Alert Logic releases 2015 Cloud Security Report

Alert Logic, a leading provider of Security-as-a-Service for the cloud, has announced the availability of its Fall 2015 Cloud Security Report.  In the report, Alert Logic employed ActiveAnalytics, its big data security analytics engine, to analyse one billion events in the IT environments of more than 3,000 of its customers between January 1 and December 31, 2014 to identify more than 800,000 security incidents.  Insights were gleaned from customer environments representing all deployment models – on premises, in the cloud and hosted, and a vast array of market segments and industries.  The analysis of the data uncovers many findings including ones that point to new trends in cyber security, the validation of findings from previous reports and deeper insight into how cyber attackers operate and how companies can better and more proactively secure their IT environments.

Some key findings in the new report include the following:

  • Top cyberattack methods aimed at cloud deployments grew 45 percent, 36 percent and 27 percent respectively over the previous year, while top attacks aimed at on-premises deployments remained relatively flat. Alert Logic attributes this increase in cloud attacks as being driven by the overall strong adoption of cloud computing platforms.  In other words, cyber criminals are logically attempting to break into a growing number of applications being deployed in the cloud.
  • The type of cyber-attack perpetrated against a company is determined more by how it interacts with its customers and the size of its online presence than by where its IT infrastructure resides.  Understanding this threat profile can help a company determine which type of cyber-attack it is most vulnerable to, as well as the type and size of the security investment required to keep them safe.
  • Understanding the Cyber Kill Chain® can give insight into where cyber criminals are more likely to breach a company’s environment and how they can be stopped. This representation of the attack flow can help organisations target a defense strategy based on the way attackers approach infiltrating their businesses.

The report also identifies the specific cyber threats faced by different industries, including Advertising, Accounting/Management, Computer Services, Mining, Financial, Real Estate, Healthcare, Retail, Manufacturing and Transportation.  Additionally, the report provides a more detailed analysis of three industries in particular: Mining, Oil/Gas & Energy; Retail and Financial Services.
“While cybercriminals are increasingly targeting cloud deployments, on-premises deployments are still being targeted at the same frequency as they always were,” said Will Semple, Vice President of Security Services for Alert Logic.  “The key to protecting your critical data is being knowledgeable about how and where along the Cyber Kill Chain attackers infiltrate systems and to employ the right security tools, practices and resource investment to combat them.”
To access the Fall 2015 Cloud Security Report, visit here.

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Ask the Expert Brivo - securitybuyer.com

Ask the Expert – Jon Polon, Brivo

Jon Polon, Senior Director of Global Integration Partners at Brivo provides an in-depth overview of the progression of the cloud…
ASSA ABLOY - securitybuyer.com

BG100 Speedgate Recognised with Red Dot Award

Combining an Aesthetically Appealing Design, Function and Innovation, the BG100 Speedgate Sets New Benchmark for …
Product Spotlight - Videx - securitybuyer.com

Product Spotlight – Era Series

VIDEX presents its new series of outdoor compact video door entry systems, Era Series, and showcases their durability, configuration…
Zenitel LinkedIn Live

REGISTER NOW: Dynamic Audio Technology with Zenitel

Security Buyer Live is proud to announce an exclusive webinar session with Wim van Winghe, Senior Vice President EMEA at Zenitel..
Security Buyer Carousel

June Edition of Security Buyer available in library

The June edition of International Security Buyer is available in the Security Buyer library. This issue marks a pivotal moment in 2025…
Christina Alexander Judge - SecurityBuyer

Christina Alexander Announced as Security Buyer Awards Judge

Security Buyer is proud to announce Christina Alexander as the latest addition to the distinguished judging panel for the Security…
ASSA ABLOY SMARTair - Security Buyer

More flexible management of Gen-Z student accommodation

Almost everyone attending university for the first time is now a digital native. They expect the convenience…
SB Awards register now advert - Security Buyer

Launching Security Buyer Awards

Honouring innovation, leadership, and success across the global security industry at the Security Buyer Judges’ and Readers’ Awards 2025 
Product Spotlight - HID

Product Spotlight – HID

Access control is evolving into a smart, responsive platform—integrating embedded apps, IoT, and cybersecurity to deliver…
Sophos

Sophos Enhances Protection and Incident Response

Sophos announces an update to its Sophos Firewall, now including Sophos NDR Essential, which is free for all customers with an…
Scroll to Top