Contactez-nous Suivez-nous sur Twitter En francais English Language

De la Théorie à la pratique

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



New analyst report identifies adoption of cloud-based services is a one way express train in favour of adoption, but challenges lie ahead

July 2015 by Digital Guardian

Digital Guardian, the only endpoint security platform purpose built to stop data theft, has announced the publication of ‘From No to Know’ - a new report by analyst firm Quocirca. The report highlights that for many organisations holding back the tide of cloud-based services adoption is almost impossible as the use cases are overwhelming. These include on-tap infrastructure, support for live-in-the-cloud business processes and the outsourcing of utility applications to third party specialists. The study also reveals that the challenge for many UK organisations will be not whether to accept cloud-based services but how well prepared they are for their adoption.

The study classified users into four groups:

· Enthusiasts – regularly make use of cloud-based services where possible and consider them a key part of their future IT requirements

· Supplementary users – evaluating use of cloud-based services to supplement in-house IT resources

· Case by case users – regularly evaluate cloud-based services and select them as they seem a better alternative to an in-house option

· Avoiders – avoiding and proactively blocking adoption of cloud-based services

The report highlighted interesting findings between the two extreme groups - the enthusiasts and avoiders, especially as it relates to IT security. Whilst both groups have put in place IT security measures to address the risk associated with using cloud-based services, there are significant differences in those measures.

Key findings of the research:

· Cloud-based services adoption is on the rise

o The proportion of UK businesses classifying themselves as ‘enthusiasts’ has doubled in two years – from 17% to 32%. Amongst consumer-facing organisations the enthusiasts number 38%.

o The number of avoiders has decreased from 23% to just 10% in the same period. For consumer-facing organisations the figure is down to 6%.

o The number of respondents that consider themselves case by case users has increased from 17% to 23%, such organisations are recognising the value of controlled cloud use.

o There has been drop in those that consider themselves supplementary users (from 43% to 35%). This indicates a move away from casual use to more controlled access for specific use cases.

· Confidence in using cloud-based services is highest at the extremes

o Of all the groups, the avoiders are most likely to be very confident (50%) about data security largely because they have taken proactive steps to deter the use of cloud services and their systems are less open

o 41% of enthusiasts of cloud services are very confident that they have put in place sufficient security measures to support their pro-cloud stance.

o Only one fifth (20%) of supplementary users and 17% of case-by-case users felt very confident about their data security.

· Wide range of security capabilities being deployed

o For the avoiders, whose aim is to avoid the use of cloud-based services, unsurprisingly cloud-access controls do not figure at all in their top 5 security technologies. Their preference is for tools that block and restrict user activity to minimise their perceived dangers from cloud use.

o In sharp contrast 3 of their top 5 security capabilities selected by enthusiasts were cloud-sharing capabilities including policy-based access rights and policy-based encryption.

o Of the four groups supplementary users are the most laid-back, adopting what could be considered a dangerously casual approach. Of 20 security capabilities looked at, they were less likely than average to have deployed almost all the technologies

o Case by case users were different again with 4 out of their top 5 security technologies being those that restricts what users can especially on the end-point.

See previous articles


See next articles