Two-Thirds of UAE CIOs Are Running in the Cloud, but One-Third Do Not Know If It’s Secure


DUBAI, United Arab Emirates, October 9, 2017 -- UAE organizations face a major disconnect between cloud aspirations and secure cloud infrastructure, with two-thirds (64 percent) of CIOs in the region ranking cloud security as important, but one-third (34 percent) admitting that they do not know if their cloud is secure, according to newly released research from Palo Alto Networks®, the next-generation security company.

In the UAE and across the Middle East, cloud adoption is seeing strong take-up. Currently, 48 percent of UAE CIOs say that their organizations use public, private or hybrid clouds, according to Palo Alto Networks 2017 survey of cloud security.

According to 451 Group, 60 percent of workloads worldwide will run in the cloud by 2018, driving greater agility and scalability, higher performance, and faster access to innovative technologies, all of which enable organizations to gain a competitive edge.

“Cloud is driving digital transformation and businesses’ competitiveness across the Middle East. For a company to truly reduce cyber risk and protect data, they need integrated, automated, and effective controls to detect and prevent known and unknown threats across their entire architecture from the endpoint, to the network, to the cloud,” said Tarek Abbas, systems engineering director, Emerging Markets at Palo Alto Networks.

Cognizant of this shift to the public cloud, Palo Alto Networks outlined its top five priorities for CIOs to secure their public cloud workloads in 2018:

  1. Embrace the shared security model. Public cloud providers make it clear that security is a shared responsibility. Organizations are in complete control of what security to implement and must take steps to safeguard content, be that customer data or intellectual property.
  2. Engage with business groups and DevOps early. CIOs need to work with DevOps to understand the scope of public cloud projects and ensure the architecture of the application deployments meets business development needs while mitigating security risks.
  3. Knowledge is power. By utilizing a virtualized next-generation firewall as part of a natively integrated, comprehensive security platform, organizations gain necessary insight into traffic identity and characteristics, so they can make more-informed policy decisions to protect applications and data from threats.
  4. Take a cloud-centric approach. To take full advantage of the cloud, recommended best practices include applying the concepts of the data center to your deployment while leaving the traditional constructs behind. This way, organizations can achieve high availability and scalability.
  5. Use automation to eliminate bottlenecks. By seeking cloud-enabled next-generation security with automated orchestration, organizations can eliminate operational “friction,” and take advantage of the flexibility and agility benefits offered in the public cloud. As data and applications reside everywhere, organizations need an automated, consistent security posture from the network, to the cloud, and the endpoint to effectively keep up with automated attackers.


About Palo Alto Networks

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets. Find out more at

Palo Alto Networks and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Media Contact:

Amina Grimen
+971 4 275 4100


What is a denial of service attack (DoS) ?

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users by flooding it with traffic.
  • 3
  • 56016

What is an Intrusion Prevention System?

An Intrusion Prevention System (IPS) is a network security prevention technology that examines network traffic flow to detect and prevent vulnerability exploits
  • 5
  • 106600

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
  • 85
  • 235645

What is a Zero Trust Architecture?

Businesses who want to prevent the exfiltration of sensitive data and improve their defense against modern cyber threats can consider a Zero Trust architecture.
  • 1
  • 38083

What is Cybersecurity?

Cybersecurity refers to the preventative techniques used to protect the integrity of networks, programs and data from attack, damage, or unauthorized access.
  • 4
  • 80678

PA-5200 Series Datasheet

Palo Alto Networks® PA-5200 Series of next-generation firewall appliances is comprised of the PA-5280, PA-5260, PA-5250 and PA-5220.
  • 21
  • 87560