SHARE
Facebook X Pinterest WhatsApp

Security Issues Take Toll on IT Adoption

Security Issues Take Toll on IT Adoption Security Concerns Alter Cloud Strategies Security issues push organizations toward private clouds. For just over half (52%), security was the top cloud computing adoption issue. Security Concerns Alter Big Data Strategies A fear of putting too much data in the cloud was cited by 35%. Most organizations are […]

Written By
thumbnail Michael Vizard
Michael Vizard
Jan 13, 2015
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Security Issues Take Toll on IT Adoption

Security Concerns Alter Cloud StrategiesSecurity Concerns Alter Cloud Strategies

Security issues push organizations toward private clouds. For just over half (52%), security was the top cloud computing adoption issue.

Security Concerns Alter Big Data StrategiesSecurity Concerns Alter Big Data Strategies

A fear of putting too much data in the cloud was cited by 35%. Most organizations are leveraging private clouds (43%) or traditional servers (24%) instead of public clouds (11%) to store big data.

Security Affects Pace of Mobile Computing AdoptionSecurity Affects Pace of Mobile Computing Adoption

Half of respondents cited the risk of data breaches from lost devices and unprotected wireless networks as the biggest mobility risk. 44% listed “fear of security breach” as the primary barrier to expanding mobile within the organization.

An Absence of Security PlanningAn Absence of Security Planning

Only 30% of respondents said they have the right information available to make risk-based decisions. Only one in four organizations have a plan in place for all types of security breaches.

An Absence of Security LeadershipAn Absence of Security Leadership

Only 28% of organizations have a C-suite mindset that is fully engaged with security initiatives. Among organizations that are very confident in their security, 84% of senior leaders are fully or somewhat engaged.

Security Remains ReactiveSecurity Remains Reactive

Little has changed in how security resources are allocated. Security resources are primarily spent on protecting against hackers (43%) and adhering to compliance regulations (37%).

IT Security Remains InconsistentIT Security Remains Inconsistent

Policy enforcement remains random. Only 39% of respondents have a workforce that is fully aware of the organization’s security rules.

IT Security as a Potential Business EnablerIT Security as a Potential Business Enabler

Only 13% of those surveyed are using security to enable new things. Only 18% are using security to create a competitive advantage.

thumbnail Michael Vizard

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a writer for publications including Programmableweb, IT Business Edge, CIOinsight, Channel Insider and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs
Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite
Jordan Smith
Aug 13, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.