Clouds are secure: Are you using them securely?
BT presents a complimentary copy of Gartner's report, which highlights how, through 2022, at least 95% of cloud security failures will be the customer's fault
Gartner’s report ‘Clouds Are Secure: Are You Using Them Securely?’ highlights that “many organisations are paying an opportunity cost by allowing unwarranted fears about security to inhibit their use of public cloud services.”
Organisations that haven't taken a strategic and carefully governed approach when using cloud computing can easily run the risk of it being less secure than traditional computing. This can result in compliance incidents and leaked data.
The report states that, "The recent history of public clouds has demonstrated that brand-name, multitenant public cloud services are highly resistant to attack, providing a more secure starting point than most traditional in-house implementations."
“CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.”
Gartner, Clouds Are Secure: Are You Using Them Securely? Jay Heiser, 31 January 2018.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.
Or click here to download BT's report SD-WAN is the cornerstone of network transformation.
Share this page
Tags
Related Articles
Department began piloting limited use of online system in October 2020
In the first of a series of interviews with government’s biggest figures, PublicTechnology and CDDO caught up with Jo Farrar to discuss exploring virtual reality and AI, and why it’...
Overwhelming majority of respondents voice disapproval but government will press on with plans to bring forward legislation
Technology was used by BBC and 20 other international broadcasters
Related Sponsored Articles
The traditional reactive approach to cybersecurity, which involves responding to attacks after they have occurred, is no longer sufficient. Murielle Gonzalez reports on a webinar looking at...