123ArticleOnline Logo
Welcome to 123ArticleOnline.com!

ALL >> Computers >> View Article

Beyond The Hype – The Hard Data On Enterprise Cloud Usage

By Author: skyhigh networks
Total Articles: 54

How pervasive is the use of cloud services? What are the most widely used file sharing services? Which widely used cloud services present the greatest risk to my organization? Is the adoption of cloud services rampant among companies like mine or is it primarily a Silicon Valley phenomenon?

These are a sample of questions we hear every day from companies of all sizes and across all industries and the raison d’être of the 2013 Cloud Adoption & Risk Report.

Questions that Need Answers

The 2013 Cloud Adoption & Risk Report answers these questions and many more based on cloud service usage data analyzed from more than 3 million users. To be clear, these are not survey response or self-reported numbers provided by cloud service providers looking to inflate their adoption stats. This is real data that provides insight on real users. The report is also the first to analyze not only the actual use of 2,204 cloud services, but also the security risks to the organization from the use of these cloud services.

Sample Findings

I’ve listed just a few sample findings here so make sure to take a look at the infographic below and download the full graphical report to get all the data.

Cloud is the New Wild Wild West.

Usage data shows broad and rampant use of Cloud Security services. 2,204 cloud services are in use by more than 3 million users. Most surprising, perhaps, is the average number of cloud services in use by an organization – 545.

We are making decisions based on what’s known, not based on what’s risky.

Low-risk services are blocked 40% more than high-risk services. To give you a specific example, Box (a low-risk file sharing service) was blocked 35% of the time whereas RapidGator (a high-risk file sharing service) was blocked only 1% of the time.

Cloud-based code repositories become mainstream.

Microsoft Developer Network is #1, but open source is not far behind with GitHub and SourceForge taking #2 and #3 respectively. The shift to open source code repositories presents security challenges as some sites are known to host malicious backdoors.

Too early to count Microsoft out.

The software giant dominates in the collaboration category with Office 365, Skype, and Yammer all among the top 10 collaboration services used. SkyDrive is the 3rd most widely used file sharing service.

File Sharing is a free-for-all.

19 file sharing cloud services are used by an organization on average, which impedes collaboration and increases security and compliance risks. Among the top 10 most widely used file sharing services, 4 are high-risk.


Skyhigh Networks, the cloud access security company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com or follow us on Twitter @skyhighnetworks.

Total Views: 95Word Count: 529See All articles From Author

Computers Articles

1. Norton Antivirus Customer Service For Technical Support
Author: Jones Mary

2. How To Upgrade Avast Antivirus Using Avast Technical Support.
Author: Amy Jackson

3. Protect Your Devices From Spyware By Dialing Kaspersky Technical Support Phone Number.
Author: Amy Jackson

4. How To Uninstall Expired Bitdefender Internet Security From Your System?
Author: Amy Jackson

5. Webroot Secure Anywhere Antivirus 2017 With Best Technical Support.
Author: Amy Jackson

6. Super Easy Ways To Learn Everything About Ms Office Establishment
Author: setupoffice

7. The Harmful Effects Of Computer Malware And Malware Removal Support.
Author: Amy Jackson

8. Here Is Why You Need Remote Infrastructure Management
Author: Ranjit S

9. How To Purchase Best Aliexpress Clone Script – Eagletechnosys
Author: sawati

10. Some Common Error People Make With Their System
Author: Shane Wills

11. Norton Tech Support Available 24x7,call Us Toll-free Number +1-888-455-3304.
Author: Jones Mary

12. Wie Kann Ich Deutsches Fernsehen Im Ausland Sehen?
Author: Stuart Spindlow

13. Must-haves Of The Best Applicant Tracking Software
Author: Chameleon-i

14. Contact Norton Support If You Are Facing Problem
Author: Jones Mary

15. How To Purchase Your Own Alibaba Clone Script
Author: sawati

Login To Account
Login Email:
Password:
Sign Up Newsletter
Email Address: