123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Beyond The Hype – The Hard Data On Enterprise Cloud Usage

Profile Picture
By Author: skyhigh networks
Total Articles: 54
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

How pervasive is the use of cloud services? What are the most widely used file sharing services? Which widely used cloud services present the greatest risk to my organization? Is the adoption of cloud services rampant among companies like mine or is it primarily a Silicon Valley phenomenon?

These are a sample of questions we hear every day from companies of all sizes and across all industries and the raison d’être of the 2013 Cloud Adoption & Risk Report.

Questions that Need Answers

The 2013 Cloud Adoption & Risk Report answers these questions and many more based on cloud service usage data analyzed from more than 3 million users. To be clear, these are not survey response or self-reported numbers provided by cloud service providers looking to inflate their adoption stats. This is real data that provides insight on real users. The report is also the first to analyze not only the actual use of 2,204 cloud services, but also the security risks to the organization from the use of these cloud services.

Sample Findings

I’ve listed just a few sample findings here so make ...
... sure to take a look at the infographic below and download the full graphical report to get all the data.

Cloud is the New Wild Wild West.

Usage data shows broad and rampant use of Cloud Security services. 2,204 cloud services are in use by more than 3 million users. Most surprising, perhaps, is the average number of cloud services in use by an organization – 545.

We are making decisions based on what’s known, not based on what’s risky.

Low-risk services are blocked 40% more than high-risk services. To give you a specific example, Box (a low-risk file sharing service) was blocked 35% of the time whereas RapidGator (a high-risk file sharing service) was blocked only 1% of the time.

Cloud-based code repositories become mainstream.

Microsoft Developer Network is #1, but open source is not far behind with GitHub and SourceForge taking #2 and #3 respectively. The shift to open source code repositories presents security challenges as some sites are known to host malicious backdoors.

Too early to count Microsoft out.

The software giant dominates in the collaboration category with Office 365, Skype, and Yammer all among the top 10 collaboration services used. SkyDrive is the 3rd most widely used file sharing service.

File Sharing is a free-for-all.

19 file sharing cloud services are used by an organization on average, which impedes collaboration and increases security and compliance risks. Among the top 10 most widely used file sharing services, 4 are high-risk.


Skyhigh Networks, the cloud access security company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com or follow us on Twitter @skyhighnetworks.

Total Views: 349Word Count: 530See All articles From Author

Add Comment

Computers Articles

1. How To Use Travel Web Scraping Service To Scrape Hotel Data And Travel Data?
Author: #ScrapeHotelDataandTravelData

2. 15 Best Tools To Manage Remote Teams And Stay Connected
Author: goodcoders

3. 12 Types Of Software Developers
Author: goodcoders

4. 12 Reasons Why Startup Needs Mobile App
Author: goodcoders

5. Why It Is Necessary To Have Pc Gaming Updates
Author: Jack Williams

6. Navigating Phone Repair Myths In Las Vegas: The Truth Behind Third-party Services
Author: Fones Gone Wild

7. The Truth About Microsoft Support And Visual Foxpro Migration
Author: John Mathew

8. Laptop Repair - Hardware And Software Troubleshooting
Author: Joshua Kirby

9. Salesforce Security Best Practices | Yantra Inc
Author: Yantra Inc

10. Foxpro And End Of Life Migrations
Author: John Mathew

11. Effortless Outreach: Kingasterisk Voice Broadcasting Solution In Action
Author: Kingasterisk Technology

12. The Impact Of Ai On Voip Cost Savings: A Case Study
Author: Sandip Patel

13. 12 Effective Mobile App Testing Types
Author: goodcoders

14. 12 Best Practices To Improve Your Qa Testing Skills
Author: goodcoders

15. 12 Best Apps For Small Businesses
Author: goodcoders

Login To Account
Login Email:
Password:
Sign Up Newsletter
Email Address: