Research Report

State of Cloud Security in the Enterprise

This survey, the State of Cloud Security in the Enterprise, was designed to look at the impact of the shift to cloud on an enterprise’s attack surface and the security team’s ability to secure this vast new world.
State of Cloud Security in the Enterprise
State of Cloud Security in the Enterprise
Select language to download
Instant Free Access
Oops! Something went wrong while submitting the form.

Attack Anatomies - H2

Attack anatomies paragraph

Stop a hybrid attack

Take a self-guided tour to see how the Vectra AI Platform empowers you to stop hybrid attacks before any damage is done.

Take Self-Guided Tour

Key takeaways include:

  • Ops, IT, and security teams use a myriad of tools to manage their cloud and/or SaaS footprints, ranging from provider and third-party tools to custom-developed tools to meet unique needs or processes.
  • Cloud services, infrastructure, and SaaS applications are becoming too numerous (and perhaps voluminous) for security teams to manually monitor. Most of this survey’s respondents use cloud security posture management / SaaS security posture management (CSPM/SSPM) technologies to complement their security capabilities.
  • Continuously monitoring cloud environments for real-time threats and policy configuration violations were the top two benefits from CSPM and SSPM solutions, highlighting the importance of visibility into cloud operations.
  • The tools organizations use to monitor and secure their cloud environments, for both CSPM and SSPM purposes, range from cloud-native provider tools to customdeveloped tools, highlighting a need for security teams to derive and action on their own telemetry.
  • Half of the respondents have an in-house SOC, and approximately 47% use an outsourced managed security service provider (MSSP) or managed detection and response (MDR) provider, highlighting the need for in-house expertise coupled with outsourced services for additional capabilities.
Instant Free Access
Oops! Something went wrong while submitting the form.

Attack anatomies - H2

Attack anatomies - paragraph - rich text block

The collection list below is already connected to the Detections field in the Resources New CMS

No items found.

Tactics - H2

  • Tactic 1
  • Tactic 2
  • Tactic 3
  • Tactic 4

Trusted by experts and enterprises worldwide



Customer benefits