CLOUD ADOPTION & RISK CLOUD ADOPTION & RISK REPORT IN NORTH AMERICA FOR NORTH AMERICA & EUROPE & EUROPE 2014 Trends 333 W. San Carlos Street San Jose, CA 95110 EXECUTIVE SUMMARY Few advances come close to the power of cloud computing to re-chart the path of enterprise IT. With faster time to market, massive economy of scale, and unparalleled agility, the cloud is being adopted by enterprises at an unprecedented rate. At the same time, however, few organizations have a strategic and coherent approach to managing cloud security and risk. Limited visibility, uncertain responsibility boundaries, and the lack of effective governance frameworks have all contributed to the current state of the art. As one Fortune 500 company CISO puts it: “Go to the cloud and hope for the best.” This report, with insights drawn from CipherCloud’s customers and our extensive cloud risk knowledge base, helps to shed light on enterprise cloud usage, risks observed, and geo-specific trends. This report includes anonymized data of cloud user activity collected for the full 2014 calendar year, spanning thousands of cloud applications and millions of enterprise cloud users. Organizations vastly underestimate the level of Shadow IT. Our findings suggest that organizations vastly underestimate the level of Shadow IT when it comes to cloud adoption. As a result, hundreds of high-risk cloud applications are in common use across North America and European enterprises. To achieve governance, it is imperative that organizations build the necessary legal and technological infrastructure to address cloud risks. This report discusses key points of focus for enterprise IT in order to address the competing tensions between business efficiency and security control and visibility. Cloud Adoption & Risk Report for North America & Europe: 2014 Trends CipherCloud | © 2015 02 Key Findings • The average global enterprise utilizes over 1,100 cloud applications Our study found widespread cloud adoption across North America and Europe. In our 2014 data, a typical North America enterprise used over 1,245 cloud applications while those in Europe used 981 applications on average. • 86% of cloud applications used by enterprises are unsanctioned “Shadow IT” Our study found that enterprises vastly underestimate the extent of Shadow IT cloud applications used by their organizations. Various media sources claim 10% to 50% of cloud applications are not visible to IT. Our statistics show that on average 86% of cloud applications are unsanctioned. For example, a major US enterprise estimated 10–15 file sharing applications were in use, but discovered almost 70. • Publishing, Social, and Career clouds are 2014’s most risky cloud categories Our research rated 52% of applications in Publishing as high risk. Similarly, 42% in Social and 40% in Career clouds are rated as high risk. These three represent the highest risk across all cloud applications. • Europe is narrowing the gap of cloud adoption to North America Contrary to widespread beliefs that Europe lags North America significantly in cloud adoption, our research found that European enterprises leverage the cloud just as extensively as North America—an average European organization used 80% as many cloud applications in 2014, distributed across similar application categories. • 70% of US cloud applications used by European organizations are not “Safe Harbor” approved In our data set, we found that only 9% of the clouds used by European enterprises were either Europe-based or in European-approved data transfer regions; 21% were US clouds and Safe Harbor approved. The rest, a whopping 70%, were US clouds without Safe Harbor certification. 03 CipherCloud | © 2015 Cloud Adoption & Risk Report for North America & Europe: 2014 Trends 03 The CipherCloud Risk Model CipherCloud is committed to providing enterprises with accurate risk ratings based on open standards, a transparent process, and the most current risk factors. The CipherCloud Risk Intelligence Lab™ uses the principles of transparency, community, and alignment with standards to provide extensive research, automated testing, and expert analysis of cloud application risks. SECURITY • Multi-factor • • • • • • Authentication Single Sign-On Encryption of data-at-rest SSL/TLS Landing domain Login domain HTTP headers PRIVACY • Privacy policy • Cookie policy • Data retention • • • • Data ownership Third-party access Business Transactions Privacy Compliance Data Residency ENVIRONMENT • Location • Service Level Agreement • Disaster recovery • Multi-tenancy • Type of usage • Control of environment • Data breaches COMPLIANCE • • • • • • • • • • Safe Harbor Comodo ISO 27001 PCI AoC HIPAA FedRAMP CSA CCM SAS 70 SSAE16 SOC 1, 2, 3 Figure 1: CipherCloud risk model components. The CipherCloud Risk Intelligence Lab™ analyzes tens of thousands of cloud applications globally in the compiling its CloudSource™ knowledge base. CipherCloud utilizes a standards-based model for cloud risk scoring, with over 100 attributes across four risk categories: Security, Privacy, Environment and Compliance. The cloud risk model includes security controls defined by the Cloud Security Alliance Cloud Control Matrix, Privacy best practices detailed by TRUSTe, and industry and regulatory standards such as HIPAA and PCI DSS. Figure 1 provides a more detailed view of the attributes used in our cloud risk model. CipherCloud examines factors such as whether the cloud application uses multifactor authentication, whether data stored in the cloud is encrypted, the location of cloud data centers, third-party data access, and compliance certifications. All risk attributes are independently verified by our staff of expert researchers. Risk scores range from 1 (lowest risk) to 10 (highest risk). Cloud Adoption & Risk Report for North America & Europe: 2014 Trends CipherCloud | © 2015 04 Cloud Computing Is Transforming the Global Enterprise Right Under Our Eyes CipherCloud research found that enterprises in both North America and Europe are leveraging cloud applications extensively. An average global enterprise uses over 1,000 distinct cloud applications (see Figure 2). The number of applications used in North America (1,245) is slightly higher than that in Europe (981). Global Average Category Cloud Count Email 27 Finance 27 Publishing 35 Education 37 Communication 38 HR 52 Business Management 61 CRM 89 E-Commerce 114 Analytics 126 Software Development 129 Cloud Storage 136 Media 140 IT Infrastructure 163 Marketing 196 Collaboration 211 Social 254 0 75 150 225 300 Figure 2: Average number of cloud applications accessed globally by enterprises by category. Figure 2 shows the global average ranking of cloud applications by popularity. Social, Collaboration, Marketing, and IT infrastructure are the most popular cloud categories—an average enterprise uses approximately 100 different applications in each of these categories. 05 CipherCloud | © 2015 Cloud Adoption & Risk Report for North America & Europe: 2014 Trends 05 Enterprises Underestimate the Extent of Shadow IT We all know that the use of Shadow IT within businesses is exploding, but few enterprises have been able to accurately assess the extent of the problem. Selfreported surveys of the percent of enterprises using cloud services range from as low as 19%1 to 50%—clearly ignoring Shadow IT. Other surveys have shown as many as 80%1 of end-users admitting to using unsanctioned applications, but without any measurements of actual usage. CipherCloud worked closely in 2014 with large enterprises globally to discover all cloud applications in use, and compare them with internal metrics of what is approved. The chart below compares IT approved applications with Shadow IT across North American and European enterprises. 69% 43% ia c Co tu re lla bo r a So ftw tion ar e De v fra st ru ed M c ia 19% 18% IT In ke tin ar M Co m m ag Figure 3: IT-approved applications vs. Shadow IT globally in 2014. d St or Total E- 14% ou 18% Europe Cl 12% North America l 34% 34% 27% 22% g 86% 82% 80% 70% 60% 50% 40% 30% 20% 10% 0% e er ce 88% Shadow IT So IT-Approved 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Figure 4: Cloud applications discovered by a major enterprise by category. Specific anecdotes also help to illustrate the problem. A major US enterprise used CipherCloud to discover all their cloud applications in use. They expected to find 8–10 applications being used for file sharing, and were very surprised to find 69 separate applications in use for file sharing, with a large number of high-risk clouds. Eurostat survey of enterprise cloud adoption for 2014 (http://ec.europa.eu/eurostat/statistics-explained/index.php/Cloud_computing_-_statistics_ on_the_use_by_enterprises) 2 Frost & Sullivan—The Hidden Truth Behind Shadow IT: http://www.mcafee.com/us/resources/reports/rp-six-trends-security.pdf 1 Cloud Adoption & Risk Report for North America & Europe: 2014 Trends CipherCloud | © 2015 06 Publishing, Social and Career Clouds Are 2014’s Top Three Most Risky Cloud Categories Information workers frequently use publishing, social, and career cloud applications to do their jobs, often with great effect. However, our research showed that in 2014 these three categories comprise the top three most risky clouds: Our intelligence lab rated 52% of Publishing cloud applications as high risk. Similarly, 42% in Social and 40% in Career clouds are deemed high risk. Software Development, Cloud Storage, IT Infrastructure, CRM, HR and Business Management categories also had significant percentages of applications with an overall risk score of 8 or higher (22%–36%). Security 11% Email 13% Productivity 17% Analytics 18% Collaboration 19% Communication 20% Finance 20% Software Development 22% IT Infrastructure 24% Cloud Storage 24% Events 29% CRM 29% HR 31% Marketing 36% Business Management 36% E-Commerce 37% Media 39% Careers 40% Social 47% Publishing 52% 0% Examples of the types of applications in the top categories: 15% 30% 45% 60% • Publishing: Wordpress, Adobe Creative Cloud • Social: LinkedIn, Twitter • Careers: Indeed, Resumonk Figure 5: Top 20 cloud application categories by percentage of high risk cloud providers. 07 CipherCloud | © 2015 Cloud Adoption & Risk Report for North America & Europe: 2014 Trends 07 Europe Narrows the Gap in Cloud Adoption Contrary to conventional wisdom that Europe lags North America in cloud adoption, CipherCloud research found that European enterprises have largely caught up to US in cloud usage. More specifically, we found that top cloud applications used by European enterprises are in largely the same categories as those used in North America, albeit European companies use 80% as many applications on average (see Figure 6). For example, North America organizations used an average of 94 IT Infrastructure applications, compared with 69 in Europe. Similarly, North America companies used on average 68 analytics clouds and Europe used 58. This may have to do with the fact that Europe’s cloud application market is projected to grow faster than North America through 2018. One analyst firm estimates that Europe will grow at a 19.1% CAGR while North America will grow at a 15.9% CAGR3. Finance 29 41 Business Management 18 43 CRM 34 E-Commerce 51 Software Development 64 Analytics 58 68 Cloud Storage 59 77 Media 63 IT Infrastructure 69 Marketing 82 Collaboration 85 Social 113 0 EU AVG. Category Cloud Count NA AVG. Category Cloud Count 55 63 65 77 94 114 126 141 75 150 225 300 Figure 6: Average number of cloud applications accessed by North American and European enterprises by category. 3 Apps Run the Cloud: https://www.appsrunthecloud.com/opinions/index/150 Cloud Adoption & Risk Report for North America & Europe: 2014 Trends CipherCloud | © 2015 08 European Enterprises Are as Cloud-Risky as Those in North America CipherCloud found that an average North American enterprise uses 1,245 cloud applications while 981 applications were found in use by an average European firm. With that many cloud applications, an average of 56 high-risk clouds per organization were found in North America and 42 high-risk ones per organization were found in Europe. Perhaps more alarmingly, in both North America and Europe, over 300 users per organization were found using high-risk clouds in 2014 (see Figure 7). Figure 7 also depicts a break down between high-, medium-, and low-risk clouds in use by both geos. A similar pattern was observed throughout, with the exception that a higher percentage of medium-risk clouds were used in Europe vs. North America. North American Cloud Application Usage Trends 1,245 56 391 European Cloud Application Usage Trends 981 42 307 Average # of cloud apps per organization Average # of high risk clouds per organization Average # of high risk cloud users per organization NA Cloud Application Risk Distribution All Clouds EU Cloud Application Risk Distribution All Clouds 4.5% 4.3% 15% 24.6% high medium 80.5% 71.2% low Figure 7: Comparisons of average cloud applications accessed by North American and European enterprises, along with breakdowns of risk levels. Figure 7 shows a deeper look at each cloud application category used in North America and Europe, as well as the associated risk scores. Overall, the categories in use and the risk scores are fairly comparable between the two regions, with a few exceptions. For example, the average risk score for software development clouds used by North America (5.15) is noticeably higher than those used in Europe (4.81), even though both regions used a similar number of cloud applications for software development. In contrast, communication clouds used by European companies carry a higher average risk score (5.25) than those used by North America (4.86). 09 CipherCloud | © 2015 Cloud Adoption & Risk Report for North America & Europe: 2014 Trends 09 6.00 4.33 4.66 4.54 4.81 4.81 5.00 5.03 5.00 4.50 5.18 5.08 5.07 5.25 5.30 5.32 5.35 5.73 5.83 120 90 EU Avg. Category Risk Score EU Avg. Category Count 4.51 4.53 4.88 4.79 5.02 5.06 5.12 5.15 5.25 82 Co m 5.28 5.39 5.30 5.72 18 0 Bu Mana siness geme nt CRM 5.45 5.52 6.00 4.87 34 M a rk eting 113 l 23 munic 16 Socia e 51 merc rastru 63 IT Inf Publi Cloud tics 69 E- Co m 59 Stora ge 15 shing 58 Analy 64 So Deve f tware lopm ent Educ a ce Colla 16 tion 85 b o ra t ion 29 Finan 12 Email 0.00 HR 30 ation 1.50 Media 60 c ture 3.00 5.87 4.50 160 120 NA Avg. Category Risk Score NA Avg. Category Count 43 114 Bu Mana siness geme nt M a rk eting 141 l 20 Socia 55 shing 21 Publi 29 Educ a 77 HR 65 So Deve f tware lopm ent Cloud Stora ge rastru c ture 94 IT I n f 77 merc 63 E- Co m tics 68 Analy munic ation 22 Co m borat ion 126 Colla Finan 15 Email 41 ce 0.00 CRM 40 tion 1.50 Media 80 e 3.00 0 Figure 8: Comparison of commonly used cloud application categories in Europe (top) and North America (bottom), as sorted by the average risk score per category. Cloud Adoption & Risk Report for North America & Europe: 2014 Trends CipherCloud | © 2015 10 European Companies Are Not Enforcing “Safe Harbor” Principles with Cloud Applications European Union data privacy laws require that transfers of personal information be restricted to European Union member states, or countries approved by the European Union for international data transfer. The US does not have country-wide approval, but US businesses can become Safe Harbor compliant by following seven fundamental data protection principles, and hence become eligible to handle transfers of personal data from European territories. By Law, European organizations can only transfer personal data to US businesses that are “Safe Harbor” certified. In practice, however, this seems to have little impact on actual cloud usage by enterprise users. CipherCloud research found that 70% of cloud applications used by European organizations are based in the US and not Safe Harbor approved. Only 9% of applications accessed were based in Europe and approved data transfer regions while 21% were US “Safe Harbor” compliant clouds. This trend likely corresponds with Shadow IT. Enterprise-sanctioned cloud applications used in Europe are more likely to be Safe Harbor certified, while those accessed directly by end-users appear to be largely non-compliant. A 2013 study by the European Union Commission found that the US-EU Safe Harbor principles are not well enforced; over 30% of Safe Harbor certified providers violate at least one of the Safe Harbor principle requirements. 21% 100,000 User Count 75,000 50,000 69% 25,000 9% 0 0% 12.5% 25% 37.5% 50% Traffic Volume EU Safe Harbor Compliance (45 days of user activity) EU Safe Harbor Certified Cloud App Count (%) Total Traffic Volume (%) EU-based 9% 8% 10204 YES* 21% 42.4% 98716 NO* 69% 49.6% 46307 Total Users* Figure 9: Distribution of EU-based, Safe Harbor-certified, and non-Safe Harbor cloud applications. *US-EU Safe Harbor is a streamlined process for US companies to comply with the European Union Directive 95/46/EC on the protection of personal data. The Safe Harbor Privacy Principles allow US companies to register their certification if they meet the European Union requirements via the US Department of Commerce. 11 CipherCloud | © 2015 Cloud Adoption & Risk Report for North America & Europe: 2014 Trends 11 Call to Action Cloud computing offers organizations a rare chance to challenge the status quo in technology delivery methods and has already had a global impact on the traditional IT stack. To unlock the power of the cloud and at the same time effectively manage the tension between business efficiency and enterprise controls, CipherCloud recommends these strategic areas of focus: 1. Designate cloud security as a strategic area of IT security 2. Enhance cloud situational awareness and improve your cloud governance posture 3. Establish a systematic, integrated technological approach to support your governance needs To support these goals, firms should undertake the following immediate actions: • Develop a multi-faceted cloud governance and control framework: Combine commercial best practices, regulatory obligations, and line-of-business requirements to form a sustainable cloud governance strategy. As part of this governance strategy, take a deep dive into your cloud user activities by department and business function, and understand the business needs for each cloud application. Balance these needs with your regulatory requirements to develop a practical and meaningful control framework. • Establish integrated technologies to discover, protect, and monitor cloud usage: Discover who is doing what with which cloud applications is only the first step. You need to make sure that you have ongoing means to manage cloud access and exert continuous controls. In addition, your controls need to be granular enough to meaningfully limit your data exposure to the cloud without hindering cloud functionality. Most importantly, discovering, protecting, and consistently monitoring should be integrated functions rather than discrete capabilities that you have to manage separately. • Be proactive in your cloud management strategies: Do you have a way to enhance cloud literacy across your organization both in terms of risk education as well as best practices? Can you utilize your user access pattern to guide and optimize your cloud adoption? Do you have a way to consolidate redundant applications and can you effectively migrate users from risky apps to approved ones? “Never again should it be possible to say ‘We didn’t know’ or ‘we were surprised,.” “No data movement to and from the cloud and everywhere in between should be invisible and uncontrolled.” These are the statements from practitioners living in the world of cloud transformation and this is the reality that CipherCloud is here to enable. Cloud Adoption & Risk Report for North America & Europe: 2014 Trends CipherCloud | © 2015 12 About CipherCloud for Cloud Discovery CipherCloud for Cloud Discovery makes it simple and cost effective to continuously discover and categorize all the cloud applications users are accessing, identify the risks for each application, and analyze the impact on the company’s network resources and compliance posture. Intuitive drill-down dashboards provide detailed information on the top cloud applications being accessed by number of events, data volume, and risk level. Our rich knowledge base, CloudSource™, supports a growing list of thousands of applications. CloudSource tracks more than a 100 granular risk metrics across security, privacy, compliance, environment and legal categories for each application. Also, CipherCloud for Cloud Discovery is unique because it does not require you to share sensitive log data outside the organization. The solution is built on a popular and highly extensible platform, enabling detailed analysis of logs from proxy servers and firewalls. Risk Status Overview CipherCloud, the leader in cloud visibility and data protection, delivers cloud adoption while ensuring security, compliance and control. CipherCloud’s open platform provides comprehensive cloud application discovery and risk assessment, data protection— searchable strong encryption, tokenization, data loss prevention, key management and malware detection—and extensive user activity and anomaly monitoring services. CipherCloud is experiencing exceptional growth and success with over 3 million business users across 11 different industries. Headquarters: CipherCloud 333 West San Carlos Street San Jose, CA 95110 www.ciphercloud.com linkedin.com/company/ciphercloud @ciphercloud [email protected] 1-855-5CIPHER (1-855-524-7437) The CipherCloud product portfolio protects popular cloud applications out-of-thebox such as Salesforce, Box, Microsoft Office 365, and ServiceNow. Named SC Magazine’s 2013 Best Product of the Year, CipherCloud’s technology is FIPS 140-2 validated and the company is backed by premier venture capital firms Transamerica Ventures, Andreessen Horowitz, Delta Partners, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud. WP-CC-RN-20150202 CipherCloud | © 2015 All trademarks are property of their respective owners. Guide to Cloud Data Protection
© Copyright 2024 ExpyDoc