New report: what Cloud providers need to do to drive Cloud adoption

The recently released 2015 Vormetric Insider Threat Report – Cloud and Big Data Edition found that 80% of enterprise organisations now make some use of Cloud-based services and infrastructure systems, with 54% claiming to keep company-sensitive data in the Cloud.

46% of all respondents said that market pressures are forcing them to use Cloud services, but further adoption is inhibited by “[increased] risk, the need to manage and protect more data, and a perceived lack of care from cloud service providers”.

How to increase customer trust in the Cloud

According to Vormetric, the top four changes that would increase global respondents’ willingness to use Cloud services are:

  • Encryption of data with enterprise key control on their premises (55%).
  • Selected encryption of their organisation’s data within the service provider’s infrastructure (52%).
  • Service level commitments and liability terms for a data breach (52%).
  • Explicit security descriptions and compliance commitment (48%).

The international best-practice approach to data security

As the report notes, “Cloud and software-as-a-service (SaaS) providers need to step up to earn the trust of their enterprise clients and justify their presence in this lucrative market.”

Cloud providers can demonstrate their security credentials with ISO 27001, the international standard for information security management.

ISO 27001

ISO 27001 sets out the requirements of an enterprise-wide information security management system (ISMS) that addresses people, processes and technology.

All organisations can implement an ISMS suitable to their needs, and can achieve certification to the Standard through an independent accredited certification body, providing reassurance to stakeholders, partners and customers that international best practice is being followed.

IT Governance’s fixed-priced ISO 27001 Packaged Solutions provide implementation resources and support for organisations of all sizes, making it easy for them to achieve a level of cyber security appropriate to the risks they face. Click here for more information >>