Feeds

Study shows SMB cloud security fears largely overstated

Cost and security assumptions questioned

Securing Web Applications Made Simple and Scalable

Research into small businesses in the US and Asian markets has shown that there's an increasing mismatch between the theory and practice of cloud security.

When questioned in a blind test conducted by comScore and funded by Microsoft, a third of SMBs said they didn’t use cloud security because of fears over the cost of transition, and 40 per cent steered clear because they were worried that they would encounter more security problems than if they managed their own affairs.

In fact, the data showed that SMBs who went the cloud security route were six times more likely to have cut security spending by moving to a cloud model, although it should be pointed out that this represented only 20 per cent of those companies polled – showing that for most of us, security spending will carry on rising regardless.

"It's an interesting dichotomy between people that have the perceived barriers to cloud adoptions in security and privacy and those that actually have taken the plunge and used the cloud," Tim Rains, director of trustworthy computing at Microsoft, told The Register.

Running costs were also reduced by a cloud move – with cloud security users saying they spent 19 hours a week managing security compared to 25 hours for non-cloud IT administrators. That's one full BOFH day – once an extended lunch break and important offsite meeting at a local watering hole is taken into account.

The survey found that Asian users saved more IT management time than their American counterparts after a move to cloud security, but saved a smaller percentage of their overall security spending. Rains suggested this could be because security spending as a total of the whole IT budget is traditionally smaller in Asia. ®

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.