cloud adoption & risk in north america & europe - CipherCloud

reported surveys of the percent of enterprises using cloud services range from as low as 19%1 to 50%—clearly ignoring Shadow IT. Other surveys have shown as many as 80%1 of end-users admitting to using unsanctioned applications, but without any measurements of actual usage. CipherCloud worked closely in 2014 ...
1001KB Größe 8 Downloads 201 Ansichten
CLOUD ADOPTION & RISK CLOUD ADOPTION & RISK REPORT IN NORTH AMERICA FOR NORTH AMERICA & EUROPE & EUROPE 2014 Trends

333 W. San Carlos Street San Jose, CA 95110

EXECUTIVE SUMMARY

Few advances come close to the power of cloud computing to re-chart the path of enterprise IT. With faster time to market, massive economy of scale, and unparalleled agility, the cloud is being adopted by enterprises at an unprecedented rate. At the same time, however, few organizations have a strategic and coherent approach to managing cloud security and risk. Limited visibility, uncertain responsibility boundaries, and the lack of effective governance frameworks have all contributed to the current state of the art. As one Fortune 500 company CISO puts it: “Go to the cloud and hope for the best.” This report, with insights drawn from CipherCloud’s customers and our extensive cloud risk knowledge base, helps to shed light on enterprise cloud usage, risks observed, and geo-specific trends. This report includes anonymized data of cloud user activity collected for the full 2014 calendar year, spanning thousands of cloud applications and millions of enterprise cloud users.

Organizations vastly underestimate the level of Shadow IT.

Our findings suggest that organizations vastly underestimate the level of Shadow IT when it comes to cloud adoption. As a result, hundreds of high-risk cloud applications are in common use across North America and European enterprises. To achieve governance, it is imperative that organizations build the necessary legal and technological infrastructure to address cloud risks. This report discusses key points of focus for enterprise IT in order to address the competing tensions between business efficiency and security control and visibility.

Cloud Adoption & Risk Report for North America & Europe: 2014 Trends

CipherCloud | © 2015

02

Key Findings

• The average global enterprise utilizes over 1,100 cloud applications Our study found widespread cloud adoption across North America and Europe. In our 2014 data, a typical North America enterprise used over 1,245 cloud applications while those in Europe used 981 applications on average.

• 86% of cloud applications used by enterprises are unsanctioned “Shadow IT” Our study found that enterprises vastly underestimate the extent of Shadow IT cloud applications used by their organizations. Various media sources claim 10% to 50% of cloud applications are not visible to IT. Our statistics show that on average 86% of cloud applications are unsanctioned. For example, a major US enterprise estimated 10–15 file sharing applications were in use, but discovered almost 70.

• Publishing, Social, and Career clouds are 2014’s most risky cloud categories Our research rated 52% of applications in Publishing as high risk. Similarly, 42% in Social and 40% in Career clouds are rated as high risk. These three represent the highest risk across all cloud applications.

• Europe is narrowing the gap of cloud adoption to North America Contrary to widespread beliefs that Europe lags North America significantly in cloud adoption, our research found that European enterprises leverage the cloud just as extensively as North America—an average European organization used 80% as many cloud applications in 2014, distributed across similar application categories.

• 70% of US cloud applications used by European organizations are not “Safe Harbor” approved In our data set, we found that only 9% of the clouds used by European enterprises were either Europe-based or in European-approved data transfer regions; 21% were US clouds and Safe Harbor approved. The rest, a whopping 70%, were US clouds without Safe Harbor certification.

03

CipherCloud | © 2015

Cloud Adoption & Risk Report for North America & Europe: 2014 Trends

03

The CipherCloud Risk Model CipherCloud is committed to providing enterprises with accurate risk ratings based on open standards, a transparent process, and the most current risk factors. The CipherCloud Risk Intelligence Lab™ uses the principles of transparency, community, and alignment with standards to provide extensive research, automated testing, and expert analysis of cloud application risks.

SECURITY • Multi-factor • • • • • •

Authentication Single Sign-On Encryption of data-at-rest SSL/TLS Landing domain Login domain HTTP headers

PRIVACY • Privacy policy • Cookie policy • Data retention • • • •

Data ownership Third-party access Business Transactions Privacy Compliance Data Residency

ENVIRONMENT • Location • Service Level Agreement

• Disaster

recovery

• Multi-tenancy • Type of usage • Control of environment

• Data breaches

COMPLIANCE • • • • • • • • • •

Safe Harbor Comodo ISO 27001 PCI AoC HIPAA FedRAMP CSA CCM SAS 70 SSAE16 SOC 1, 2, 3

Figure 1: CipherCloud risk model components.

The CipherCloud Risk Intelligence Lab™ analyzes tens of thousands of cloud applications globally in the compiling its CloudSource™ knowledge base. CipherCloud utilizes a standards-based model for cloud risk scoring, with over 100 attributes across four risk categories: Security, Privacy, Environment and Compliance. The cloud risk model includes security controls defined by the Cloud Security Alliance Cloud Control Matrix, Privacy best practices detailed by TRUSTe, and industry and regulatory standards such as HIPAA and PCI DSS. Figure 1 provides a more detailed view of the attributes used in our cloud risk model. CipherCloud examines factors such as whether the cloud application uses multifactor authentication, whether data stored in the cloud is encrypted, the location of cloud data centers, third-party data access, and compliance certifications. All risk attributes are independently verified by our staff of expert researchers. Risk scores range from 1 (lowest risk) to 10 (highest risk).

Cloud Adoption & Risk Report for North America & Europe: 2014 Trends

CipherCloud | © 2015

04

Cloud Computing Is Transforming the Global Enterprise Right Under Our Eyes CipherCloud research found that enterprises in both North America and Europe are leveraging cloud applications extensively. An average global enterprise uses over 1,000 distinct cloud applications (see Figure 2). The number of applications used in North America (1,245) is slightly higher than that in Europe (981).

Global Average Category Cloud Count Email

27

Finance

27

Publishing

35

Education

37

Communication

38

HR

52

Business Management

61

CRM

89

E-Commerce

114

Analytics

126

Software Development

129

Cloud Storage

136

Media

140

IT Infrastructure

163

Marketing

196

Collaboration

211

Social

254

0

75

150

225

300

Figure 2: Average number of cloud applications accessed globally by enterprises by category.

Figure 2 shows the global average ranking of cloud applications by popularity. Social, Collaboration, Marketing, and IT infrastructure are the most popular cloud categories—an average enterprise uses approximately 100 different applications in each of these categories.

05

CipherCloud | © 2015

Cloud Adoption & Risk Report for North America & Europe: 2014 Trends

05

Enterprises Underestimate the Extent of Shadow IT We all know that the use of Shadow IT within businesses is exploding, but few enterprises have been able to accurately assess the extent of the problem. Selfreported surveys of the percent of enterprises using cloud services range from as low as 19%1 to 50%—clearly ignoring Shadow IT. Other surveys have shown as many as 80%1 of end-users admitting to using unsanctioned applications, but without any measurements of actual usage. CipherCloud worked closely in 2014 with large enterprises globally to discover all cloud applications in use, and compare them with internal metrics of what is approved. The chart below compares IT approved applications with Shadow IT across North American and European enterprises.

69% 43%

ia c Co tu re lla bo r a So ftw tion ar e De v

fra

st

ru

ed

M

c ia

19% 18%

IT

In

ke tin

ar M

Co

m

m

ag

Figure 3: IT-approved applications vs. Shadow IT globally in 2014.

d

St or Total

E-

14%

ou

18%

Europe

Cl

12%

North America

l

34% 34% 27% 22%

g

86%

82%

80% 70% 60% 50% 40% 30% 20% 10% 0%

e er ce

88%

Shadow IT

So

IT-Approved

100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0%

Figure 4: Cloud applications discovered by a major enterprise by category.

Specific anecdotes also help to illustrate the problem. A major US enterprise used CipherCloud to discover all their cloud applications in use. They expected to find 8–10 applications being used for file sharing, and were very surprised to find 69 separate applications in use for file sharing, with a large number of high-risk clouds.

Eurostat survey of enterprise cloud adoption for 2014 (http://ec.europa.eu/eurostat/statistics-explained/index.php/Cloud_computing_-_statistics_ on_the_use_by_enterprises) 2 Frost & Sullivan—The Hidden Truth Behind Shadow IT: http://www.mcafee.com/us/resources/reports/rp-six-trends-security.pdf 1

Cloud Adoption & Risk Report for North America & Europe: 2014 Trends

CipherCloud | © 2015

06

Publishing, Social and Career Clouds Are 2014’s Top Three Most Risky Cloud Categories Information workers frequently use publishing, social, and career cloud applications to do their jobs, often with great effect. However, our research showed that in 2014 these three categories comprise the top three most risky clouds: Our intelligence lab rated 52% of Publishing cloud applications as high risk. Similarly, 42% in Social and 40% in Career clouds are deemed high risk. Software Development, Cloud Storage, IT Infrastructure, CRM, HR and Business Management categories also had significant percentages of applications with an overall risk score of 8 or higher (22%–36%).

Security

11%

Email

13%

Productivity

17%

Analytics

18%

Collaboration

19%

Communication

20%

Finance

20%

Software Development

22%

IT Infrastructure

24%

Cloud Storage

24%

Events

29%

CRM

29%

HR

31%

Marketing

36%

Business Management

36%

E-Commerce

37%

Media

39%

Careers

40%

Social

47%

Publishing

52%

0%

Examples of the types of applications in the top categories:

15%

30%

45%

60%

• Publishing: Wordpress, Adobe Creative Cloud • Social: LinkedIn, Twitter • Careers: Indeed, Resumonk

Figure 5: Top 20 cloud application categories by percentage of high risk cloud providers.

07

CipherCloud | © 2015

Cloud Adoption & Risk Report for North America & Europe: 2014 Trends

07

Europe Narrows the Gap in Cloud Adoption

Contrary to conventional wisdom that Europe lags North America in cloud adoption, CipherCloud research found that European enterprises have largely caught up to US in cloud usage. More specifically, we found that top cloud applications used by European enterprises are in largely the same categories as those used in North America, albeit European companies use 80% as many applications on average (see Figure 6). For example, North America organizations used an average of 94 IT Infrastructure applications, compared with 69 in Europe. Similarly, North America companies used on average 68 analytics clouds and Europe used 58. This may have to do with the fact that Europe’s cloud application market is projected to grow faster than North America through 2018. One analyst firm estimates that Europe will grow at a 19.1% CAGR while North America will grow at a 15.9% CAGR3.

Finance

29

41

Business Management

18

43

CRM

34

E-Commerce

51

Software Development

64

Analytics

58

68

Cloud Storage

59

77

Media

63

IT Infrastructure

69

Marketing

82

Collaboration

85

Social

113

0

EU AVG. Category Cloud Count NA AVG. Category Cloud Count

55 63

65

77 94 114 126

141

75

150

225

300

Figure 6: Average number of cloud applications accessed by North American and European enterprises by category.

3

Apps Run the Cloud: https://www.appsrunthecloud.com/opinions/index/150

Cloud Adoption & Risk Report for North America & Europe: 2014 Trends

CipherCloud | © 2015

08

European Enterprises Are as Cloud-Risky as Those in North America CipherCloud found that an average North American enterprise uses 1,245 cloud applications while 981 applications were found in use by an average European firm. With that many cloud applications, an average of 56 high-risk clouds per organization were found in North America and 42 high-risk ones per organization were found in Europe. Perhaps more alarmingly, in both North America and Europe, over 300 users per organization were found using high-risk clouds in 2014 (see Figure 7). Figure 7 also depicts a break down between high-, medium-, and low-risk clouds in use by both geos. A similar pattern was observed throughout, with the exception that a higher percentage of medium-risk clouds were used in Europe vs. North America. North American Cloud Application Usage Trends

1,245

56

391

European Cloud Application Usage Trends

981

42

307

Average # of cloud apps per organization

Average # of high risk clouds per organization

Average # of high risk cloud users per organization

NA Cloud Application Risk Distribution All Clouds

EU Cloud Application Risk Distribution All Clouds

4.5%

4.3%

15% 24.6%

high medium 80.5%

71.2%

low

Figure 7: Comparisons of average cloud applications accessed by North American and European enterprises, along with breakdowns of risk levels.

Figure 7 shows a deeper look at each cloud application category used in North America and Europe, as well as the associated risk scores. Overall, the categories in use and the risk scores are fairly comparable between the two regions, with a few exceptions. For example, the average risk score for software development clouds used by North America (5.15) is noticeably higher than those used in Europe (4.81), even though both regions used a similar number of cloud applications for software development. In contrast, communication clouds used by European companies carry a higher average risk score (5.25) than those used by North America (4.86).

09

CipherCloud | © 2015

Cloud Adoption & Risk Report for North America & Europe: 2014 Trends

09

6.00

4.33

4.66

4.54

4.81

4.81

5.00

5.03

5.00

4.50

5.18

5.08

5.07

5.25

5.30

5.32 5.35

5.73

5.83

120

90

EU Avg. Category Risk Score EU Avg. Category Count

4.51

4.53

4.88

4.79

5.02

5.06

5.12

5.15

5.25

82

Co m

5.28

5.39

5.30

5.72

18

0

Bu Mana siness geme nt

CRM

5.45

5.52

6.00

4.87

34

M a rk eting

113

l

23

munic

16

Socia

e

51

merc

rastru

63

IT Inf

Publi

Cloud

tics

69

E- Co m

59

Stora ge

15

shing

58

Analy

64

So Deve f tware lopm ent

Educ a

ce

Colla

16

tion

85

b o ra t ion

29

Finan

12

Email

0.00

HR

30

ation

1.50

Media

60

c ture

3.00

5.87

4.50

160

120 NA Avg. Category Risk Score NA Avg. Category Count

43

114

Bu Mana siness geme nt

M a rk eting

141

l

20

Socia

55

shing

21

Publi

29

Educ a

77

HR

65

So Deve f tware lopm ent Cloud Stora ge

rastru

c ture

94

IT I n f

77

merc

63

E- Co m

tics

68

Analy

munic

ation

22

Co m

borat ion

126

Colla

Finan

15

Email

41

ce

0.00

CRM

40

tion

1.50

Media

80

e

3.00

0

Figure 8: Comparison of commonly used cloud application categories in Europe (top) and North America (bottom), as sorted by the average risk score per category.

Cloud Adoption & Risk Report for North America & Europe: 2014 Trends

CipherCloud | © 2015

10

European Companies Are Not Enforcing “Safe Harbor” Principles with Cloud Applications European Union data privacy laws require that transfers of personal information be restricted to European Union member states, or countries approved by the European Union for international data transfer. The US does not have country-wide approval, but US businesses can become Safe Harbor compliant by following seven fundamental data protection principles, and hence become eligible to handle transfers of personal data from European territories. By Law, European organizations can only transfer personal data to US businesses that are “Safe Harbor” certified. In practice, however, this seems to have little impact on actual cloud usage by enterprise users. CipherCloud research found that 70% of cloud applications used by European organizations are based in the US and not Safe Harbor approved. Only 9% of applications accessed were based in Europe and approved data transfer regions while 21% were US “Safe Harbor” compliant clouds. This trend likely corresponds with Shadow IT. Enterprise-sanctioned cloud applications used in Europe are more likely to be Safe Harbor certified, while those accessed directly by end-users appear to be largely non-compliant. A 2013 study by the European Union Commission found that the US-EU Safe Harbor principles are not well enforced; over 30% of Safe Harbor certified providers violate at least one of the Safe Harbor principle requirements.

21%

100,000

User Count

75,000

50,000

69%

25,000

9% 0

0%

12.5%

25%

37.5%

50%

Traffic Volume

EU Safe Harbor Compliance (45 days of user activity) EU Safe Harbor Certified

Cloud App Count (%)

Total Traffic Volume (%)

EU-based

9%

8%

10204

YES*

21%

42.4%

98716

NO*

69%

49.6%

46307

Total Users*

Figure 9: Distribution of EU-based, Safe Harbor-certified, and non-Safe Harbor cloud applications. *US-EU Safe Harbor is a streamlined process for US companies to comply with the European Union Directive 95/46/EC on the protection of personal data. The Safe Harbor Privacy Principles allow US companies to register their certification if they meet the European Union requirements via the US Department of Commerce.

11

CipherCloud | © 2015

Cloud Adoption & Risk Report for North America & Europe: 2014 Trends

11

Call to Action Cloud computing offers organizations a rare chance to challenge the status quo in technology delivery methods and has already had a global impact on the traditional IT stack. To unlock the power of the cloud and at the same time effectively manage the tension between business efficiency and enterprise controls, CipherCloud recommends these strategic areas of focus: 1. Designate cloud security as a strategic area of IT security 2. Enhance cloud situational awareness and improve your cloud governance posture 3. Establish a systematic, integrated technological approach to support your governance needs To support these goals, firms should undertake the following immediate actions:

• Develop a multi-faceted cloud governance and control framework: Combine commercial best practices, regulatory obligations, and line-of-business requirements to form a sustainable cloud governance strategy. As part of this governance strategy, take a deep dive into your cloud user activities by department and business function, and understand the business needs for each cloud application. Balance these needs with your regulatory requirements to develop a practical and meaningful control framework.

• Establish integrated technologies to discover, protect, and monitor cloud

usage: Discover who is doing what with which cloud applications is only the first step. You need to make sure that you have ongoing means to manage cloud access and exert continuous controls. In addition, your controls need to be granular enough to meaningfully limit your data exposure to the cloud without hindering cloud functionality. Most importantly, discovering, protecting, and consistently monitoring should be integrated functions rather than discrete capabilities that you have to manage separately.

• Be proactive in your cloud management strategies: Do you have a way to enhance cloud literacy across your organization both in terms of risk education as well as best practices? Can you utilize your user access pattern to guide and optimize your cloud adoption? Do you have a way to consolidate redundant applications and can you effectively migrate users from risky apps to approved ones? “Never again should it be possible to say ‘We didn’t know’ or ‘we were surprised,.” “No data movement to and from the cloud and everywhere in between should be invisible and uncontrolled.”

These are the statements from practitioners living in the world of cloud transformation and this is the reality that CipherCloud is here to enable.

Cloud Adoption & Risk Report for North America & Europe: 2014 Trends

CipherCloud | © 2015

12

About CipherCloud for Cloud Discovery

CipherCloud for Cloud Discovery makes it simple and cost effective to continuously discover and categorize all the cloud applications users are accessing, identify the risks for each application, and analyze the impact on the company’s network resources and compliance posture. Intuitive drill-down dashboards provide detailed information on the top cloud applications being accessed by number of events, data volume, and risk level. Our rich knowledge base, CloudSource™, supports a growing list of thousands of applications. CloudSource tracks more than a 100 granular risk metrics across security, privacy, compliance, environment and legal categories for each application. Also, CipherCloud for Cloud Discovery is unique because it does not require you to share sensitive log data outside the organization. The solution is built on a popular and highly extensible platform, enabling detailed analysis of logs from proxy servers and firewalls.

Risk Status Overview

CipherCloud, the leader in cloud visibility and data protection, delivers cloud adoption while ensuring security, compliance and control. CipherCloud’s open platform provides comprehensive cloud application discovery and risk assessment, data protection— searchable strong encryption, tokenization, data loss prevention, key management and malware detection—and extensive user activity and anomaly monitoring services. CipherCloud is experiencing exceptional growth and success with over 3 million business users across 11 different industries.

Headquarters: CipherCloud 333 West San Carlos Street San Jose, CA 95110 www.ciphercloud.com

linkedin.com/company/ciphercloud

@ciphercloud [email protected] 1-855-5CIPHER (1-855-524-7437)

The CipherCloud product portfolio protects popular cloud applications out-of-thebox such as Salesforce, Box, Microsoft Office 365, and ServiceNow. Named SC Magazine’s 2013 Best Product of the Year, CipherCloud’s technology is FIPS 140-2 validated and the company is backed by premier venture capital firms Transamerica Ventures, Andreessen Horowitz, Delta Partners, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud. WP-CC-RN-20150202

CipherCloud | © 2015 All trademarks are property of their respective owners. Guide to Cloud Data Protection