya Networks
 
Idge dell private cloud2014 qp #1
Idge dell private cloud2014 qp #1Idge dell private cloud2014 qp #1
Idge dell private cloud2014 qp #1jmariani14
 
The future of cloud computing infographic
The future of cloud computing infographicThe future of cloud computing infographic
The future of cloud computing infographicAndrew Mellish
 
Enterprise Cloud Adoption Survey Results
Enterprise Cloud Adoption Survey ResultsEnterprise Cloud Adoption Survey Results
Enterprise Cloud Adoption Survey ResultsEverest Group
 

Ähnlich wie Cloudrisks (20)

Keys to Successful Cloud Migrations - General Dynamics Information Technology
Keys to Successful Cloud Migrations - General Dynamics Information TechnologyKeys to Successful Cloud Migrations - General Dynamics Information Technology
Keys to Successful Cloud Migrations - General Dynamics Information Technology
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
 
Why businesses are moving to the Cloud?
Why businesses are moving to the Cloud?Why businesses are moving to the Cloud?
Why businesses are moving to the Cloud?
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366
 
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
 
2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort
 
Cloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and RecoveryCloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and Recovery
 
Cloud computing - The Trailblazer of Digital Transformation
Cloud computing - The Trailblazer of Digital TransformationCloud computing - The Trailblazer of Digital Transformation
Cloud computing - The Trailblazer of Digital Transformation
 
Ponemon cloud security study
Ponemon cloud security studyPonemon cloud security study
Ponemon cloud security study
 
2019 CIO Think Tank: Pathways to Multicloud Transformation
2019 CIO Think Tank: Pathways to Multicloud Transformation2019 CIO Think Tank: Pathways to Multicloud Transformation
2019 CIO Think Tank: Pathways to Multicloud Transformation
 
2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report
 
Cloud Adoption Trends
Cloud Adoption TrendsCloud Adoption Trends
Cloud Adoption Trends
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paper
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud Strategies
 
veritas-state-of-the-hybrid-cloud-report-2016
veritas-state-of-the-hybrid-cloud-report-2016veritas-state-of-the-hybrid-cloud-report-2016
veritas-state-of-the-hybrid-cloud-report-2016
 
The Cloud Revolution
The Cloud RevolutionThe Cloud Revolution
The Cloud Revolution
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
 
Idge dell private cloud2014 qp #1
Idge dell private cloud2014 qp #1Idge dell private cloud2014 qp #1
Idge dell private cloud2014 qp #1
 
The future of cloud computing infographic
The future of cloud computing infographicThe future of cloud computing infographic
The future of cloud computing infographic
 
Enterprise Cloud Adoption Survey Results
Enterprise Cloud Adoption Survey ResultsEnterprise Cloud Adoption Survey Results
Enterprise Cloud Adoption Survey Results
 

Mehr von Lorie Vela

Informe el trabajador_autonomo_y_si_2010
Informe el trabajador_autonomo_y_si_2010Informe el trabajador_autonomo_y_si_2010
Informe el trabajador_autonomo_y_si_2010Lorie Vela
 
Guideteamworkcollaboration
GuideteamworkcollaborationGuideteamworkcollaboration
GuideteamworkcollaborationLorie Vela
 
The collaborative enterprise
The collaborative enterpriseThe collaborative enterprise
The collaborative enterpriseLorie Vela
 
How important is collaboration
How important is collaborationHow important is collaboration
How important is collaborationLorie Vela
 
Aprendizaje colaborativo
Aprendizaje colaborativo Aprendizaje colaborativo
Aprendizaje colaborativo Lorie Vela
 
Teamwork conflict management survey
Teamwork conflict management surveyTeamwork conflict management survey
Teamwork conflict management surveyLorie Vela
 
Redes sociales y enseñanza
Redes sociales y enseñanzaRedes sociales y enseñanza
Redes sociales y enseñanzaLorie Vela
 

Mehr von Lorie Vela (7)

Informe el trabajador_autonomo_y_si_2010
Informe el trabajador_autonomo_y_si_2010Informe el trabajador_autonomo_y_si_2010
Informe el trabajador_autonomo_y_si_2010
 
Guideteamworkcollaboration
GuideteamworkcollaborationGuideteamworkcollaboration
Guideteamworkcollaboration
 
The collaborative enterprise
The collaborative enterpriseThe collaborative enterprise
The collaborative enterprise
 
How important is collaboration
How important is collaborationHow important is collaboration
How important is collaboration
 
Aprendizaje colaborativo
Aprendizaje colaborativo Aprendizaje colaborativo
Aprendizaje colaborativo
 
Teamwork conflict management survey
Teamwork conflict management surveyTeamwork conflict management survey
Teamwork conflict management survey
 
Redes sociales y enseñanza
Redes sociales y enseñanzaRedes sociales y enseñanza
Redes sociales y enseñanza
 

KĂŒrzlich hochgeladen

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

KĂŒrzlich hochgeladen (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Cloudrisks

  • 2. Who uses cloud computing? 22% Professional Services and 21% Education and Public Sector @lorievela
  • 3. Cloud adoption 60% businesses think it could be their most significant IT operating method in 2014 but Security is still an issue (63%) @lorievela
  • 4. Security and Risk ➱The top five cloud applications deployed company-wide are website hosting (24%), emailhosting (23%), database hosting (22%), servers (22%) and storage (20%) ➱Security is deemed an ongoing issue that goes beyond the cloud (74%) ➱but is certainly a priority in evaluating and managing IT delivered via cloud (80%) ➱43% say it will not prevent them adopting more cloud services @lorievela
  • 5. Cloud supply ➱As in 2010 the key requirement of a cloud supplier is that they provide data security and privacy (73%) – having strong business continuity and disaster recovery processes has grown in importance (70%), whilst providing performance SLAs (67%) remains the third biggest consideration ➱Most prefer to use a mix of cloud suppliers (71%) rather than relying on a single service provider (25%) @lorievela
  • 6. Conclusions ✔Security factors prevail ✔Risk evaluation of cloud ✔Data privacy and contract issues ✔Quality assurance and transition management ✔Infrastructure and service provider business @lorievela
  • 7. Key enablers of the process ➱ease of transition (58%), ➱quality assurance (55%) ➱while regulations on the security and control of customer data (54%) @lorievela
  • 8. SaaS Software as a Service @lorievela
  • 9. Paas Platform as a Service Iaas Infrastructure as a Service @lorievela
  • 10. Security sticking points Security is a partiuclar issue for companies in UK and Germany @lorievela
  • 11. Attitudes 74% of CIOs think IT security is a concern whether IT systems and applications are delivered via the cloud or not. Against this backdrop, the fact that 80% see security issues as a priority when evaluating and managing IT via cloud services may in part be simply due diligence in coming to terms with a new approach @lorievela
  • 12. Cloud and Risk For many companies, risk is synonymous with security: compromises in security (45%) and brand damage as a result of performance issues or security incidents (42%) are pinpointed as specific business risks associated with adopting cloud services. @lorievela
  • 13. Deployment of cloud Private clouds are particularly popular as an option in Spain (58%), Germany (57%) and the UK (56%) @lorievela
  • 14. Cloud suppliers providing data security and privacy (73%) emerges as the most important factor, followed by business continuity and disaster recovery processes (70%) and the provision of performance assurances / SLAs (67%)
  • 15. Future business use of cloud services providers only one in four companies would opt for a single supplier @lorievela
  • 16. Cloud computing Risk or future? Report: European CIO Cloud, addressing security, @lorievela risk and transition