Cloud Security Report 2021

The most successful IT operations focus on enabling users while they are away from the office. This means being more agile and flexible with your security strategy to accommodate the varying needs of a dispersed organization.

 

This year’s Cloud Security Report (formerly Mobile Threat Landscape) looks at the threats and security trends impacting real organizations in today’s remote working environment.

The report digs into the following:

  • Endpoints: organizations of all sizes are having to manage and secure an increasing number of endpoints. Lack of inventory and tighter budgets mean BYOD models are being adopted to fill the void, which, if managed improperly, can increase risk, but also increase support costs. The report identifies key behavioral and security trends, what IT administrators need to prioritize and how they to do so.
  • Users: a user’s behavior can significantly improve or damage your security strategy. The report looks at the risks end users are susceptible to in a remote working environment such as phishing or app risks and how to mitigate such threats.
  • Remote access: with organizations increasingly moving to cloud-based solutions, it introduces new types of access risk that traditional technologies like VPN can’t manage. Our report digs into these risks, while providing practical recommendations on how to mitigate them.

Introduction

In 2020, many organizations were forced to transition their business practices to a fully remote model while maintaining productivity levels. As a result, IT policy is being revised to accommodate more devices, more networks, and more apps, in more places than ever before.

The borderless enterprise is here. A Gartner survey of CFOs in March 2020 revealed that 74% intend to shift some employees to remote work permanently.

As a result, we are seeing the old assumptions of good security practices change before our eyes to meet the new normal. The most successful IT operations focus on enabling users while they are away from their desks. This means being more agile and flexible with your security strategy to accommodate the varying needs of a dispersed workforce, and that requires a cloud-first model.

Key industry experts believe SASE (Secure Access Service Edge) will be the key architecture model for innovative companies moving away from traditional technologies because SASE converges and aligns the functions of networking and security into a unified cloud-native service.

While SASE may be the future, businesses need to find the right tools for the job today. It’s important to understand the cyber risks and how they can be introduced to the organization, and that is what this annual report aims to do.

Each year, we analyze the threats impacting mobile devices used for work. As our product portfolio has evolved (to encompass devices beyond smartphones and tablets), so too has our perspective on the mobile workforce — it’s a remote workforce, and it involves more than just mobile devices.

This year’s report will look at the threats and security trends impacting real organizations with users that are connecting remotely via a wide variety of portable devices and platforms to a multitude of apps hosted in private and public data centers.

A note on our data analysis

We carried out the analysis in this report using proprietary customer data gathered by the Wandera Security Cloud, which utilizes 425 million sensors to gather data. This data is used by Wandera to identify security and access trends, and every byte of user and business information is anonymized to protect individual usage data.

The data in this report has been carefully normalized as our customers range in size, from less than 10 employees to hundreds of thousands. There has also been standardization across geographies and industries to ensure the findings in this report are valid. Where third-party data is quoted, we have made efforts to use only credible, respected sources.

To continue reading the report please fill in the form.