{"id":40545,"date":"2020-03-11T11:56:30","date_gmt":"2020-03-11T11:56:30","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/news\/2020\/mar\/11\/cloud-complexity-and-terrifying-iot-means-organisations-asset-visibility-worsening-report\/"},"modified":"2020-03-11T11:56:30","modified_gmt":"2020-03-11T11:56:30","slug":"cloud-complexity-and-terrifying-iot-means-organisations-asset-visibility-is-worsening-report","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/cloud-complexity-and-terrifying-iot-means-organisations-asset-visibility-is-worsening-report\/","title":{"rendered":"Cloud complexity and \u2018terrifying\u2019 IoT means organisations\u2019 asset visibility is worsening \u2013 report"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.cloudcomputing-news.net\/media\/img\/news\/iStock-507216088_WUrfoS1.jpg\"><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">As security best practice continues to be a battle between organisations closing the gap of hackers who stay one step ahead, a new report from cybersecurity asset management provider Axonius has argued the complexity of cloud infrastructure means companies are &lsquo;rapidly&rsquo; losing sight of their asset landscape.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">The study, put together by Enterprise Strategy Group (ESG) and which polled 200 North America-based IT and cybersecurity professionals, found that for respondents overall, more than half (52%) of VMs now reside in the cloud and running in multiple environments.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">The report describes cloud visibility as &lsquo;hazy at best&rsquo;, with more than two thirds (69%) of those polled admitting they have a cloud visibility gap. Three quarters of those polled said they had experienced several serious cloud VM security incidents. Adding to this mix is a rise in container usage, with plenty of research reports previously <a href=\"http:\/\/www.cloudcomputing-news.net\/news\/2019\/jul\/31\/stackrox-and-skybox-reports-warn-dire-consequences-if-container-security-not-addressed\/\">noting dire consequences<\/a> may be afoot if the spike was not adequately secured. Axonius describes container uptake as &lsquo;mainstream&rsquo; today.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">Internet of Things (IoT) projects are gaining steam yet an even wider visibility gap remains &ndash; 77% of respondents report a disparity. The report describes this trend as &lsquo;inevitable or terrifying&rsquo;; four in five (81%) say IoT devices will outnumber all other devices within three years, while more than half (58%) admit diversity in devices was their biggest management headache.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">Bring your own device (BYOD) is still a sticking point for many companies, even if the hype and coverage has since died down. Almost half (49%) of organisations polled said they prohibit BYOD for work-related activities, while three in five (61%) of those who have policies in place are worried about violations. &ldquo;BYOD looks to be here to stay&hellip; even if security suspects that policies are being circumvented,&rdquo; the report notes.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">Part of the solution is also part of the problem. Organisations are using on average more than 100 separate security tools, making the already-complicated task of IT asset management even more fiendish. A new approach is needed, the report warns: IT asset inventories currently demand the involvement of multiple teams, and take more than two weeks of effort.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">&ldquo;When we speak with customers from the midmarket up to the Fortune 100, we hear the same challenges: teams are faced with too many assets, a patchwork of security tools, and maddeningly manual processes to understand what is there and whether those assets are secure,&rdquo; said Dean Sysman, CEO and co-founder at Axonius. &ldquo;This survey uncovers the depth and breadth of the asset management challenges we see today and what&rsquo;s on the horizon.&rdquo;<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" style=\"color:#0563c1; text-decoration:underline\"><span style=\"color:blue\"><img decoding=\"async\" alt=\"https:\/\/www.cybersecuritycloudexpo.com\/wp-content\/uploads\/2018\/09\/cyber-security-world-series-1.png\" src=\"https:\/\/www.cybersecuritycloudexpo.com\/wp-content\/uploads\/2018\/09\/cyber-security-world-series-1.png\" style=\"height:59px; width:272px\" \/><\/span><\/a><strong>Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases<\/strong>? Attend the <a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" style=\"color:#0563c1; text-decoration:underline\">Cyber Security &amp; Cloud Expo World Series<\/a> with upcoming events in Silicon Valley, London and Amsterdam to learn more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As security best practice continues to be a battle between organisations closing the gap of hackers who stay one step ahead, a new report from cybersecurity asset management provider Axonius has argued the complexity of cloud infrastructure means compa&#8230;<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-40545","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/40545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=40545"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/40545\/revisions"}],"predecessor-version":[{"id":40546,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/40545\/revisions\/40546"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=40545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=40545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=40545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}