Evolve Your Security Operations Strategy To Account For Cloud

Download Evolve Your Security Operations Strategy To Account For Cloud

Post on 14-Feb-2017

213 views

Category:

Documents

0 download

Embed Size (px)

TRANSCRIPT

  • Methodology

    In this study, Forrester Consulting conducted an online survey of 100 US and

    UK IT professionals at the director level and above who have workloads in the

    public cloud and manage cloud security infrastructure.

    Base: 100 US and UK IT professionals at the director level and above who

    have workloads in the public cloud and manage cloud security infrastructure

    *Base: 82 US and UK IT professionals at the director level and above who

    work for companies that have their own SOC

    Source: A study conducted by Forrester Consulting on behalf of Alert Logic,

    June 2016

    Evolve Your Security Operations Strategy To Account For Cloud

    Increasing adoption of cloud and complex IT service delivery models present challenges and opportunities for security teams.

    Increasing cloud adoption requires

    adjustments in security operations strategy

    Cloud adoption is changing security operations:

    Increased investment

    in security operations

    Instituted new cloud security

    policies and controls

    Reevaluated security

    operations and controls

    across environments

    44% 44% 41%

    79%of IT professionals responsible for cloud

    security infrastructure value access to security

    experts for their security operations.

    Companies building in-house SOCs face

    challenges

    Top three challenges with building an in-house security

    operations center (SOC):*

    IT professionals value expertise from

    security partners

    Reasons companies engage a security expert:

    Threat intelligence

    analysis

    Public cloud security

    Security operations

    Network security

    Data privacy and

    compliance 76%

    76%

    77%

    80%

    83%

    Benefits achieved through engaging security experts:

    47% Greater security competency

    42% Improved quality of protection

    36% Improved regulatory compliance

    35% Improved accuracy of decisions

    35% Reduced cost/overhead

    29% Enriched threat intelligence

    Changed vulnerability

    management and scanning

    for hybrid environments

    51% 49%

    46% 34%

    Identifying

    multivector

    attacks

    High costsManaging

    security content

Recommended

View more >