Welcome!

Cloud Security Authors: Elizabeth White, Zakia Bouachraoui, Pat Romanski, Yeshim Deniz, Liz McMillan

Related Topics: @CloudExpo, Cloud Security

@CloudExpo: Article

Global Cloud Security Market | @CloudExpo #DataCenter #Storage #InfoSec

Adoption of cloud computing services has risen and so have the security risks associated with them

Global Cloud Security Market Expected to Grow Exponentially Over the Next Few Years

According to a study the rising number of cloud-specific security attacks are likely to propel the demand for cloud security systems to 20 percent CAGR over the next four years.

Adoption of cloud computing services has risen and so have the security risks associated with them. According to a study published by Technavio Research, the rising number of cloud-specific security attacks are likely to propel the demand for cloud security systems over the next few years. Growth has been pegged at 20 percent CAGR over the next four years. According to the study, the usage of cloud-based services require users to reveal their credentials and this is a system prone to identity theft. The study predicts the dominance of American customers (which is at 51 percent at the moment) do decline by 2020 due to saturation in the market.

There are essentially four categories of cloud security software in the market - data loss prevention (DLP), intrusion/prevention systems (IDS/IPS), email security and identity/access management (IAM). Of this, IAM alone is expected to constitute nearly 42 percent of the market and should continue to lead the segment through 2020 as identity thefts continue to be the most feared attacks among businesses. As a result, identity as a service (IDaaS) that provides third party security verification infrastructure solutions are expected to grow in popularity through the next half decade.

Data Security: The recent fiasco between the FBI and Apple has thrown the focus on data security. The fact that personal data of consumers can be extracted or hacked into with or without interference from the governments has kept the demand for data security solutions alive among enterprise businesses. But the frequency of such data threats from the governments or hackers is not as much a concern as those arising from improper database storage standards and practices. There are a number of database security best practices that can help enterprises protect their data and data centers and these can help businesses protect their proprietary data from accidental loss or even third party attacks.

Email Security: Malware and phishing attacks have existed for decades now and are now a well-acknowledged security threat among enterprise and retail consumers. But a rise in data breaches have given way to a more dangerous form of threat called spear phishing. With spear fishing, scammers make use of publicly available data or those obtained through third party data breaches to craft messages that are more personalized and therefore more credible in the eyes of the recipient. For instance, after the recent Verizon data breach, a number of customers started receiving emails purportedly from Verizon that tried to steal financial data from unsuspecting customers. Unfortunately, no amount of anti-spam or anti-malware software can protect customers from the most crafty phishing emails and the answer to this lies with better awareness among users.

Intrusion Detection/Prevention: A study by WiseGuyReports finds the market for intrusion detection and prevention systems (IDS/IPS) to grow at a CAGR of 20 percent over the next five years until 2020. One of the major reasons behind this rising adoption trend is the growth in adoption of mobile and connected devices. The American market is expected to drive growth in this segment with a market share of more than 44 percent led by vendors like Cisco, IBM, Juniper Networks and McAfee.

Cloud based services have a distinct advantage over hosted systems in terms of cost and maintenance. However, the connected nature of the system also makes it prone to security threats. As the security infrastructure in this segment matures over the next few years, we are likely to see an era where cloud systems are as robust in security as in-house hosted systems.

More Stories By Harry Trott

Harry Trott is an IT consultant from Perth, WA. He is currently working on a long term project in Bangalore, India. Harry has over 7 years of work experience on cloud and networking based projects. He is also working on a SaaS based startup which is currently in stealth mode.

IoT & Smart Cities Stories
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of San...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...