Cybersecurity Data Privacy News

CISOs play catch up: cloud adoption is biggest security risk to business, Kaspersky Lab finds

Cloud adoption is in full swing, with the latest IDG data showing that 73% of enterprises have at least one application, or a portion of their computing infrastructure, already in the cloud. But apparently that’s not enough – because the data also shows that IT departments are feeling the pressure to migrate 100% to the cloud.

It’s clear that change is happening and fast, but it is not without risk. After surveying more than 250 IT security leaders, Kaspersky Lab has discovered that uncontrolled cloud expansion is the top security concern for more than half (58 percent) of CISOs.

Multiple platforms

By using multiple cloud platforms within a hybrid cloud infrastructure, businesses can deliver their products and services faster, optimize their performance, and improve the reliability of their services. However, despite its advantages, cloud computing, especially when the cloud infrastructure is hosted by a third-party, may also bring additional cybersecurity challenges. A data breach from an incident in the public cloud costs an enterprise, on average, $1.64 million. So, while an organization’s overall IT infrastructure becomes heterogeneous with the cloud, CISOs are facing more headaches to keep their data secure and protect company finances as a result.

Managing complex IT environments becomes even more difficult due to a lack of talent — another challenge for corporate cybersecurity. Hybrid cloud adoption requires specialists with the necessary skills to configure and manage security for all parts of the IT infrastructure. For CISOs it results in staffing constraints: more than a third (38 percent) claim it is difficult to recruit specialists to cope with this ‘cloud zoo’.

Against this backdrop, CISOs need a single solution that not only provides them with a high level of security but also ensures the business’s cybersecurity layer is visible and can be managed across the whole cloud infrastructure, even by a limited cloud security team.

“There’s no denying that with the business benefits it brings, cloud is a key part of the strategic digital transformation journey for many enterprises. The use of cloud is growing fast, and businesses are not going to be put off adoption because of security concerns. It’s therefore vital that resilient security is also quickly and effectively implemented, to support this rapid adoption,” explains Maxim Frolov, Vice President of Global Sales at Kaspersky Lab.

“Safeguarding data and workloads in the cloud environment, in addition to supporting the native security capabilities of a cloud platform, is crucial,” continued Frolov.

Protection layers

“Protection layers should, therefore, include: the capability to monitor application behavior and ban any suspicious activity; prevent exploits by using the latest threat intelligence; and find and automatically patch vulnerabilities, to safeguard data and workloads moving across cloud infrastructure, from threats. The best solutions also provide orchestration capabilities, so that IT teams can control what workloads are being accessed and processed, on and off-premise.”

Kaspersky Hybrid Cloud Security builds on Kaspersky Lab’s extensive experience and keeps businesses secure by protecting applications and data in physical, virtual, and cloud workloads. Kaspersky Hybrid Cloud Security provides API-based integration with Amazon Web Services (AWS) and supports the Microsoft Azure cloud platform, allowing customers to securely move data and applications across their IT environment. It also provides a unified management and security orchestration console to manage IT security on-premise and in the cloud — which partially alleviates the problem of a lack of personnel.

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.