Security Professionals Do Not Trust On-Premises Tools When It Comes to Cloud Security
April 30, 2018

Kalyan Ramanathan
Sumo Logic

Even with the RSA Security Conference in the rear view mirror, security still dominates enterprise discussions. One ongoing discussion is how security professionals lack the necessary tools and processes needed to provide visibility into the cloud, and to converge development, security and operations (DevSecOps) to better identify, investigate and prioritize security and compliance threats for modern applications running in the cloud.

This idea is developed even further in the 2018 Global Security Trends in the Cloud report, a research study conducted by Dimensional Research on behalf of Sumo Logic.

Jump to infographic below

The findings reveal 93 percent of respondents faced challenges when deploying their current on-premises security tools in the cloud, and 97 percent lacked the tools, cross-functional collaboration and resources to gain proper insight into security across the organization.

These numbers indicate a big problem in DevSecOps that needs to be addressed. With cloud investments comes struggles with changing roles, security budgets, a high volume of security alerts, and stakeholder awareness of security needs. Investing in the cloud should change the way security in the cloud is handled.

Notable key findings include:

Existing Security Tools Not a Fit for Cloud

■ 49 percent of respondents said existing tools aren't effective in the cloud and that an overabundance of tools make it almost impossible to prioritize IT and security investments

■ 45 percent said they couldn't investigate threats in a timely matter because of poor integration capabilities

Security in the Cloud Requires an Organizational Shift

■ 82 percent said with a move to the cloud, it's imperative to investigate threats at the application and infrastructure layers for complete visibility

■ 63 percent reported broader technical expertise is required when trying to understand threats in the cloud

■ 54 percent said greater cross-team coordination is necessary

Despite Current Limitations, Strong Appetite for Change

■ 64 percent of responding security professionals are looking for one single tool to consolidate other tool capabilities

■ 57 percent would benefit from better collaboration between IT and security operations

■ 53 percent want a tool to improve cross-team contextual workflows for threat resolution

A number of respondents called out the need for security and IT operations to work together during threat detection and investigation. In all these cases, the heavy dose of cloud and modern applications made it nearly impossible for the already overburdened security team to resolve the issues independently and in a timely manner. They required real-time assistance in getting data and interpreting it from a variety of teams outside the SOC.

Challenges surface in the survey data as well, with 50 percent of respondents specifically looking for new tools to improve cross-team workflows for threat resolution. This group — as you would expect — had plenty of overlap with the over 50 percent of respondents who observed that on-premises security tools and traditional security information and event management (SIEM) solutions can't effectively assimilate cloud data and threats.These challenges can no longer be solved by siloed tools and processes that are holding organizations back from fully securing their modern IT environments.



Survey Methodology: The 2018 Global Security Trends in the Cloud report, commissioned by Sumo Logic, was conducted in March 2018 and included a total of 316 qualified independent sources of IT security professionals across the U.S. and Europe, the Middle East and Africa (EMEA). A range of questions were asked about cloud and on-premises security, including specific tools and organizational challenges, benefits and adoption patterns. All participants were responsible for IT security in environments in both public IaaS and on-premises infrastructure.

Kalyan Ramanathan is VP of Product Marketing at Sumo Logic

The Latest

August 15, 2018

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 13, 2018

Agile is expanding within the enterprise. Agile adoption is growing within organizations, both more broadly and deeply, according to the 12th annual State of Agile report from CollabNet VersionOne. A higher percentage of respondents this year report that "all or almost all" of their teams are agile, and that agile principles and practices are being adopted at higher levels in the organization ...

August 09, 2018

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study. The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study ...

August 08, 2018

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage, according to the 2018 Cost of a Data Breach Study, sponsored by IBM Security and conducted by Ponemon Institute. The study found that the average cost of a data breach globally is $3.86 million ...

August 06, 2018

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

August 02, 2018

Results from new Forrester Consulting research reveal the 20 most important Agile and DevOps quality metrics that separate DevOps/Agile experts from their less advanced peers ...

July 31, 2018

Even organizations that understand the importance of cybersecurity in theory often stumble when it comes to marrying security initiatives with their development and operations processes. Most businesses agree that everyone should be responsible for security, but this principle is not being upheld on a day-to-day basis in many organizations. That’s bad news for everyone. Here are some best practices for implementing SecOps ...

July 30, 2018

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point in the transformation of cloud IT infrastructure. SecOps is a methodology that seeks to address this by operationalizing and hardening security throughout the software lifecycle ...

July 26, 2018

Organizations are shifting away from traditional, monolithic architectures, with three-quarters of survey respondents delivering at least some of their applications and more than one-third delivering most of their applications as microservices, according to the State of DevOps Observability Report from Scalyr ...

July 24, 2018

What top considerations must companies make to ensure – or at least help improve – Agile at scale? The following are key techniques and practices to help accelerate Agile delivery rollouts and scale Agile and DevOps in the Enterprise ...

Share this