PerspecSys Survey Reveals Cloud-based Security Concerns for 2014

Cloud Acquisition Strategy, Customized to the Right Cloud Model

By G C Network | March 17, 2015

by Melvin Greer Managing Director, Greer Institute  This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing…

Women leading us to the cloud

By G C Network | March 14, 2015

By Jodi Kohut Government Cloud Computing Professional   By Jodi Kohut Government Cloud Computing Professional March is Women’s History Month. As we celebrate women and their role in our history, our…

CSCC Cloud Privacy Summit – Reston, VA March 26th

By G C Network | March 12, 2015

Please join the Cloud Standards Customer Council in Reston, Virginia on Thursday, March 26th for the Cloud Privacy Summit. This all day symposium will stimulate lively, interactive discussion and deliver…

Bangladesh: A country transforms with IT

By G C Network | March 9, 2015

Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of…

Introducing CloudTek University

By G C Network | March 5, 2015

Visit us at https://www.CloudTekU.com Cloud Computing Basics https://sqz.co/Fs34AaX Cloud Technologies https://sqz.co/s2ACt68 Cloud Security https://sqz.co/Mp7m3TE Business Innovation https://sqz.co/j4NZb37 Cloud Computing Pilots https://sqz.co/e5HFy24 Cloud Operations https://sqz.co/p5CJo24 CloudTek Overview https://sqz.co/k9S4Ewt ( This content…

The Emerging Science of Digital Forensics

By G C Network | February 24, 2015

By Melvin Greer Managing Director, Greer Institute for Leadership and Innovation Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains…

African-Americans and STEM careers: Getting a foot in the door

By G C Network | February 16, 2015

By Sandra K. Johnson Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the…

U.S. Department of Defense sets its cloud security guidelines

By G C Network | February 12, 2015

By Jodi Kohut Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines…

Circles are good for the economy

By G C Network | February 9, 2015

Contrary to what your mother may have told you, going in circles is sometimes a good thing. When it comes to our economy, it is actually a great thing. Throughout…

2015 National Chief Information Security Officer Survey

By G C Network | February 4, 2015

Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information.  The…


Today PerspecSys announced the results of a survey conducted at the 2014 RSA Conference concerning the attitudes and policies of organizations towards cloud-based security. After polling 130 security professionals on the show floor of the RSA Conference, PerspecSys found that “an overwhelming 74 percent believe security for cloud-based data in 2014 will be a bigger concern than securing data on-premise. In fact, 66 percent of security pros still view the cloud as more difficult to secure than on-premise options.”
The survey found the following opinions concerning cloud security:

  •  66% felt that cloud-based data is much more difficult to secure than on the premises
  • 18% felt that securing data on the cloud is no different than securing data on the premises
  • 16% felt that cloud-based data is less difficult to secure than on the premises

When asked if their organization has security protocols in place for cloud applications:

  • 69% answered yes
  • 31% answered no

The survey asked if their organizations allow employees to access corporate cloud environments from their personal mobile devices:

  • 54% said yes, we have a policy to follow
  • 28% said no, but employees do it anyway
  • 17% said no, we are not allowed or unable to access corporate cloud environments 

When asked does your organization use encryption or tokenization technologies to secure sensitive information in the cloud:

  • 36% use encryption
  • 34% don’t use encryption or tokenization
  • 24% use encryption and tokenization
  • 6%   use tokenization

The survey also questioned if revelations regarding the government’s access to cloud data change their willingness to employ cloud services:
·         44% said that it had no effect
·         28% said they are less likely to use the cloud
·         25% said they are more likely to use the cloud
·         4%   said regardless, they will never use the cloud
Companies need to be more proactive with cloud security
Although consumers are definitely shifting towards cloud applications, the survey results revealed that many organizations still need to take the proper steps to secure their cloud-based data. PerspecSys has concluded that:

  • “Almost 31 percent of respondents do not allow employees to access cloud applications such as Salesforce and DropBox from their mobile devices, but indicate employees do it anyway.”
  •  “34 percent of organizations do not encrypt or use tokenization in the cloud.”
  • “31 percent of organizations do not have any significant security protocols in place for employees using cloud applications.”

David Canellos, the CEO of PerspecSys reports that “through the poll data, as well as the results of hundreds of conversations we had at our exhibition booth, we were surprised to see how few companies are putting protocols in place for employees using cloud apps, as they are nearly ubiquitous as productivity enhancers and can hold important data that an organization has a vested interest in protecting. The data reinforces that simply blocking access isn’t an option, it’s time to be proactive and put long trusted security tools such as encryption and tokenization in place to make sure that no matter where your data is, it is protected.”

Stephen Kleynhans, research vice president of Gartner’s, stated in “How the Personal Cloud Impacts IT Organizations” published on February 6, 2014 that “enterprises must establish policies to manage the use of consumer-grade personal cloud tools, ensuring that appropriate information security and compliance controls aren’t being overlooked. IT organizations must also actively survey the user base to understand the motivation behind the tools’ use and ensure that advantageous functionality hasn’t been missed as part of official IT-supported enterprise user environments. IT organizations need to look for places where consumers are using personal cloud services and related apps, and understand the motivations, realizing there may be significant business value that has been missed by IT.”

PerspecSys found that although NSA was a major discussion subject at the 2014 RSA Conference, almost half of those surveyed did not feel the recent headlines and media attention regarding government had any effect on their use of the cloud.

About PerspecSys
PerspecSys Inc. is a leading provider of cloud data control solutions that enable mission critical cloud applications to be adopted throughout the enterprise. PerspecSys gives organizations the ability to understand how employees are using cloud applications and take the necessary steps to protect sensitive information before it leaves the network. By removing the technical, legal and financial risks of placing sensitive data in the cloud, PerspecSys makes the public cloud private. Based in Toronto, PerspecSys Inc. is a privately held company backed by investors, including Intel Capital, Paladin Capital and Ascent Venture Partners. For more information please visit www.perspecsys.com and follow them on Twitter @PerspecSys.

Bookmark and Share

Cloud Musings

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2012)

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network