Approximately 58% of organizations have migrated at least a quarter of their security tools to cloud-based options, according to a survey from security information and event management (SIEM) platform provider Exabeam. In addition, 33 percent said they have moved more than half of their security tools to cloud options.
Other findings from Exabeam's survey included:
- 52 percent of organizations began migrating to cloud-based security products during or before 2018.
- 18 percent started migrating to cloud-based security products last year.
- 3 percent began migrating to cloud-based security products this year.
- Data privacy (30 percent) ranked first in terms of concerns about moving security tools to the cloud, followed by unauthorized access (16 percent), server outages (14 percent), integration with other security tools (14 percent) and data sovereignty (13 percent).
- Improvements in monitoring and tracking of cyberattacks (29 percent) was the top benefit of using cloud-based security tools, followed by reduced maintenance (22 percent), CAPEX reductions (18 percent), faster time to value (17 percent) and access to the latest features (13 percent).
The survey also revealed cloud-based security tools are being used to protect different types of data, including:
- Email (22 percent).
- Customer information (21 percent).
- File-sharing (20 percent).
- Personnel files (18 percent).
Cloud-based security tools may be beneficial, but organizations must still maintain visibility into their cloud services, Exabeam Security Strategist Sam Humphries stated. In doing so, these organizations can use cloud-based security tools to enjoy the functionality of traditional on-premise security solutions, along with reduced costs and maintenance issues.
Exabeam SaaS Cloud Available in 15 Locations
Organizations that want to implement cloud-based security can leverage Exabeam SaaS Cloud, which is available for hosting in 15 locations across the following regions:
- Hong Kong.
- United Kingdom.
- United States.
SaaS Cloud helps organizations identify cyber threats and meet compliance and policy requirements, the company indicated. It also provides data lake, behavioral analytics, case management, security orchestration and incident response automation capabilities.