Report
Building Trust
in a Cloudy Sky
The state of cloud adoption and security
Report
Table of Contents
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Methodology & Demographics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Research Findings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Cloud architecture shifting from private to hybrid. . . . . . . . . . . . . . . . . . . . . . . . . 8
Cloud First strategies affecting IT budgets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Perceived benefits of public cloud surpassing private cloud. . . . . . . . . . . . . . . . . . . . 11
Skills shortages affecting cloud adoption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Sensitive data moving to the public cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
Integrated security better at securing sensitive data . . . . . . . . . . . . . . . . . . . . . . . . 14
Senior management more understanding of the risks and rewards. . . . . . . . . . . . . . . .. 14
Usage of PaaS growing faster than SaaS or IaaS . . . . . . . . . . . . . . . . . . . . . . . . 15
Greater than 50% chance of getting malware from a SaaS application . . . . . . . . . . . . . . . . . . . . . . . . . .16
Issues and concerns with cloud service providers. . . . . . . . . . . . . . . . . . . . . . . . . 17
Data in transit top concern for SaaS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Integrated security top concern for IaaS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Actions to increase public cloud adoption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
The growing nemesis of Shadow IT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
How IT is finding Shadow IT. . . . . . . . . . . . .
2017年全球云计算安全报告-25页 来自淘豆网www.taodocs.com转载请标明出处.