Analyst report identifies adoption of cloud-based services is a one way train in favour of adoption
Written by Daniel Sims
28 Jul 2015
Digital Guardian, the only endpoint security platform purpose built to stop data theft, has announced the publication of ‘From No to Know’ - a new report by analyst firm Quocirca. The report highlights that for many organisations holding back the tide of cloud-based services adoption is almost impossible as the use cases are overwhelming. These include on-tap infrastructure, support for live-in-the-cloud business processes and the outsourcing of utility applications to third party specialists. The study also reveals that the challenge for many UK organisations will be not whether to accept cloud-based services but how well prepared they are for their adoption.
- Number of businesses classifying themselves as ‘enthusiasts’ of cloud-based services has doubled in two years whereas those actively avoiding them has dropped by almost two thirds
- Confidence varies sharply with avoiders being the most likely to be very confident about their data security
- Views on IT security measures vary widely - enthusiasts view IT security as a key enabler; avoiders consider it an effective way to minimise use of cloud-based services
The study classified users into four groups:
- Enthusiasts – regularly make use of cloud-based services where possible and consider them a key part of their future IT requirements
- Supplementary users – evaluating use of cloud-based services to supplement in-house IT resources
- Case by case users – regularly evaluate cloud-based services and select them as they seem a better alternative to an in-house option
- Avoiders – avoiding and proactively blocking adoption of cloud-based services
The report highlighted interesting findings between the two extreme groups - the enthusiasts and avoiders, especially as it relates to IT security. Whilst both groups have put in place IT security measures to address the risk associated with using cloud-based services, there are significant differences in those measures.
Key findings of the research:
- Cloud-based services adoption is on the rise
- The proportion of UK businesses classifying themselves as ‘enthusiasts’ has doubled in two years – from 17% to 32%. Amongst consumer-facing organisations the enthusiasts number 38%.
- The number of avoiders has decreased from 23% to just 10% in the same period. For consumer-facing organisations the figure is down to 6%.
- The number of respondents that consider themselves case by case users has increased from 17% to 23%, such organisations are recognising the value of controlled cloud use.
- There has been drop in those that consider themselves supplementary users (from 43% to 35%). This indicates a move away from casual use to more controlled access for specific use cases.
- Confidence in using cloud-based services is highest at the extremes
- Of all the groups, the avoiders are most likely to be very confident (50%) about data security largely because they have taken proactive steps to deter the use of cloud services and their systems are less open
- 41% of enthusiasts of cloud services are very confident that they have put in place sufficient security measures to support their pro-cloud stance.
- Only one fifth (20%) of supplementary users and 17% of case-by-case users felt very confident about their data security.
- Wide range of security capabilities being deployed
- For the avoiders, whose aim is to avoid the use of cloud-based services, unsurprisingly cloud-access controls do not figure at all in their top 5 security technologies. Their preference is for tools that block and restrict user activity to minimise their perceived dangers from cloud use.
- In sharp contrast 3 of their top 5 security capabilities selected by enthusiasts were cloud-sharing capabilities including policy-based access rights and policy-based encryption.
- Of the four groups supplementary users are the most laid-back, adopting what could be considered a dangerously casual approach. Of 20 security capabilities looked at, they were less likely than average to have deployed almost all the technologies
- Case by case users were different again with 4 out of their top 5 security technologies being those that restricts what users can especially on the end-point.
Last Updated ( 28 Jul 2015 )