Enterprise IT Security Capabilities Begin Slow Shift to the Cloud

Identity management, vulnerability assessment, and other forms of enterprise IT security technologies are slowly moving to the cloud. According to a report released this week, just about 10 percent of all enterprise security product features will be delivered via the cloud.

In the Gartner report, "Demand for Cloud-Based Offerings Impacts Security Service Spending," survey respondents from enterprises across sectors in the United States and Europe indicated they intend to increase their use of cloud-based security tools in the next 12 months. E-mail security was the top-rated security service for 74 percent of respondents.

"Furthermore, according to Gartner, "27 percent of the respondents indicated they were considering deploying tokenization as a cloud service. Gartner believes regulatory compliance measures to comply with the Payment Card Industry Data Security Standard (PCI DSS), for example, are driving much of the growth of interest in tokenization as a service. As a service, tokenization allows security buyers to avoid having to house personally identifiable information (PII) or other confidential information. The service allows organizations to remove tokenized systems from being considered 'in scope' for PCI compliance, thus removing the burden of regulating the environment."

Security information and event management as a service was also cited as an area of potential growth.

"Demand remains high from buyers looking to cloud-based security services to address a lack of staff or skills, reduce costs, or comply with security regulations quickly," said Eric Ahlm, research director at Gartner, in a prepared statement. "This shift in buying behavior from the more traditional on-premises equipment toward cloud-based delivery models offers good opportunities for technology and service providers with cloud delivery capabilities, but those without such capabilities need to act quickly to adapt to this competitive threat."

Additional details can be found in the complete report, available on Gartner's site for registered clients. (The report is aimed primarily at VARs and security services providers, not enterprise users.) Gartner will also address these issues at its upcoming Security & Risk Management Summit, taking place June 10–13 in Maryland.

About the Author

David Nagel is the former editorial director of 1105 Media's Education Group and editor-in-chief of THE Journal, STEAM Universe, and Spaces4Learning. A 30-year publishing veteran, Nagel has led or contributed to dozens of technology, art, marketing, media, and business publications.

He can be reached at [email protected]. You can also connect with him on LinkedIn at https://www.linkedin.com/in/davidrnagel/ .


Featured

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education.

  • glowing digital brain interacts with an open book, with stacks of books beside it

    Federal Court Rules AI Training with Copyrighted Books Fair Use

    A federal judge ruled this week that artificial intelligence company Anthropic did not violate copyright law when it used copyrighted books to train its Claude chatbot without author consent, but ordered the company to face trial on allegations it used pirated versions of the books.

  • server racks, a human head with a microchip, data pipes, cloud storage, and analytical symbols

    OpenAI, Oracle Expand AI Infrastructure Partnership

    OpenAI and Oracle have announced they will develop an additional 4.5 gigawatts of data center capacity, expanding their artificial intelligence infrastructure partnership as part of the Stargate Project, a joint venture among OpenAI, Oracle, and Japan's SoftBank Group that aims to deploy 10 gigawatts of computing capacity over four years.

  • laptop displaying a phishing email icon inside a browser window on the screen

    Phishing Campaign Targets ED Grant Portal

    Threat researchers at cybersecurity company BforeAI have identified a phishing campaign spoofing the U.S. Department of Education's G5 grant management portal.