SYS-CON MEDIA Authors: Adine Deford, Cynthia Dunlop, Harry Trott, Xenia von Wedel, Peter Silva

News Feed Item

Symantec Global Survey Reveals Upsurge in Rogue Clouds and Other Hidden Costs

MOUNTAIN VIEW, CA -- (Marketwire) -- 01/16/13 -- Organizations are widely migrating to the cloud to gain competitive advantages around speed, agility and flexibility according to Symantec Corp's. (NASDAQ: SYMC) recent Avoiding the Hidden Costs of Cloud 2013 Survey. In fact, more than 90 percent of all organizations are at least discussing cloud, up from 75 percent a year ago. Other key survey findings showed enterprises and SMBs are experiencing escalating costs tied to rogue cloud use, complex backup and recovery, and inefficient cloud storage. Rogue clouds are defined as business groups implementing public cloud applications that are not managed by or integrated into the company's IT infrastructure.

Industry experts predict several key issues will arise in 2013 focused on the financial pressures and security challenges of cloud computing. Business continuity is seen as an important issue with the increase in cloud outages posing greater risks than security breaches. Over the holidays, a leading cloud service provider experienced an outage, which they quickly remediated. This outage impacted businesses and posed important concerns around data loss prevention, backup, time spent on data recovery and the associated costs. However, with advance preparation, organizations can build safe, agile and efficient clouds that will enable them to meet their business goals.

Read more detailed blog post: Avoiding Hidden Costs in the Cloud

"By taking control of cloud deployments, companies can seize advantage of the flexibility and cost savings associated with the cloud, while minimizing the data control and security risks linked with rogue cloud use," said Francis deSouza, group president, Enterprise Products and Services, Symantec.

Click to Tweet: 77% of businesses saw rogue cloud deployments last year, 40% of them suffered exposure of confidential info: http://bit.ly/X988cQ

Rogue Cloud Implementations
According to the survey, rogue cloud deployments are one of the cost pitfalls. It is a surprisingly common problem, found in more than three quarters (77 percent) of businesses within the last year. It also seems to be an issue experienced more by enterprises (83 percent), due to their larger company size, than SMBs (70 percent).

Among organizations who reported rogue cloud issues, 40 percent experienced the exposure of confidential information, and more than a quarter faced account takeover issues, defacement of Web properties, or stolen goods or services. The most commonly cited reasons for undertaking rogue cloud projects were to save time and money.

Cloud Backup and Recovery Issues
Cloud is complicating backup and recovery. First, most organizations use three or more solutions to back-up their physical, virtual and cloud data -- leading to increased IT inefficiencies, risk and training costs. Furthermore, 43 percent of organizations have lost cloud data (47 percent of enterprises and 36 percent of SMBs), and most (68 percent) have experienced recovery failures.

Finally, most see cloud recovery as a slow, tedious process. Only 32 percent rate this is as fast and 22 percent estimate it would take three or more days to recover from a catastrophic loss of data in the cloud.

Inefficient Cloud Storage
One of the key advantages to cloud storage is how simple it is to provision. Sometimes this simplicity leads to inefficient cloud storage. Generally, organizations strive to maintain a storage utilization rate above 50 percent. According to the survey, cloud storage utilization is surprisingly low at 17 percent. There is a tremendous difference in this area between enterprises (which are utilizing 26 percent of their storage) and SMBs (which is a shockingly low seven percent). Furthermore, roughly half admit very little, if any, of their cloud data is deduplicated, further compounding the problem.

Compliance and eDiscovery Concerns
According to the survey, 49 percent of organizations are concerned about meeting compliance requirements in the cloud, and a slightly larger number (53 percent) are concerned about being able to prove they have met cloud compliance requirements. This concern about information in the cloud is well founded, as 23 percent of organizations have been fined for cloud privacy violations.

eDiscovery is creating additional pressure on businesses to quickly find the right information. One-third of businesses reported receiving eDiscovery requests for cloud data. Of those, two-thirds have missed their cloud discovery deadlines, leading to fines and legal risks.

Data in Transit Issues
Organizations have all sorts of assets in the cloud -- such as Web properties, online businesses or Web applications -- that require SSL certificates to protect the data in transit whether it is personal or financial information, business transactions and other online interactions. The survey showed companies found managing many SSL certificates to be highly complex: Just 27 percent rate cloud SSL certificate management as easy and only 40 percent are certain their cloud-partner's certificates are in compliance with corporate standards.

Hidden Costs Are Easily Avoided
The survey shows ignoring these hidden costs will have a serious impact on business. However, these issues are easily mitigated with careful planning, implementation and management:

  • Focus policies on information and people, not technologies or platforms
  • Educate, monitor and enforce policies
  • Embrace tools that are platform agnostic
  • Deduplicate data in the cloud

Symantec's Avoiding the Hidden Costs of Cloud 2013 Survey
Symantec's 2013 Cloud Survey is a result of research conducted by ReRez in September-October 2012. The full study represents 3,236 organizations from 29 countries. Responses came from companies with a range of five to more than 5,000 employees. Of those responses, 1,358 came from SMBs and 1,878 came from enterprises.

Resources

Connect with Symantec

About Symantec
Symantec protects the world's information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment -- from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia.

NOTE TO EDITORS: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at http://www.symantec.com/news. All prices noted are in U.S. dollars and are valid only in the United States.

Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

FORWARD-LOOKING STATEMENTS: Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions.

Technorati Tags
Symantec, cloud, backup, recovery, storage, compliance, eDiscovery

CONTACT:
Judy Kaneko
Symantec Corp.
+1 (408) 203-0014
Email Contact

Sherri Walkenhorst
Connect Public Relations
(801) 373-7888
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hybrid cloud. Traditional networking approaches for building a hybrid cloud try to kludge together the enterprise infrastructure with the public cloud. Consequently this approach requires risky, deep "surgery" including changes to firewalls, subnets...
Want to enable self-service provisioning of application environments in minutes that mirror production? Can you automatically provide rich data with code-level detail back to the developers when issues occur in production? In his session at DevOps Summit, David Tesar, Microsoft Technical Evangelist on Microsoft Azure and DevOps, will discuss how to accomplish this and more utilizing technologies such as Microsoft Azure, Visual Studio online, and Application Insights in this demo-heavy session.
15th Cloud Expo, which took place Nov. 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, expanded the conference content of @ThingsExpo, Big Data Expo, and DevOps Summit to include two developer events. IBM held a Bluemix Developer Playground on November 5 and ElasticBox held a Hackathon on November 6. Both events took place on the expo floor. The Bluemix Developer Playground, for developers of all levels, highlighted the ease of use of Bluemix, its services and functionalit...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
Some developers believe that monitoring is a function of the operations team. Some operations teams firmly believe that monitoring the systems they maintain is sufficient to run the business successfully. Most of them are wrong. The complexity of today's applications have gone far and beyond the capabilities of "traditional" system-level monitoring tools and approaches and requires much broader knowledge of business and applications as a whole. The goal of DevOps is to connect all aspects of app...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water,...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series dat...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
SYS-CON Media announced that Centrify, a provider of unified identity management across cloud, mobile and data center environments that delivers single sign-on (SSO) for users and a simplified identity infrastructure for IT, has launched an ad campaign on Cloud Computing Journal. The ads focus on security: how an organization can successfully control privilege for all of the organization’s identities to mitigate identity-related risk without slowing down the business, and how Centrify provides ...
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...