{"id":28605,"date":"2017-03-31T10:15:21","date_gmt":"2017-03-31T10:15:21","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/news\/2017\/mar\/31\/security-monitoring-remains-complex-and-chaotic-and-cloud-and-iot-will-only-make-it-worse\/"},"modified":"2017-03-31T10:15:21","modified_gmt":"2017-03-31T10:15:21","slug":"security-monitoring-remains-complex-and-chaotic-and-cloud-and-iot-will-only-make-it-worse","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/security-monitoring-remains-complex-and-chaotic-and-cloud-and-iot-will-only-make-it-worse\/","title":{"rendered":"Security monitoring remains \u2018complex and chaotic\u2019 \u2013 and cloud and IoT will only make it worse"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.cloudcomputing-news.net\/media\/img\/news\/iStock-641053054.jpg\"><\/p>\n<p>One in three respondents in a survey conducted by AlienVault said the state of security monitoring in their organisation was &lsquo;complex and chaotic&rsquo;, adding a &lsquo;major disconnect&rsquo; was still in place between beliefs and actions in cloud security.<\/p>\n<p>The survey, conducted at the RSA conference in San Francisco back in February, polled 974 attendees. One in five (21%) admit they don&rsquo;t know how many cloud applications are being used in their organisation, while 39% say it is more than 10. 42% of respondents say lack of visibility into their cloud activities is a &lsquo;significant&rsquo; concern.<\/p>\n<p>Almost two thirds (62%) said they were worried about Internet of Things (IoT) devices in their environment &ndash; yet 45% added that they saw the benefits of IoT outweigh the risks. 43% of respondents said their company does not monitor IoT traffic at all &ndash; a finding which was described as &lsquo;frightening&rsquo; by AlienVault &ndash; while 20% said they didn&rsquo;t know what traffic was monitored.<\/p>\n<p>&ldquo;The driving force behind cloud and IoT is the availability and analysis of information, but they must be managed and monitored in the right way,&rdquo; said Javvad Malik, AlienVault security advocate. &ldquo;If data is misused, or inadequately protected, the consequences can be severe.&rdquo;<\/p>\n<p>Writing for this publication <a href=\"https:\/\/www.cloudcomputing-news.net\/news\/2017\/mar\/14\/2017-year-when-iot-gets-serious-heres-what-cloud-providers-need-know\/\">earlier this month<\/a>, iland director of EMEA marketing Monica Brink argued that this was the year when IoT &lsquo;moved up the agenda&rsquo; for business investment in cloud technologies. &ldquo;IoT data tends to be heterogeneous and stored across multiple systems; as such, the market is calling for analytical tools that seamlessly connect to and combine all those cloud-hosted data sources, enabling businesses to explore and visualise any type of data stored anywhere in order to maximise the value of their IoT investment,&rdquo; she wrote.<\/p>\n<p>&ldquo;It&rsquo;s time for organisations to focus on what they do have control over &ndash; threat detection and incident response &ndash; and implement a unified solution that can monitor on-premises, cloud and hybrid environments,&rdquo; added Malik. &ldquo;Simplifying security in this way enables companies to immediately identify and respond to threats, and in today&rsquo;s cybersecurity landscape, this is the best strategy to mitigate risk.&rdquo;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One in three respondents in a survey conducted by AlienVault said the state of security monitoring in their organisation was &lsquo;complex and chaotic&rsquo;, adding a &lsquo;major disconnect&rsquo; was still in place between beliefs and actions in cl&#8230;<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-28605","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/28605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=28605"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/28605\/revisions"}],"predecessor-version":[{"id":28606,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/28605\/revisions\/28606"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=28605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=28605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=28605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}