Public cloud security is an issue that greatly or even “extremely” concerns 3 out of 4 cybersecurity and IT professionals, according to the Cloud Security Report 2020 by Check Point and Cybersecurity Insiders.

The majority (68%) of companies are using at least two different cloud providers, which in turn requires the use of multiple security tools and management consoles. The complexity increases when the main barriers to cloud adoption are analyzed, among which the lack of qualified staff stands out. Another prominent impediment has to do with budgets .

Right now 27% of the security budget is being allocated to security in the cloud. Almost 6 in 10 organizations expect to increase these budgets over the next twelve months.

52% of respondents believe that the risk of security breaches in the public cloud is higher than in traditional IT environments . Only 17% see fewer risks. Meanwhile, 30% believe that the danger is similar.

The main threat facing the public cloud is the misconfiguration of the platform itself (68%), followed by unauthorized access, insecure interfaces and account hijacking < / strong>.

It should also be noted that legacy tools do not work well with the cloud. Up to 82% of professionals admit that their traditional security solutions do not work or end up providing limited functions in cloud environments, which leads to more problems

«Migrations and implementation of cloud environments require a higher level of technical and resources, especially to guarantee the security of corporate assets against attacks and potential breaches,» warns TJ Gonen, chief Check Point Cloud Products.

“Today’s security solutions provide only limited protection against cloud threats, to which we must add the fact that computers often lack the experience necessary to improve security and compliance processes, ”he says. “To avoid these security breaches, companies need to get complete visibility of all their public cloud environments, as well as deploy native, unified and automated cloud protection tools, apply all current regulations and carry out analysis of any incident. ”

“In this way”, he concludes, “they can adapt to the needs of the company while guaranteeing security and compliance at all times”.