New Industry Report From CloudLock Outlines Explosion of Enterprise Perimeter and Increased Exposure to Cloud Cyber Threats
WALTHAM, MA--(Marketwired - Apr 16, 2015) - CloudLock today unveiled its key findings of its first "Cloud Cybersecurity Report: The Extended Perimeter," a new industry analysis from CloudLock examining more than 750 million files, 77,500 apps and six million users in the cloud.
While businesses are clearly embracing the power of cloud applications with each organization collaborating with an average of 865 other organizations -- internal users, external collaborators and third-party apps are dramatically increasing the threat surface for new cloud cyberattacks. CloudLock research indicates that nearly one in four employees, unknowingly or not, violates corporate data security policy in public cloud applications. On average, each organization has a staggering 4,000 instances of exposed credentials. These usernames and passwords were either accessible across the entire company, externally, or, in the most severe cases, publicly -- a cybersecurity attack waiting to happen.
"The growth of the cloud and the corresponding expansion of the perimeter is staggering. It creates a monumental challenge for IT professionals looking to protect their enterprises from emerging cloud cyberattacks all while staying out of the way of users and allowing them to embrace the collaboration opportunities it provides," said Ayse Kaya Firat, director of customer insights and analytics at CloudLock. "It's only through an analysis of what data is truly important, coupled with an increase in user education and empowerment, that security can keep up with the rise of the cloud."
CloudLock's analysis uncovered exponential growth in cloud collaboration, including:
The Extended Perimeter
Apps Explosion
Cloud Cyber Security Risk on the Rise
Corporate Cloud Cyber Security Defense Strategies
Cloud application providers are taking great strides in securing access at the infrastructure layer and have never been more secure. So risk does not stem from the fact that cloud applications are used. Rather, risk is a product of neglecting the extension of the perimeter introduced by cloud applications. At the center of the expanded perimeter is the user, intersecting data, user profiles and applications. Security professionals can not only keep up with the increased security demand of the cloud but can actually align security with the business strategy of their organizations.
To download the CloudLock Data Security Report, please visit: http://www.cloudlock.com/wp-content/uploads/2015/04/Cloud-Cybersecurity-Report-The-Extended-Perimeter-CloudLock.pdf
About CloudLock
CloudLock offers the cloud security fabric enabling enterprises to protect their data in the cloud, reduce risk, achieve compliance, manage threats and increase productivity. By analyzing 15 billion+ objects for more than 6 million end users daily, CloudLock delivers the only complete, risk-appropriate and people-centric approach to cloud security. Learn more at cloudlock.com.
Contact Information:
PR Contact
Lisa Mokaba
Inkhouse for CloudLock
781-966-4100
cloudlock@inkhouse.com