The role of the IT is shifting as IT departments transition from building and maintaining technology to brokering the procurement and management of external services. At the same time, the threat landscape is evolving rapidly with more frequent and sophisticated attacks.
As organizations increase their use of public cloud infrastructure, concern about security is a major barrier to successfully utilizing the cloud. Organizations are looking to new solutions to secure cloud services, including SaaS, IaaS, and PaaS. We asked IT leaders which security functions are most important to extend to data stored in cloud services, and what challenges they encounter in attempting to gain visibility and control over data as the perimeter erodes. We also explored how recent trends in IT security are shaping IT security budgets, new skills required to be effective, and how organizations plan to develop or acquire these new skills
Enterprises are increasingly relying on public cloud infrastructure providers such as Amazon, Microsoft, and Google for their computing resources, rather than managing their own data centers.
While Amazon continues its dominance of the IaaS market, Microsoft is closing the gap in market share. IT professionals at 37.1% of companies indicated that Amazon AWS is the most popular IaaS platform at their organization. Microsoft Azure is a close second, at 28.4% followed by Google Cloud Platform at 16.5%.
Though cloud providers continue to introduce new security capabilities, when it comes to securing data in cloud applications, 66.9% of IT professionals believe it is important to maintain a separation of duties between the application provider and the security provider.
A CASB is not the only security technology that generates alerts. Nearly one in five organizations today have more than 10 security tools in use that generate alerts. As more security tools generate more alerts, it is becoming challenging for IT organizations to keep up. In the Target breach, the company used a security tool that correctly alerted them but it was ignored.
Alert fatigue is a common complaint among IT security professionals, and 40.4% say that the alerts they receive lack actionable information they need to investigate, and 31.9% report that they ignore alerts sometimes because there are so many false positives that incorrectly flag behavior that does not turn out to be a security incident. Another 27.7% say their organization experiences incidents for which there was no alert from a security tool.
Another common challenge reported by IT professionals is endpoint agents. The problem is multi-faceted. Due to the challenges of rolling out agent software on thousands of corporate-owned and employee devices with many operating systems, organizations today have procured endpoint agent-based security solutions but have only partially deployed them and have solutions they have procured but never deployed.
Among IT professionals who have been involved in an agent deployment, 100% have experienced at least one significant issue and 52.8% would characterize the prospect of rolling out a new agent to devices as “difficult”. Just 11.1% say the rollout would be easy. When asked about the challenges they have faced, 63.6% report that they have experienced slower device performance and 44.3% have had challenges with device and driver conflicts that break device functionality.
Lastly, another barrier faced by 36.4% of IT professionals rolling out endpoint agents is user privacy and liability on personal devices. Taken together, IT professionals themselves are hesitant to roll out a corporate endpoint agent on their own devices. When asked if they would personally want a new agent-based security solution installed on their mobile device, 41.0% of IT professionals said no. Another 26.5% said they would install it, but only because their company required it.