Majority of enterprises that opted for multi-cloud infrastructure while digitally transforming themselves are now facing a big challenge in managing the complexities of data management while ensuring data security, according to a global survey conducted by the Business Performance Innovation (BPI) Network, in partnership with A10 Networks.
The new study, “Mapping The Multi-Cloud Enterprise,” finds that improved security, including centralized security and performance management, multi-cloud visibility of threats and attacks, and security automation, is the number one IT challenge facing companies today.
According to the survey, only 11% of the enterprises that had deployed their applications across multiple clouds felt that their companies have been “highly successful” in realizing the benefits of multi-cloud. The enumerated major challenges for multi-cloud migration listed are: Ensuring security across all clouds, networks, applications and data, Acquiring the necessary skills and expertise, Dealing with increased management complexity and Achieving centralized visibility and management across clouds.
“The BPI Network survey underscores a critical desire and requirement for companies to reevaluate their security platforms and architectures in light of multi-cloud proliferation,” said Gunter Reiss, vice president of worldwide marketing at A10 Networks. “The rise of 5G-enabled edge clouds is expected to be another driver for multi-cloud adoption. A10 believes enterprises must begin to deploy robust Polynimbus security and application delivery models that advance centralized visibility and management and deliver greater security automation across clouds, networks, applications and data.”
The study finds that some 38 per cent of companies have or will reassess their current relationships with security and load balancer suppliers in light of multi-cloud, with most others still undecided about whether a change in vendors is needed.
The top security-specific solutions as per the participants in the survey: Centralized authentication (62%), Centralized security policies (46%), Web application firewalls (40%) and DDoS protection (33%)