sb-eu logo
Story image

Check Point releases report on public cloud security challenges

17 Jul 2019

Check Point and Cybersecurity Insiders have released the results of a global Cloud Security Report highlighting the challenges faced by enterprise security operations teams in protecting their public cloud data, systems, and services.

While public cloud providers expand their security services to protect their platforms, it is ultimately the customers’ responsibility to secure their data and applications on those platforms.

While a majority of organisations said their public cloud instances had not been hacked (54%), 25% did not know whether they had experienced a cloud breach, while 15% confirmed they had experienced a cloud security incident.

Key findings of the 2019 Cloud Security Report include: 

  • The top four public cloud vulnerabilities: the leading vulnerabilities cited by respondents were unauthorised cloud access (42%), insecure interfaces (42%), misconfiguration of the cloud platform (40%), and account hijacking (39%). 
     
  • The leading operational cloud security headaches:  security teams struggle with a lack of visibility into cloud infrastructure security and compliance (67% in total). Setting consistent security policies across cloud and on premise environments and a lack of qualified security staff tie for third place (31% each).
     
  • Legacy security tools are not designed for public clouds:  66% of respondents said their traditional security solutions either don’t work at all, or only provide limited functionality in cloud environments. 
     
  • Security challenges inhibit cloud adoption:  the biggest barriers to wider public cloud adoption cited by respondents are data security (29%), risk of compromise (28%), compliance challenges (26%) and a lack of experience and qualified security staff (26%).

“The report’s findings clearly show that enterprise security teams need to urgently reassess their security strategies and address the shortcomings of their legacy security tools to protect their evolving public cloud environments and avoid breaches. 

“With 15% of respondents reporting they’ve had a cloud security incident, criminals are seeking to exploit organisations’ cloud vulnerabilities,” says Check Point cloud product line head Zohar Alon. 

“Enterprises need to get holistic visibility across all of their public cloud environments, supported by cloud-native policy automation, compliance enforcement, privileged identity protection and event analysis, to make their cloud deployments more secure and manageable.” 

The 2019 Cloud Security Report is based on the results of a comprehensive online survey of 674 cybersecurity and IT professionals, conducted in Spring 2019 to gain deep insight into the latest trends, key challenges and solutions for cloud security across a balanced cross-section of organisations of varying sizes across multiple industry sectors. 

The survey was done by Cybersecurity Insiders, the 400,000-member information security community.

Story image
Yubico launches latest YubiKey with NFC & USB-C support
Yubico has released a new hardware authentication key, designed to provide security through both near-field communication (NFC) and USB-C connections and smart card support.More
Story image
Is cyber deception the latest SOC 'game changer'?
Cyber deception reduces data breach costs by more than 51% and Security Operations Centre (SOC) inefficiencies by 32%, according to a new research report by Attivo Networks and Kevin Fiscus of Deceptive Defense.More
Story image
Kaspersky releases new report on consumer’s approach to digital services
COVID-19 related restrictions and the necessity to stay indoors has influenced the way people approach digital services, making them more aware of how securely both they, and their housemates, use the internet.More
Story image
Revealed: The behaviours exhibited by the most effective CISOs
As cyber-threats pile up, more is being asked of CISOs - and according to Gartner, only a precious few are 'excelling' by the standards of their CISO Effectiveness Index.More
Story image
SMBs seeking service providers in face of rising cyber threats
SMBs are struggling with their cybersecurity solutions, with three quarters worried about being the target of a cyberattack in the next six months, and 91% considering using or switching to a new IT service provider if offered a better option.More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More