Cloud Security Spotlight Report (survey)

Yet another survey results are available in the “2016 Cloud Security Spotlight Report” and is interesting reading.

Example Applications

Q: Which of the following cloud applications are deployed or will be deployed in your organization?

2016-survey01

Example Authentication

Q: What is the authoritative directory you use for identity data and authentication, and authorization of access for your cloud based applications?

2016-survey02

This entry was posted in Cloud Security, ICT Leadership and Management, Security Management. Bookmark the permalink.

Comments are closed.