Cloud Security Hype Fails to Match Deployments

  /     /     /  
Publicated : 22/11/2024   Category : security


Cloud Security Hype Fails to Match Deployments


Technologies like software-defined perimeter and key management as-a-service generate enthusiasm but will take years to reach mainstream adoption.



Businesses have taken greater interest in securing data, applications, and workloads as they move information to the cloud. However, many top-of-mind security technologies are still years away from deployment at most organizations, as indicated in Gartners Hype Cycle for Cloud Security.
This year, technologies generating the most enthusiasm include key management as-a-service, data loss protection (DLP) for mobile devices, and software-defined perimeter. Despite the hype, Gartner estimates all will take at least five years to reach mainstream adoption.
On the bottom part of the curve, or trough of disillusionment, are technologies that failed to meet high expectations. Gartner buckets disaster recovery as-a-service and private cloud computing into this section and anticipates mainstream adoption within two years.
DLP and infrastructure-as-a-service fall on the slope of enlightenment, meaning experimentation and development of the two technologies are beginning to pay off at more businesses. Researchers anticipate full maturity within the next two years.
Four tools have hit a plateau at which they have broadly demonstrated their benefits in the enterprise. New entrants tokenization, high-assurance hypervisors, and application security as-a-service have joined identity-proofing services in this section.
Read more details about the technologies
here
.

Last News

▸ There are plenty of online tools for reporting bugs. ◂
Discovered: 23/12/2024
Category: security

▸ 27 Million South Koreans Hit by Online Gaming Theft. ◂
Discovered: 23/12/2024
Category: security

▸ Homeland Security Background Checks Breach Raises Concerns. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Cloud Security Hype Fails to Match Deployments