Multi-cloud adoption grew by 70% calendar year-above-year in 2020 outpacing the past 12 months by a lot more than 20%.
In accordance to the Continuous Intelligence Report The Condition of Fashionable apps, DevSecOps and the Effect of COVID-19 from Sumo Logic, shoppers adopted CloudTrail (60%), VPC Flow Logs (34%) and GuardDuty (22%) to fulfill the expanded want for cloud products and services.
The report, which is designed utilizing knowledge from a lot more than 2100 Sumo Logic consumers working apps throughout all significant cloud platforms and on-premises environments, also claimed that securing cloud workloads involves adoption of equally cloud-native security technologies and consuming obtainable cloud facts resources.
Because of to the will need to support remote workers all through the pandemic, multi-cloud adoption grew by 70% 12 months-around-12 months, outpacing the prior 12 months that noticed a 50% progress. This led enterprises to switch to fashionable cloud platforms these types of as Amazon Web Expert services (AWS), Microsoft Azure and Google Cloud System (GCP), to produce high top quality and secure purposes to their consumers.
Also, AWS regional facilities in the US and EU were top rated targets for attackers, centered on Sumo Logic’s world intelligence.
“This year was contrary to any other that we have witnessed with a major shift in organizations’ technology priorities, in portion as a result of the COVID-19 pandemic,” stated Bruno Kurtic, founding VP of tactic and remedies at Sumo Logic.
“This continued acceleration to electronic was more fueled vital tendencies such as multi-cloud adoption, an increasing risk landscape and the want for enhanced collaboration throughout DevSecOps, as firms immediately created modifications to adapt to new enterprise requires. The have to have for steady intelligence is even a lot more critical as digital corporations require authentic time analytics in order to produce significant effectiveness, remarkably scalable, always-on electronic services to velocity choice generating and travel the finest client ordeals.”
Some parts of this article are sourced from:
www.infosecurity-magazine.com