Cloud services are becoming the dominant force in enterprise network traffic

Cloud services are becoming the dominant force in enterprise network traffic

Cloud services are accounting for an increasing portion of enterprise network traffic, prompting the need for enterprises to take a holistic approach to protecting cloud and web applications, according to a new report from Netskope.

[[272937]]

Jason Clark, the company's chief strategy officer, said the shift to the cloud can create a regulatory blind spot for security teams because most security tools focus on traditional network traffic.

The report points out that common policy conflicts when deploying cloud services also include DLP (data loss prevention), cloud activities and abnormal activities violations, etc. And given that cloud storage and collaboration applications often occupy the top 20 cloud service lists, plus personal services such as Facebook, Twitter, Linkedin and Youtube are also on the list, it shows that employees will use the company network to handle personal affairs, bringing security risks.

The average number of cloud services per enterprise has increased by 3.9% since October last year to 1,295. Among them, cloud services such as human resources, marketing and collaboration are still commonly used tools.

As today's enterprises are undergoing digital transformation and increasingly replacing traditional network usage with cloud services, it is imperative to assess whether there are controls in place to protect all traffic. Even though there is no one-size-fits-all approach to protecting an enterprise's use of new tools and technologies, having a clear understanding of traffic and appropriate vigilance should be a basic requirement for everyone in the enterprise.

<<:  eSIM card, where is the future?

>>:  Why 5G will not have a big impact on people

Recommend

Thoroughly understand Session and Token

Hello everyone, I am amazing. When building a use...

Message bus for communication between processes

[[381755]] 1. Inter-process communication (IPC) in...

Token: How to reduce the traffic pressure of user identity authentication?

Many websites usually use the Session method to i...

Managing a growing API portfolio

We have previously discussed the importance of AP...

Java Server Model - TCP Connection/Flow Optimization

Usually, our applications do not need to handle t...

Do we really need 5G? Key facts you need to know

First, 2G was used for calling and texting, then,...

5G+AI win-win symbiosis, artificial intelligence has great potential!

Regardless of whether people are pessimistic or o...

Why do many colleagues recommend Ether IPL? Until this hospital expansion...

By Jin Gang, Chief of Information Department, Thi...