Shadow IT: data protection and cloud security
|
|
|
- Barnard Golden
- 10 years ago
- Views:
Transcription
1 Shadow IT: data protection and cloud security George Crump November 17, 2014 This report is underwritten by CipherCloud.
2 TABLE OF CONTENTS Executive summary... 3 Views on shadow IT and data security from within the enterprise... 4 Percentage of IT spending at organizations on cloud services... 5 Top challenges holding back cloud projects... 7 Requests from business users for new cloud services each month... 8 Three cloud services business users request most frequently... 9 Pressured on IT to approve applications or devices that don t meet security or compliance requirements Number of shadow IT apps in use C-level concern about the security of data residing in the cloud Insider threat incidents Top security issues facing companies Company policies on acceptable cloud usage Cloud security-awareness training programs Key takeaways Methodology About George Crump About Gigaom Research Shadow IT: data protection and cloud security 2
3 Executive summary Shadow IT is a term describing users or whole lines of business, who go outside of their organization s IT group to meet their IT needs. A disconnect often exists between what IT users feel they need and what the IT services group is prepared to deliver. Shadow IT s destination is often the cloud, where a company credit card can access all kinds of IT as a service, including cloud-based file-sync-and-share, laptop data protection, CRM, project management, or back-office kinds of software. Shadow IT may seem like an easy solution for an organization, because users and lines of business meet their needs and IT has one less problem, but in reality, both stakeholders can end up with less than they wanted and in the process, they put the organization s important data assets at risk by compromising data security. The truth is that the consumerization of IT will likely come back to haunt IT. Instead of divesting itself of responsibility, IT organizations should get in front of shadow IT and prevent its spread. When IT takes control of an organization s cloud usage it provides better cloud utilization, which in turn, allows cloud compute and storage to reach its full potential. At the same time, IT keeps the organization s data better protected and more secure. This report reviews data from three surveys that Gigaom Research conducted between September 2013 and June It will help IT organizations understand the extent of shadow IT and avoid its pitfalls. 83 percent of organizations have adopted the cloud for some function, but few are using the cloud to deploy complex enterprise applications. Security (62 percent), application performance (44 percent), and time required to develop related skills (41 percent) top the list of cloud concerns. More than half of enterprises have at least 10 public cloud instances in production. 81 percent of line-of-business employees admitted to using unauthorized SaaS applications with 38 percent deliberately using unsanctioned apps because of the IT-approval process. 70 percent of unauthorized access to data is committed by an organization s own employees. Shadow IT: data protection and cloud security 3
4 Views on shadow IT and data security from within the enterprise Most organizations have embraced the cloud to some extent. The first survey question we re considering in this report, What is your timeframe for implementing your first cloud project, showed that 42 percent of respondents have already completed their first project and another 44 percent indicated plans to have their first project done within the year. Responding to a different question, 83 percent of survey respondents reported that they have adopted the cloud for some function. How many of these initiatives are endorsed by IT is not clear, but it seems that shadow IT drives a great many of these cloud initiatives. Shadow IT: data protection and cloud security 4
5 This positive attitude toward cloud services continues to the public cloud. As the results in the following chart indicate, all but 17 percent of the respondents have adopted public cloud. Percentage of IT spending at organizations on cloud services Organizations are moving beyond curiosity about the cloud to actual deployment. Our survey results indicate that the cloud market will grow about percent this year and that the majority of growth will be in two areas: Software-as-a-Service (SaaS) is growing at 199 percent. We find that SaaS is the typical home for shadow IT. It is growing because end-users are impatient with IT and looking for Shadow IT: data protection and cloud security 5
6 alternatives. With SaaS, the organizations can access easy alternatives with a credit card. Much of this spending is still to come, as our survey indicates that almost 79 percent of organizations are not yet using the cloud to deploy complex enterprise applications. In other words, shadow IT is a concern now, but will be a much larger problem in the near future. Infrastructure-as-a-Service (IaaS) is growing at 122 percent. This is an excellent indicator that IT is also embracing cloud and may be attempting to respond to shadow IT. Are you currently using the cloud to develop enterprise apps? Shadow IT: data protection and cloud security 6
7 Top challenges holding back cloud projects Security is the number-one concern for IT professionals as they continue their cloud journey, with 62 percent selecting it as the top concern. Second and third were performance of those applications (44 percent) and developing cloud-related skills (41 percent). Understanding what secure means to respondents can be a challenge. Some IT professionals consider encryption as the only necessary aspect of security. But encryption must be end-to-end from the moment the data leaves the organization s network infrastructure to the data being stored in the cloud potentially for decades. Understanding who will hold and maintain the encryption keys is very important, because that group controls who can read the data a decision that should rest with the organization and not with the cloud provider. The organization should be the sole encryption key holder. Physical-premises security at the cloud provider s facility should also be high on the consideration list, because most data-loss events happen from inside an organization. Shadow IT: data protection and cloud security 7
8 Requests from business users for new cloud services each month Cloud usage is clearly on the rise within most organizations, with only 14 percent indicating no cloud deployment. Over half of the survey respondents indicated that they had more than 10 cloud instances in production, while a surprising 32 percent indicated significant use (51 or more instances) of the cloud for production applications. Note that this data only includes the cloud instances that IT knows about; it does not include the shadow IT cloud instances that business units or employees solicit on their own. Shadow IT: data protection and cloud security 8
9 Three cloud services business users request most frequently Typically, the most commonly requested cloud services are related to increased web-presence communications (workforce productivity), file sync-and-share, and disaster recovery (DR). The second most requested cloud service is an application, hence the growth in Application-as-a-Service (AaaS). Most of these applications enhance productivity and include CRM or sales-automation tools, messaging tools, and cloud-based . Shadow IT: data protection and cloud security 9
10 Pressured on IT to approve applications or devices that don t meet security or compliance requirements Another of IT s concerns is pressure to approve an application or device that does not meet the organization s security or compliance requirements. Many of these initiatives start in the business unit, independent of IT oversight. Once the business unit becomes excited about a cloud service s potential, IT is battling up hill to halt implementation. The larger problem, though, may not be the pressure on IT, but rather users acting on their own without IT s knowledge. One finding revealed that 38 percent of line-of-business employees surveyed use unauthorized cloud apps because the IT-approval processes in their companies are too slow. Number of shadow IT apps in use A big challenge for IT professionals is accounting for shadow IT projects that are in progress within their organizations. Often IT only identifies a shadow-it project when a member of the IT group overhears someone talking about it or when something goes wrong with the service and the business unit asks IT to bail it out because of a compliance or security violation. Among line-of-business employees, 81 percent admitted to using unauthorized SaaS applications. Among consumer-grade file-sharing solutions, individuals or groups were using Dropbox without IT department approval in 38 percent of the organizations responding to the survey and nearly one in four (24 percent) responding companies reported having experienced unauthorized access to a Dropbox account. C-level concern about the security of data residing in the cloud If an organization is to be successful securing its cloud-based assets, data security in the cloud must be a top-down priority in the organization. IT alone cannot properly enforce a strict security standard because to be successful, data security must cut across a business s organizational lines. Justification for this executive-level involvement can be found in current headlines that report organizations like Target and Home Depot having to make significant C-level changes as a result of a security breach. Insider threat incidents While most IT departments expend a lot of effort mitigating the threat to data as it leaves the organization and heads to the cloud, the reality is that the insider threat is the larger challenge. More than Shadow IT: data protection and cloud security 10
11 70 percent of unauthorized access to data is committed by an organization's own employees and ranges from naive mistakes like leaving a remote-access session open while in public to disheartened employees maliciously attempting to remove data. Top security issues facing companies The other top inhibitors listed in Gigaom Research s survey data privacy, compliance, and lock-in are actually a subset of the survey winner: security. Shadow IT: data protection and cloud security 11
12 Company policies on acceptable cloud usage To some extent, shadow IT occurs because many companies do not have a policy on acceptable cloud usage in place or the policy is a blanket don't use the cloud at all, which isn't practical. IT can eliminate the shadow IT s growth by simply implementing a cloud-usage policy and then adopting tools that will allow it to monitor for adherence. Cloud security-awareness training programs IT can add tremendous value by initiating a cloud-security awareness program that not only teaches users how to protect the organization from cloud-delivered security threats, but also how to protect themselves (personally) from similar threats. The public is surprisingly naïve about cloud security. Most employees should be very receptive to a training program that appealed to both organizational issues and their personal issues. Shadow IT: data protection and cloud security 12
13 Key takeaways In many organizations, shadow IT seems like a shortcut to improved IT services but in reality, it is often an expensive road to disaster. If shadow IT is allowed to run amok, multiple business units will solicit various IT services to meet their individual group s needs. The most immediate impact is the organization being left to sort through a plethora of applications, many of which overlap. For example, a single organization may be running dozens of four file-sync-and-share applications. Beyond the sheer number of applications in use is the challenge of managing multiple security implementations for each application and each business unit. An organization should apply the same policy throughout business units for all data regardless of the level of sensitivity. This is a best practice for management as well as for data-security. As businesses move more and more data into the cloud, and count on the cloud to deliver key services, IT must be a leader ensuring that the organization is using those resources correctly. The cloud is not going to replace IT. Instead, the cloud is simply another vehicle for which IT delivers services to users and IT should use it appropriately. Shadow IT: data protection and cloud security 13
14 Methodology The data in this report is derived from surveys that Gigaom Research and partners conducted between September 2013 and June IT Ops and Development Survey, 4Q The 408 survey respondents came from more than 30 industries, with the top ones including computer software, banking and financial services, government, health care and medical, manufacturing, and insurance. Of those surveyed, 60 percent work in organizations of more than 10,000 people and 98 percent work in organizations with more than 1,000 people. While all respondents work in IT, 62 percent said they were in software-application development while 24 percent said they were in operations including systems and network engineering, help desk, and data centers. Cloud Adoption Survey, 2Q14. In order to determine the progress of enterprises journey to the public cloud, Gigaom Research surveyed 303 IT decision-makers to understand what is happening within enterprises that are adopting public cloud computing. This survey was designed to determine emerging patterns of use and patterns of adoption, which, until now, have not been well understood, even by the enterprises themselves. Enterprise IT Buyers Survey, North Bridge Future of Cloud Computing Survey, For 2014, Gigaom Research fielded similar questions in two second-quarter (May through June, 2014) surveys: One was with a panel of 502 IT decision makers at companies with 500 or more employees (more than half of which included more than 5,000 employees), across abroad range of industries. The other survey was in collaboration with North Bridge Venture Partners, which included 369 web-recruited respondents as well as customers of North Bridge startups. Gigaom Research considers the North Bridge survey participants to be more leading-edge, given that they are enterprise customers of tech startups. The North Bridge survey also includes more smaller businesses than in the direct Gigaom Research survey, and a good number of very large organizations, as well. Shadow IT: data protection and cloud security 14
15 About George Crump George Crump is an Analyst for Gigaom Research and the President and Founder of Storage Switzerland. With 25 years of experience designing storage solutions for data centers across the US, he has seen the birth of such technologies as RAID, NAS and SAN. Prior to founding Storage Switzerland he was CTO at one the nations largest storage integrators where he was in charge of technology testing, integration and product selection. About Gigaom Research Gigaom Research gives you insider access to expert industry insights on emerging markets. Focused on delivering highly relevant and timely research to the people who need it most, our analysis, reports, and original research come from the most respected voices in the industry. Whether you re beginning to learn about a new market or are an industry insider, Gigaom Research addresses the need for relevant, illuminating insights into the industry s most dynamic markets. Visit us at: research.gigaom.com Giga Omni Media, Inc. All Rights Reserved. This publication may be used only as expressly permitted by license from Gigaom and may not be accessed, used, copied, distributed, published, sold, publicly displayed, or otherwise exploited without the express prior written permission of Gigaom. For licensing information, please contact us. Shadow IT: data protection and cloud security 15
State of Cloud Survey GLOBAL FINDINGS
2011 State of Cloud Survey GLOBAL FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff
Hosting and cloud services both provide incremental and complementary benefits to the organization
33 Yonge St., Suite 420, Toronto, Ontario Canada, M5E 1G4 W H I T E P A P E R I D C a n d T E L U S E n t e r p r i s e C l o u d S t u d y, 2 0 1 3 : C a p i t a l i z i n g on C l o u d ' s W i n d o
Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools
White Paper Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools Introduction The modern workforce is on the hunt for tools that help them get stuff done. When the technology
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Making the Cloud Work for Business
Making the Cloud Work for Business 1 Making the Cloud Work for Business Contents Adjusting to On-Demand Needs 2 Poised for Dramatic Growth 2 Ability to Scale 3 Overcoming Remaining Barriers 4 Alignment
How to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
Not All Cloud Solutions Are Created Equal: Extracting Value From Wireless Cloud Management
A Custom Technology Adoption Profile Commissioned By Aruba Networks March 2014 Not All Cloud Solutions Are Created Equal: Extracting Value From Wireless Cloud Management 1 Introduction With the rise of
The Challenge of Securing and Managing Data While Meeting Compliance
ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst
THE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS
THE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS The CXO s Guide to Managing Expansion While Controlling Costs & Compliance Considerations 2 45% OF IT PROFESSIONALS
Shadow Data Exposed. Analysis of files shared by leading organizations sheds light on the growing risk to enterprise data. The Problem: Ignorance
Shadow Data Exposed Analysis of files shared by leading organizations sheds light on the growing risk to enterprise data. While it is broadly understood that cloud services are sweeping the IT landscape,
BYOD: Bring Your Own Policy. Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works.
BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works. BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already
Refresher on cloud computing
Refresher on cloud computing Cloud computing is a form of outsourcing where the organization outsources data processing to computers owned by the vendor. Outsourcing may also include utilizing the vendor
Release 1. ICAICT814A Develop cloud computing strategies for a business
Release 1 ICAICT814A Develop cloud computing strategies for a business ICAICT814A Develop cloud computing strategies for a business Modification History Release Release 1 Comments This version first released
UC And Collaboration Adoption By Business Leads To Real Benefits
A Custom Technology Adoption Profile Commissioned By Cisco Systems UC And Collaboration Adoption By Business Leads To Real Benefits July 2013 Deployment Of Broad Set Of Collaboration Capabilities Across
HOW TO SELECT A BACKUP SERVICE FOR CLOUD APPLICATION DATA JUNE 2012
HOW TO SELECT A BACKUP SERVICE FOR CLOUD APPLICATION DATA JUNE 2012 INTRODUCTION The use of cloud application providers or Software-as-a-Service (SaaS) applications is growing rapidly. Many organizations
How To Protect Your Employees From Being Hacked By A Corporate Firewall
The case for supporting mobile users with secure remote access Your employees are mobile and your remote support strategy needs to be too - but manage the security risks of remote access tools. A study
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion
White paper. How cloud computing can transform the fortunes of small and mid-sized businesses
White paper How cloud computing can transform the fortunes of small and mid-sized businesses Small and mid-sized businesses are increasingly looking for new and innovative ways to cut costs while sharpening
CLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
File Sync And Share Grows In The Enterprise: Capture The Benefits And Manage The Risks
A Custom Technology Adoption Profile Commissioned By Code42 October 2014 File Sync And Share Grows In The Enterprise: Capture The Benefits And Manage The Risks Introduction Demand is surging for collaboration
industry perspective: MAKING SMARTER IT INVESTMENTS: Customizing the Cloud
industry perspective: MAKING SMARTER IT INVESTMENTS: Customizing the Cloud 1 A Brief Introduction Today, cloud computing offers government the opportunity to re-imagine how services are delivered. But
Cybersecurity: You re Doing IT Wrong
SESSION ID: CXO-F01 Cybersecurity: You re Doing IT Wrong Jared Carstensen Chief Information Security Officer (CISO), CRH Plc @jaredcarstensen Introduction My Journey Every kid has dream jobs growing up
How enterprises will use the cloud for big data analytics
How enterprises will use the cloud for big data analytics Lynn Langit November 10, 2014 This report is underwritten by Cazena. TABLE OF CONTENTS Executive summary... 3 A majority of enterprises are interested
PCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
Electronic Records Storage Options and Overview
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
Continuous security and reliability in iterative development
Continuous security and reliability in iterative development A Buyer's Lens Report by Mike Kavis This report underwitten by: Evident.io Continuous security and reliability in iterative development 11/10/2014
HIPAA and HITECH Compliance for Cloud Applications
What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health
Executive s Guide to Cloud Access Security Brokers
Executive s Guide to Cloud Access Security Brokers Contents Executive s Guide to Cloud Access Security Brokers Contributor: Amy Newman 2 2 Why You Need a Cloud Access Security Broker 5 You Can t Achieve
SMBs File Storage Needs Are Growing, But 57% Underestimate File Server Costs 45% Are Interested In Cloud Options
A Custom Technology Adoption Profile Commissioned by Egnyte SMBs File Storage Needs Are Growing, But 57% Underestimate File Server Costs 45% Are Interested In Cloud Options September 30, 2011 Many SMBs
Latest IT Trends For Secure Mobile Collaboration
A Custom Technology Adoption Profile Commissioned By Cisco Systems September 2013 Corporate Mobility Momentum Accelerates Among Enterprises The pace of enterprises deploying corporate mobility initiatives
The Software-defined Data Center in the Enterprise
The Software-defined Data Center in the Enterprise A Cloud Report by Ben Kepes This report underwitten by: NIMBOXX The Software-defined Data Center in the Enterprise 02/12/2015 Table of Contents 1. Executive
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
Netskope Cloud Report. Report Highlights. cloud report. Three of the top 10 cloud apps are Storage, and enterprises use an average of 26 such apps
cloud report JAN 2014 Netskope Cloud Report In the second Netskope Cloud Report, we ve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the
Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices
A Forrester Consulting Thought Leadership Paper Commissioned By Xively By LogMeIn August 2015 Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices Table
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
White Paper: Cloud Security. Cloud Security
White Paper: Cloud Security Cloud Security Introduction Due to the increase in available bandwidth and technological advances in the area of virtualisation, and the desire of IT managers to provide dynamically
APERTURE. Safely enable your SaaS applications.
APERTURE Safely enable your SaaS applications. Unsanctioned use of SaaS (Software as a Service) applications is creating gaps in security visibility and new risks for threat propagation, data leakage and
7 Risks of Dropbox to Your Corporate Data
7 Risks of Dropbox to Your Corporate Data Introduction We live in a world where information equals power. With the influx of online file-sharing solutions, distributing information has become easier than
Managing the Shadow Cloud
Managing the Shadow Cloud Integrating cloud governance into your existing compliance program August 2014 Shadow IT is not a new concept and organizations are well aware of the risks associated with unauthorized
RMS. Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles
RMS Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles RMS Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles RMS aims to provide the most secure, the most private, and
Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1
Fidelis XPS Power Tools Gaining Visibility Into Your Cloud: Cloud Services Security February 2012 PAGE 1 PAGE 1 Introduction Enterprises worldwide are increasing their reliance on Cloud Service providers
Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.
Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution. TABLE OF CONTENTS WELCOME INTRODUCTION... 1 TIP 1:... 4 Ensure Ease-of-Use TIP 2:... 6 Empower Secure
A LEGAL PERSPECTIVE OF BYOD Building Awareness to Enable BYOD and Mitigate Its Risks. By Michael Finneran and Jim Brashear January 2014
A LEGAL PERSPECTIVE OF BYOD Building Awareness to Enable BYOD and Mitigate Its Risks By Michael Finneran and Jim Brashear January 2014 What to Consider In managing the Bring-Your-Own-Device (BYOD) strategy
TELEPHONY BE A PRIORITY FOR YOUR BUSINESS?
WHY SHOULD HOSTED TELEPHONY BE A PRIORITY FOR YOUR BUSINESS? An Insight For Business Leaders 01 INTRODUCTION There is much talk about hosted or cloud-based telephony and the rapid adoption of this new
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
5 Things You Didn t Know About Cloud Backup
5 Things You Didn t Know About Cloud Backup 1. Data privacy can easily be compromised by encryption key holders. Encryption is vital to data protection and most backup solutions offer it. However, encryption
Clinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
Cloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, [email protected] Something Old, Something New New: Cloud describes the use of a collection of services, applications,
SOOKASA WHITEPAPER CASB SECURITY OVERVIEW. www.sookasa.com
SOOKASA WHITEPAPER CASB SECURITY OVERVIEW www.sookasa.com Sookasa Overview Nearly 90 percent of enterprises currently use the public cloud, and by 2020, practically every business across the country is
Bring Your Own Device - A Case Study
A FROST & SULLIVAN EXECUTIVE SUMMARY Navigating the Enterprise Mobility Maze to a BYOD Strategy In Collaboration With: View the ondemand version of the ebroadcast: www.frost.com/byod Thanks to the rapid
Cloud Computing: Current Market Trends and Future Opportunities
Cloud Computing: Current Market Trends and Future Opportunities by Martin Tantow, Editor-in-Chief, CloudTimes.org Commodity Infrastructure as a Service Cloud computing continues to gain more mainstream
How to Achieve a Cloud-Connected Experience Using On-Premise Applications
How to Achieve a Cloud-Connected Experience Using On-Premise Applications WHITEPAPER The cloud is influencing how businesses wish to use and be charged for the software they acquire. Pay per use, metered
10 best practices for saving money on IaaS
10 best practices for saving money on IaaS Paul Burns a cloud report 10/14/2014 TABLE OF CONTENTS 1. EXECUTIVE SUMMARY 2. STEP BY STEP GUIDE TO A LOWER-COST CLOUD 3. KEY TAKEAWAYS 4. ABOUT PAUL BURNS 5.
Cloud Backup and Recovery for Endpoint Devices
Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,
SunGard Enterprise Cloud Services Date: March 2012 Author: Mark Bowker, Senior Analyst
Cloud Services Brief SunGard Enterprise Cloud Services Date: March 2012 Author: Mark Bowker, Senior Analyst Abstract: Long-time managed services and disaster recovery specialist SunGard is raising its
Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80%
Research Brief 2012 Networking Spending Trends Date: March 2012 Author: Jon Oltsik, Senior Principal Analyst; Bob Laliberte, Senior Analyst; and Bill Lundell, Senior Research Analyst Abstract: According
