|By PR Newswire||
|April 22, 2014 01:00 AM EDT||
HOUSTON, April 22, 2014 /PRNewswire/ -- Alert Logic today announced the release of the Spring 2014 Cloud Security Report. As the leading provider of Security-as-a-Service solutions for the cloud, Alert Logic regularly conducts a comparative analysis across customer cloud and on-premises infrastructures, releasing the results in the company's annual report on the state of cloud security. Research compiled for this report indicates a significant increase in attacks across both cloud and on-premises environments.
Drawing on data obtained from a customer base of 2,200, Alert Logic found a significant increase in activity across cloud and hosting environments compared to last year's findings—brute force attacks climbed from 30% to 44% of customers, and vulnerability scans increased from 27% to 44%. These two types of incidents—historically far more likely to target on-premises environments—are now occurring at near-equivalent rates in both cloud and on-premises environments.
"Our intelligence suggests that the observed increase in cloud attacks is correlated to the growth of cloud adoption in the enterprise," said Stephen Coty, Chief Security Evangelist at Alert Logic. "As more enterprise workloads have moved into cloud and hosted infrastructures, some traditional on-premises threats have followed them. This reinforces the necessity for enterprise-grade security solutions specifically designed to protect cloud environments."
For this report, Alert Logic also selected an area for additional investigation. The company deployed honeypots in public cloud infrastructures around the world to observe attack types and frequency. Key findings from the honeypot deployments are highlighted in this edition of the Cloud Security Report, and include the following observations:
- Highest volume of attacks occurred in Europe, where honeypots experienced four times the number of attacks as the U.S.
- 14% of malware collected through the honeypots was considered undetectable by 51 of the world's top antivirus vendors
About the Cloud Security Report
During the research period between April 1 and September 30, 2013, Alert Logic observed more than one billion security events and verified more than 232,364 security incidents as valid threats. The Alert Logic Cloud Security Report – Spring 2014 evaluates three vectors of analysis—incident occurrence, incident frequency and threat diversity—across six security incident categories. To view the Spring 2014 Cloud Security Report visit www.alertlogic.com/csr.
About Alert Logic
Alert Logic, the leading provider of Security-as-a-Service solutions for the cloud, provides solutions to secure the application and infrastructure stack. By integrating advanced security tools with 24×7 Security Operations Center expertise, customers can defend against security threats and address compliance mandates. By leveraging an "as-a-Service" delivery model, Alert Logic solutions include day-to-day management of security infrastructure, security experts translating complex data into actionable insight, and flexible deployment options to address customer security needs in any computing environment. Built from the ground up to address the unique challenges of public and private cloud environments, Alert Logic partners with over half of the largest cloud and hosting service providers to provide Security-as-a-Service solutions for business application deployments for over 2,500 enterprises. Alert Logic is based in Houston, Texas, and was founded in 2002. For more information, please visit www.alertlogic.com.
Betsey Rogers Public Relations
SOURCE Alert Logic
Jan. 17, 2017 05:00 PM EST Reads: 260
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Jan. 17, 2017 04:45 PM EST Reads: 3,027
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
Jan. 17, 2017 04:45 PM EST Reads: 541
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Jan. 17, 2017 04:45 PM EST Reads: 654
Jan. 17, 2017 04:30 PM EST Reads: 2,884
Jan. 17, 2017 04:30 PM EST Reads: 9,459
Jan. 17, 2017 04:15 PM EST Reads: 1,956
Jan. 17, 2017 03:30 PM EST Reads: 5,309
Jan. 17, 2017 02:45 PM EST Reads: 4,090
Jan. 17, 2017 02:30 PM EST Reads: 1,731
Jan. 17, 2017 02:15 PM EST Reads: 3,348
Jan. 17, 2017 02:15 PM EST Reads: 6,312
Jan. 17, 2017 02:15 PM EST Reads: 3,624
Jan. 17, 2017 02:00 PM EST Reads: 5,355
Jan. 17, 2017 02:00 PM EST Reads: 1,065