Research Report

State of Cloud Security in the Enterprise

Key takeaways include:

  • Ops, IT, and security teams use a myriad of tools to manage their cloud and/or SaaS footprints, ranging from provider and third-party tools to custom-developed tools to meet unique needs or processes.
  • Cloud services, infrastructure, and SaaS applications are becoming too numerous (and perhaps voluminous) for security teams to manually monitor. Most of this survey’s respondents use cloud security posture management / SaaS security posture management (CSPM/SSPM) technologies to complement their security capabilities.
  • Continuously monitoring cloud environments for real-time threats and policy configuration violations were the top two benefits from CSPM and SSPM solutions, highlighting the importance of visibility into cloud operations.
  • The tools organizations use to monitor and secure their cloud environments, for both CSPM and SSPM purposes, range from cloud-native provider tools to customdeveloped tools, highlighting a need for security teams to derive and action on their own telemetry.
  • Half of the respondents have an in-house SOC, and approximately 47% use an outsourced managed security service provider (MSSP) or managed detection and response (MDR) provider, highlighting the need for in-house expertise coupled with outsourced services for additional capabilities.
State of Cloud Security in the Enterprise
State of Cloud Security in the Enterprise
Select language to download
Access report

Trusted by experts and enterprises worldwide

FAQs