Security News > 2021 > September > Organizations struggling to develop cloud applications that meet security requirements
According to a Security Compass research, in mid-sized to large enterprises, 50% of the software applications being developed are cloud based, and another 30% are expected to migrate to the cloud within the next two years.
According to the report, organizations are struggling to develop cloud applications that meet security requirements and that integrate with existing on-premise technologies.
The two most prevalent challenges faced internally in developing cloud applications are security requirements and integration with on-premise technologies.
92% of enterprises that are developing over three quarters of their software applications in the cloud report an interest in solutions that automate proactive security and compliance processes.
Business value beyond security The top three business drivers, in order, for moving applications that companies develop and deploy to the cloud were reported to be enabling a remote workforce, bringing technology to market faster, and increasing agility.
"Businesses migrating to the cloud is not a new phenomenon, but the frequency with which these migrations are occurring has skyrocketed since the start of the COVID-19 pandemic. Organizations are facing more pressure to effectively develop their software in the cloud in a way that allows them to keep pace with competitors," said Rohit Sethi, CEO, Security Compass.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/g_pl4yE_YwU/
Related news
- Leveraging AI and automation for enhanced cloud communication security (source)
- Reducing the cloud security overhead (source)
- Harnessing the Power of CTEM for Cloud Security (source)
- Google Cloud/Cloud Security Alliance Report: IT and Security Pros Are ‘Cautiously Optimistic’ About AI (source)
- Exposing the top cloud security threats (source)
- Breakthrough in Quantum Cloud Computing Ensures its Security and Privacy (source)
- Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity (source)
- The first steps of establishing your cloud security strategy (source)
- eBook: Cloud security skills (source)