Why are customers dissatisfied with cloud providers?


With the increasing popularity of cloud infrastructures, the risks of confidential data leaks also increase. About two-thirds of the IT professionals surveyed (71%) confirmed that cloud computing today is of great importance to corporations, and more than two-thirds (78%) believe that the relevance of cloud computing will remain in two years. In addition, according to respondents, about 33% of all the needs of their organizations in information technology and data processing infrastructure canbe met today using cloud resources, and over the next two years this share will increase on average to 41%.

However, the majority of respondents (70%) agree that it is becoming increasingly difficult to comply with the requirements for maintaining data confidentiality and protecting them in a cloud environment. In addition, respondents noted that the types of corporatedata stored in the cloud such as email addresses, customer and customer data, and billing information are most at risk of leaks.

On average, the implementation of more than half of all cloud services at enterprises is carried out by third-party departments, not corporate IT departments, and on average about 44%of corporate data located in the cloud is not controlled or managed by IT departments. As a result of this, only 19% of respondents could declare their confidence that they are aware of all the cloud applications, platforms orinfrastructure services currently in use in their organizations.

Along with the lack of control over the installation and use of cloud services, there was no consensus among the respondents as to who is actually responsible for the security of data stored in the cloud. Thirty-five percent of respondents said that responsibility is shared between users and providers of cloud services, 33% believe that responsibility lies entirely with users, and 32% believe that the provider of cloud computing services is responsible for data security.

More than two-thirds (71%) ofrespondents said that it’s becoming more difficult to protect confidential user data stored in the cloud using traditional security tools and methods, andabout half (48%) say that it’s becoming more difficult to control or limit for end users access to cloud data. As a result, more than a third (34%) of ITprofessionals surveyed said that their organizations have already implemented corporate policies that require security mechanisms such as encryption to work with certain cloud computing services. Seventy-one (71) percent of respondentsindicated that encryption was possible or tokenization of confidential or other sensitive data is of great importance for them, and 79% believe that the importance of these technologies will increase over the next two years.

When asked what exactly is being done in their companies to protect data in the cloud, 43% of respondents said that their organizations use private networks to transmit data. About two fifths (39%) of respondents said that their companies use encryption, tokenization,and other cryptographic tools to protect data in the cloud. Another 33% of respondents do not know what security solutions are implemented in their organizations, and 29% said they use paid security services provided by their cloud service providers.


Respondents also believe thatmanaging corporate encryption keys is important for securing data in the cloud, given the growing number of key management and encryption platforms used by their companies. In particular, 54% of respondents said that their organizations retain control over encryption keys when storing data in the cloud. However, 45% of respondents said that they store their encryption keys in a software form, in the same place where the data itself is stored, and only 27% store the keys in more secure environments, for example, on hardwaredevices.

Regarding access to data stored inthe cloud, sixty-eight (68) percent of respondents say that managing user accounts in a cloud-based environment is becoming more difficult, withsixty-two (62) percent of respondents saying that they have access to the cloud in organizations provided for third parties. About half (46 percent) ofrespondents said that their companies use multi-factor authentication to protect third-party access to data stored in a cloud environment. About thesame number (48 percent) of respondents said that their companies use multi - factor authentication technologies , including to protect the access of their employees to the cloud.

According to a Forrester report (summer 2015), the lack of transparency from cloud providers is a major source of customer dissatisfaction [2] .

A recent study by Forrester Consulting shows that many organizations believe that cloud service providers do not provide them with enough information about interacting with the cloud, and this harms their business.

In addition to insufficienttransparency, there are other factors that reduce the enthusiasm for moving to the cloud: this is the level of service for customers, additional costs and adaptation during migration (on-boarding). Organizations are very fond of the cloud, but not of its suppliers - in any case, not as much.

The study was commissioned by iland,a provider of enterprise cloud hosting, conducted during May and covered professionals in the field of infrastructure and ongoing support from 275 organizations in the US , UK and Singapore.

“Among all the complexities oftoday's cloud, there are annoying flaws,” writes Lilac Schoenbeck, vice president of product support and marketing, iland. “Such important metadata isnot communicated, significantly hampering the adoption of the cloud, and yet organizations make growth plans based on the assumption of unlimited cloud resources.”
Where is the key to achieving harmony in business relations? This is what VARs need to know in order to tryto resolve problems and bring the parties to reconciliation.

Apparently, many users of the cloud do not feel the same individual approach.

So, 44% of respondents said that their provider does not know their company and does not understand their business needs, and 43% believe that if their organization was simply larger,then the supplier would probably pay more attention to them. In short, they feel the chill of an ordinary deal buying cloud services, and they don't likeit.

And one more thing: there is one practice pointed out by a third of the companies surveyed, which also instillsa sense of pettiness in the transaction — they are charged for the slightestquestion or incomprehensibility.

Comments

  1. https://ask.fm/kineelvin
    https://asknature.org/members/kevinelvin/#.XbH5YegzbIU
    https://www.bloglovin.com/@kevinelvin
    https://www.creativelive.com/student/kevin-elvin?via=accounts-freeform_4
    https://nanowrimo.org/participants/112233abc/projects/kopfhorer-test
    https://www.smashwords.com/profile/view/KevinElvin
    https://pbase.com/kevinelvin/profile
    https://www.kickstarter.com/profile/1381989468
    https://www.idolbin.com/iprofile/905543099365720064
    https://itsmyurls.com/kevinelvin
    http://www.sandales.ipt.pw/user/KevinElvin/
    http://www.flipflops.ipt.pw/user/KevinElvin/edit/
    http://follr.com/People/Me
    http://www.chargers.ipt.pw/user/KevinElvin/edit/
    http://www.powerbanks.ipt.pw/user/KevinElvin/edit/
    http://www.floaters.ipt.pw/user/KevinElvin/edit/
    https://8tracks.com/kevinelvin
    https://www.behance.net/kevinelvin
    https://triberr.com//KevinElvin
    https://www.apsense.com/user/kevinelvin
    https://www.creativelive.com/account/profile?via=site-header_0
    https://kevinelvin.netboard.me/
    https://managewp.org/members/45412/kine-elvin
    https://www.semrush.com/user/177895073/
    https://www.coursera.org/user/51a5d9e978a429086334944318368ec3
    http://www.carpets.ipt.pw/user/KevinElvin/
    http://www.kitchen.ipt.pw/user/KevinElvin/
    http://www.babycare.ipt.pw/user/KevinElvin/
    http://www.furnishing.ipt.pw/user/KevinElvin/
    http://www.bedsheets.ipt.pw/user/KevinElvin/
    http://www.curtains.ipt.pw/user/KevinElvin/edit/
    http://www.pillowcovers.ipt.pw/user/KevinElvin/
    http://www.cushion.ipt.pw/user/KevinElvin/
    https://www.geni.com/people/Kevin-Elvin/6000000110549442864
    http://www.dronestagr.am/author/kevinelvin/
    https://issuu.com/kineelvin
    https://vimeo.com/user104341265
    https://www.indiegogo.com/individuals/22576660
    https://github.com/KevinElvin1122
    https://www.quora.com/profile/Kine-Elvin
    https://knowyourmeme.com/users/kevinelvin
    https://www.visajourney.com/profile/344164-kevinelvin/?tab=field_core_pfield_19
    https://webflow.com/kineelvin
    https://anotepad.com/notes/4gn5i5k
    https://activerain.com/profile/kevinelvin
    https://www.techsite.io/profile
    https://www.aeriagames.com/user/kineelvin/
    https://about.me/kevinelvin/edit/emailsignature
    https://webflow.com/kineelvin
    https://calendly.com/kineelvin

    ReplyDelete

Post a Comment