Two-Thirds of UAE CIOs Are Running in the Cloud, but One-Third Do Not Know If It’s Secure

 

DUBAI, United Arab Emirates, October 9, 2017 -- UAE organizations face a major disconnect between cloud aspirations and secure cloud infrastructure, with two-thirds (64 percent) of CIOs in the region ranking cloud security as important, but one-third (34 percent) admitting that they do not know if their cloud is secure, according to newly released research from Palo Alto Networks®, the next-generation security company.

In the UAE and across the Middle East, cloud adoption is seeing strong take-up. Currently, 48 percent of UAE CIOs say that their organizations use public, private or hybrid clouds, according to Palo Alto Networks 2017 survey of cloud security.

According to 451 Group, 60 percent of workloads worldwide will run in the cloud by 2018, driving greater agility and scalability, higher performance, and faster access to innovative technologies, all of which enable organizations to gain a competitive edge.

“Cloud is driving digital transformation and businesses’ competitiveness across the Middle East. For a company to truly reduce cyber risk and protect data, they need integrated, automated, and effective controls to detect and prevent known and unknown threats across their entire architecture from the endpoint, to the network, to the cloud,” said Tarek Abbas, systems engineering director, Emerging Markets at Palo Alto Networks.

Cognizant of this shift to the public cloud, Palo Alto Networks outlined its top five priorities for CIOs to secure their public cloud workloads in 2018:

  1. Embrace the shared security model. Public cloud providers make it clear that security is a shared responsibility. Organizations are in complete control of what security to implement and must take steps to safeguard content, be that customer data or intellectual property.
  2. Engage with business groups and DevOps early. CIOs need to work with DevOps to understand the scope of public cloud projects and ensure the architecture of the application deployments meets business development needs while mitigating security risks.
  3. Knowledge is power. By utilizing a virtualized next-generation firewall as part of a natively integrated, comprehensive security platform, organizations gain necessary insight into traffic identity and characteristics, so they can make more-informed policy decisions to protect applications and data from threats.
  4. Take a cloud-centric approach. To take full advantage of the cloud, recommended best practices include applying the concepts of the data center to your deployment while leaving the traditional constructs behind. This way, organizations can achieve high availability and scalability.
  5. Use automation to eliminate bottlenecks. By seeking cloud-enabled next-generation security with automated orchestration, organizations can eliminate operational “friction,” and take advantage of the flexibility and agility benefits offered in the public cloud. As data and applications reside everywhere, organizations need an automated, consistent security posture from the network, to the cloud, and the endpoint to effectively keep up with automated attackers.

LEARN MORE

About Palo Alto Networks

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets. Find out more at www.paloaltonetworks.com.

Palo Alto Networks and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Media Contact:

Amina Grimen
Consultant
Wallis
+971 4 275 4100


 

Cyberthreat Defense Report 2018

CyberEdge Group’s fifth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1,200 IT security decision makers and practitioners conducted in November 2017, the report delivers countless insights that IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers.
  • 0
  • 10304

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
  • 83
  • 223320

VM-Series Specsheet

The VM-Series has been optimized and expanded to deliver industry-leading performance of up to 16Gbps of App-ID-enabled firewall throughput across five models.
  • 5
  • 53902

PA-3000 Series Specsheet

Key features, performance capacities and specifications of the Palo Alto Networks PA-3000 Series.
  • 20
  • 100262

Panorama Datasheet

Overview of Panorama, our centralized security management system, that provides you with global control over multiple Palo Alto Networks firewalls.
  • 3
  • 13586

PA-5000 Series Specsheet

Key features, performance capacities and specifications for our PA-5000 Series.
  • 8
  • 68350