• Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Industries
  • Partners
  • Why Palo Alto Networks?
  • Company
  • More
  • Sign In
    Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Explore Zero Trust

Rapid Adoption of Public Cloud Opens a Cybersecurity Gap, Warns Cybersecurity Professionals

Few are confident in spotting security risks and vulnerabilities in DevOps operated public cloud environments

Palo Alto Networks LONDON Sep 18, 2018 at 09:00 AM

LONDON, 18 September 2018 – A majority of European and Middle East cybersecurity professionals at organisations using DevOps practices in the public cloud believe that their organisations are trading speed for security. In a newly published cloud security study commissioned by global security leader, Palo Alto Networks® (NYSE: PANW), 72 percent of cybersecurity professionals indicated that the speed of public cloud adoption is introducing preventable security risks to software updates.

 

The DevOps model increases collaboration between development and operations teams, allowing for a fast-paced approach to application creation and enhancement. Organisations have adopted this model to achieve faster application delivery, enhanced innovation, more stable operating environments, and performance-focused employee teams.  Yet as the DevOps model is enthusiastically embraced, the survey findings indicate that cybersecurity is being overlooked and organisations may be vulnerable as a result.  Most notably:

 

  • There is concern among cybersecurity professionals about whether cybersecurity can match the speed and frequency of how DevOps updates apps and services in the public cloud. Only 47 percent of survey respondents indicated that they are confident that cybersecurity is working well for DevOps teams operating in the public cloud.
  • Only 22 percent of cybersecurity professionals said they had a firm grasp on the risks and needs that come with securing DevOps-operated environments in the cloud
  • Nearly three quarters (73 percent) report that their organisations have either fully or partly adopted DevOps development in the public cloud.  They are regularly deploying and changing software, with 1 in 5 doing many updates on a weekly basis.

 

As Greg Day, vice president and CSO for EMEA at Palo Alto Networks, explains: “DevOps is proven to deliver strong results. Rapid delivery of code, infrastructure and data enables organisations to meet the needs of their customers faster than ever and stay ahead of their competition. However, too often, the speed and complexity of delivery has resulted in traditional cybersecurity processes failing to complete even rudimentary checks and controls at the same rapid pace, resulting in unnecessary risks. Indeed, we see over half failing to meet basic password management policies. Organisations won’t wait for security teams to catch up, so they must leverage native integration points and automate their cybersecurity capabilities to address the continuous and real-time visibility and governance needed to keep pace with DevOps practices.”

 

The Palo Alto Networks Security Operating Platform enables organisations to confidently deploy applications in the cloud by preventing data loss and business disruption. Palo Alto Networks customers operating in hybrid and multi-cloud environments benefit from a comprehensive and consistent security offering that integrates directly with cloud platforms.

 

To find out more about Palo Alto Networks and cloud security, visit: https://www.paloaltonetworks.com/products/secure-the-cloud

 

Learn more

  • Secure the Cloud with Palo Alto Networks
  • Palo Alto Networks Security Operating Platform
  • EVIDENT Public Cloud Security & Compliance
  • Read the Blog: Announcing New Cloud Security Capabilities
  • Follow Palo Alto Networks online: LinkedIn, Twitter, Facebook

 

Editor’s Notes

The research was conducted for Palo Alto Networks by Vanson Bourne. The findings are based on interviews with 500 IT decision-makers with responsibility for cybersecurity in organizations of 500 to 5,000 employees across the U.K., France, Germany, Italy, the Netherlands, Sweden, UAE and Saudi Arabia.

 

About Palo Alto Networks
We are the global cybersecurity leader, known for always challenging the security status quo. Our mission is to protect our way of life in the digital age by preventing successful cyberattacks. This has given us the privilege of safely enabling tens of thousands of organizations and their customers. Our pioneering Security Operating Platform emboldens their digital transformation with continuous innovation that seizes the latest breakthroughs in security, automation, and analytics. By delivering a true platform and empowering a growing ecosystem of change-makers like us, we provide highly effective and innovative cybersecurity across clouds, networks, and mobile devices.

 

Palo Alto Networks and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Article

What is a denial of service attack (DoS) ?

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users.
April 4, 2022

Datasheet

PA-400 Series

Palo Alto Networks PA-400 series ML-Powered NGFW (PA-460, PA-450, PA-440) brings Next Generation Firewall capabilities to distributed enterprise branch offices, retail locations, and midsize businesses.
March 23, 2022

Article

What is a Zero Trust Architecture

Zero Trust has become one of cybersecurity’s most used buzzwords. It’s imperative to understand what Zero Trust is, as well as what Zero Trust isn’t.
May 17, 2022

Article

What Is SASE?

Secure access service edge, or SASE (pronounced “sassy”), is an emerging cybersecurity concept. It is the convergence of wide area networking.
April 13, 2022

White Paper

Architecting The Zero Trust Enterprise

Understand how to become a Zero Trust Enterprise
November 23, 2021

Datasheet

PA-3200 Series Datasheet

The PA-3200 Series secures all traffic, including encrypted traffic, using dedicated processing and memory for networking, security, threat prevention and management.
March 23, 2022

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2022 Palo Alto Networks. All rights reserved