itb-au logo
Story image

Check Point releases report on public cloud security challenges

17 Jul 2019

Check Point and Cybersecurity Insiders have released the results of a global Cloud Security Report highlighting the challenges faced by enterprise security operations teams in protecting their public cloud data, systems, and services.

While public cloud providers expand their security services to protect their platforms, it is ultimately the customers’ responsibility to secure their data and applications on those platforms.

While a majority of organisations said their public cloud instances had not been hacked (54%), 25% did not know whether they had experienced a cloud breach, while 15% confirmed they had experienced a cloud security incident.

Key findings of the 2019 Cloud Security Report include: 

  • The top four public cloud vulnerabilities: the leading vulnerabilities cited by respondents were unauthorised cloud access (42%), insecure interfaces (42%), misconfiguration of the cloud platform (40%), and account hijacking (39%). 
     
  • The leading operational cloud security headaches:  security teams struggle with a lack of visibility into cloud infrastructure security and compliance (67% in total). Setting consistent security policies across cloud and on premise environments and a lack of qualified security staff tie for third place (31% each).
     
  • Legacy security tools are not designed for public clouds:  66% of respondents said their traditional security solutions either don’t work at all, or only provide limited functionality in cloud environments. 
     
  • Security challenges inhibit cloud adoption:  the biggest barriers to wider public cloud adoption cited by respondents are data security (29%), risk of compromise (28%), compliance challenges (26%) and a lack of experience and qualified security staff (26%).

“The report’s findings clearly show that enterprise security teams need to urgently reassess their security strategies and address the shortcomings of their legacy security tools to protect their evolving public cloud environments and avoid breaches. 

“With 15% of respondents reporting they’ve had a cloud security incident, criminals are seeking to exploit organisations’ cloud vulnerabilities,” says Check Point cloud product line head Zohar Alon. 

“Enterprises need to get holistic visibility across all of their public cloud environments, supported by cloud-native policy automation, compliance enforcement, privileged identity protection and event analysis, to make their cloud deployments more secure and manageable.” 

The 2019 Cloud Security Report is based on the results of a comprehensive online survey of 674 cybersecurity and IT professionals, conducted in Spring 2019 to gain deep insight into the latest trends, key challenges and solutions for cloud security across a balanced cross-section of organisations of varying sizes across multiple industry sectors. 

The survey was done by Cybersecurity Insiders, the 400,000-member information security community.

Link image
APAC CFOs share their secrets to customer experience success
We've collected the most common FAQs from CFOs in the Australia-Pacific region (along with client examples) to empower you with a return on investment model that will highlight the true impact of experience management.More
Story image
CenturyLink expands cloud alliance with Dell and VMware in Asia Pacific
The partnership is designed to offer a hybrid cloud solution to help digital businesses in Asia Pacific successfully modernise their application workloads and manage their cloud journey.More
Link image
A great ERP tool achieves a lot for your customers & financials
NetSuite’s cloud native SRP is not a project management tool that talks to your finance system. It's end-to-end project management capability for service professionals, integrated with NetSuite's full ERP solution. More
Link image
Why TAPs are the building blocks of visibility
These hardworking devices provide the most effective way to copy actual traffic running across a system, so you can better monitor, secure and analyse your infrastructure.More
Download image
The role security culture plays in any successful business
In a recent survey, 74% Asia Pacific IT and business leaders surveyed declare that security culture is essential to a successful business.  More
Download image
Strengthen the weakest link in your security chain
Globalisation. Remote working. High-turnover workforces. These factors and more add up to make increasingly dynamic workforces - and without proper management, your business could fall behind.More