Intelligent CIO Europe Issue 68 | Page 21

LATEST INTELLIGENCE

BUYER ’ S GUIDE TO CLOUD NETWORK SECURITY

iIntroduction

Although corporate and internal networks are the most popular ( 54 %) attack vector for hackers , cloud-based environments , ecommerce in particular , are the next most popular targets ( 44 %) ( 2020 Trustwave Global Security Report ). In fact , between four and five of every 10 data breaches ( 43 %) involve web applications . Moreover , a recent study shows that misconfigured clouds were a leading cause of breaches in 2020 , and data breaches due to cloud misconfigurations resulted in the average cost of a breach increasing by more than half a million dollars , from $ 3.86 million to $ 4.41 million .
As a result , cloud security has become businesscritical as organizations expand and deepen their cloud presence . According to the Check Point 2020 Cloud Security Report , 75 % of surveyed organizations were either very or extremely concerned about cloud security .
Cloud Security Platform Layers and Hierarchy
Figure 1 illustrates the kind of multilayered , yet unified , cloud security platform that organizations should put in place in order to protect their cloud deployments and ensure a robust cloud security posture .
PRESENTED BY
Conversely , a recent Forrester study stated that cloud security confidence is a leading driver for adopting more cloud services .
It ’ s always important to remember that cloud security takes place in the context of a shared responsibility model . At the infrastructure level ( IaaS ), cloud providers are responsible for securing their compute-network-storage infrastructure resources while users are responsible for protecting the data , apps , and other assets deployed on the infrastructure . p
Download whitepaper here
www . intelligentcio . com INTELLIGENTCIO EUROPE 21