123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Beyond The Hype – The Hard Data On Enterprise Cloud Usage

Profile Picture
By Author: skyhigh networks
Total Articles: 54
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

How pervasive is the use of cloud services? What are the most widely used file sharing services? Which widely used cloud services present the greatest risk to my organization? Is the adoption of cloud services rampant among companies like mine or is it primarily a Silicon Valley phenomenon?

These are a sample of questions we hear every day from companies of all sizes and across all industries and the raison d’être of the 2013 Cloud Adoption & Risk Report.

Questions that Need Answers

The 2013 Cloud Adoption & Risk Report answers these questions and many more based on cloud service usage data analyzed from more than 3 million users. To be clear, these are not survey response or self-reported numbers provided by cloud service providers looking to inflate their adoption stats. This is real data that provides insight on real users. The report is also the first to analyze not only the actual use of 2,204 cloud services, but also the security risks to the organization from the use of these cloud services.

Sample Findings

I’ve listed just a few sample findings here so make ...
... sure to take a look at the infographic below and download the full graphical report to get all the data.

Cloud is the New Wild Wild West.

Usage data shows broad and rampant use of Cloud Security services. 2,204 cloud services are in use by more than 3 million users. Most surprising, perhaps, is the average number of cloud services in use by an organization – 545.

We are making decisions based on what’s known, not based on what’s risky.

Low-risk services are blocked 40% more than high-risk services. To give you a specific example, Box (a low-risk file sharing service) was blocked 35% of the time whereas RapidGator (a high-risk file sharing service) was blocked only 1% of the time.

Cloud-based code repositories become mainstream.

Microsoft Developer Network is #1, but open source is not far behind with GitHub and SourceForge taking #2 and #3 respectively. The shift to open source code repositories presents security challenges as some sites are known to host malicious backdoors.

Too early to count Microsoft out.

The software giant dominates in the collaboration category with Office 365, Skype, and Yammer all among the top 10 collaboration services used. SkyDrive is the 3rd most widely used file sharing service.

File Sharing is a free-for-all.

19 file sharing cloud services are used by an organization on average, which impedes collaboration and increases security and compliance risks. Among the top 10 most widely used file sharing services, 4 are high-risk.


Skyhigh Networks, the cloud access security company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com or follow us on Twitter @skyhighnetworks.

Total Views: 392Word Count: 530See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Sign Up Newsletter
Email Address: