Cloud Security Hype Fails to Match Deployments

  /     /     /  
Publicated : 22/11/2024   Category : security


Cloud Security Hype Fails to Match Deployments


Technologies like software-defined perimeter and key management as-a-service generate enthusiasm but will take years to reach mainstream adoption.



Businesses have taken greater interest in securing data, applications, and workloads as they move information to the cloud. However, many top-of-mind security technologies are still years away from deployment at most organizations, as indicated in Gartners Hype Cycle for Cloud Security.
This year, technologies generating the most enthusiasm include key management as-a-service, data loss protection (DLP) for mobile devices, and software-defined perimeter. Despite the hype, Gartner estimates all will take at least five years to reach mainstream adoption.
On the bottom part of the curve, or trough of disillusionment, are technologies that failed to meet high expectations. Gartner buckets disaster recovery as-a-service and private cloud computing into this section and anticipates mainstream adoption within two years.
DLP and infrastructure-as-a-service fall on the slope of enlightenment, meaning experimentation and development of the two technologies are beginning to pay off at more businesses. Researchers anticipate full maturity within the next two years.
Four tools have hit a plateau at which they have broadly demonstrated their benefits in the enterprise. New entrants tokenization, high-assurance hypervisors, and application security as-a-service have joined identity-proofing services in this section.
Read more details about the technologies
here
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Cloud Security Hype Fails to Match Deployments