Research Report

State of Cloud Security in the Enterprise

Key takeaways include:

  • Ops, IT, and security teams use a myriad of tools to manage their cloud and/or SaaS footprints, ranging from provider and third-party tools to custom-developed tools to meet unique needs or processes.
  • Cloud services, infrastructure, and SaaS applications are becoming too numerous (and perhaps voluminous) for security teams to manually monitor. Most of this survey’s respondents use cloud security posture management / SaaS security posture management (CSPM/SSPM) technologies to complement their security capabilities.
  • Continuously monitoring cloud environments for real-time threats and policy configuration violations were the top two benefits from CSPM and SSPM solutions, highlighting the importance of visibility into cloud operations.
  • The tools organizations use to monitor and secure their cloud environments, for both CSPM and SSPM purposes, range from cloud-native provider tools to customdeveloped tools, highlighting a need for security teams to derive and action on their own telemetry.
  • Half of the respondents have an in-house SOC, and approximately 47% use an outsourced managed security service provider (MSSP) or managed detection and response (MDR) provider, highlighting the need for in-house expertise coupled with outsourced services for additional capabilities.
State of Cloud Security in the Enterprise
Select language to download
Access
Research Report

Trusted by experts and enterprises worldwide

FAQs