March 27, 2017 By Mark Samuels 2 min read

Security operations are moving to the cloud, and IT managers are finding ways to support the use of a broad range of business applications on demand.

As many as 42 percent of IT decision-makers and security managers said they currently run security applications in the cloud, according to research from Schneider Electric. Additionally, almost half said they are likely or extremely likely to move their security operations to the cloud in the future.

While acceptance of the cloud appears to be growing, the research also indicated that barriers still thwart organizations looking to embrace on-demand IT. Managers should focus on these challenges and help business peers embrace the cloud in a secure manner.

Increasing Confidence in the Cloud

ZDNet said industry experts conclude on-demand IT has reached a tipping point now that organizations are using cloud computing services to run and develop their businesses. The Schneider Electric research backed up these sentiments and highlighted how executives use the cloud for a range of applications, including data storage, human resources and email.

More than half (57 percent) of respondents believe the cloud is secure. Confidence in on-demand security is highest among IT and technology professionals, at 78 percent. Managers in education (70 percent), construction (68 percent) and financial services (52 percent) also feel assured about cloud security.

Respondents felt on-demand IT should form part of an approach to security. Almost 80 percent said it is imperative to integrate security systems with other buildings and IT systems as part of a cloud strategy.

Recognizing the Scale of Security Operations

However, the research indicated that challenges remain when it comes to pushing security operations to the cloud.

Almost one-fifth of respondents do not trust the cloud. Much of this skepticism appears related to the current state of security systems — more than half of survey participants (54 percent) indicated security systems are not always properly outfitted for the adoption of new systems and services.

While almost all business leaders (95 percent) are supportive of emerging technology, the research suggested considerable barriers still need to be overcome. Administrative procedures, lack of perceived value and fears over return on investment are the top hurdles seen as preventing organizations from achieving their security goals via the cloud.

Making Plans for a Smooth Migration

Schneider Electric’s research adds further weight to the belief that perceptions on cloud security are changing. While some considerable issues remain, senior executives are increasingly open to the use of on-demand IT across business.

Security — along with key issues like governance and legacy constraints — has traditionally been portrayed as an intractable challenge for some firms keen to embrace the cloud. However, evidence suggests good planning and strong configuration can help to simplify a move to on-demand, even for organizations that are migrating existing systems.

IT managers should note that cloud security remains a work in progress. Network World reported that just over two-thirds of cybersecurity professionals believe their organizations are still learning how to apply security policies to cloud infrastructure.

As businesses look to move security operations online, they should focus on several core business concerns. IT managers considering a switch to on-demand IT must pay attention to skills and training, project sponsorship and expert external advice.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today