engage.gigamon.com
Open in
urlscan Pro
2a02:26f0:780::5f65:366b
Public Scan
Submitted URL: http://mkto-m0027.com/dc/UKzDy0o4wa2eQKOUPa8qRgxR_qaw9Zs7hk2PCBW-bTBM_qW3eeKTJEYDQKYDUH9VUCk4XmxhezAq07iuPx_AlbB45IWnI...
Effective URL: https://engage.gigamon.com/programs-email-cloudalwayson/home/analyst-report-sans-2022-cloud-security-survey?utm_source=Mark...
Submission: On December 13 via api from IE — Scanned from DE
Effective URL: https://engage.gigamon.com/programs-email-cloudalwayson/home/analyst-report-sans-2022-cloud-security-survey?utm_source=Mark...
Submission: On December 13 via api from IE — Scanned from DE
Form analysis
1 forms found in the DOM<form class="search-form"><input name="query" class="search-input" type="text" placeholder="Search..." value=""><span class="icon-search"></span></form>
Text Content
ANALYST REPORT: SANS 2022 CLOUD SECURITY SURVEY SurveySANS 2022 Cloud Security SurveyWritten by Dave ShacklefordMarch 2022©2022 SANS™ Institute 2SANS 2022 Cloud Security SurveyExecutive SummaryOver the past several years, we have seen more and more examples of vulnerabilities in cloud assets, cloud service provider outages, sensitive data disclosure, and breaches involving the use of public cloud environments. Some examples of security issues in the cloud in 2021 include:• Amazon Web Services (AWS) experienced a number of significant outages that rendered many websites and online services unavailable. More than three critical outages occurred, leading to well-known sites like Roku, Delta Air Lines, Disney+, and others being unavailable for hours.• Microsoft notified some of its Azure App Service customers that a serious security vulnerability (dubbed “NotLegit”) had caused the exposure of hundreds of source code repositories. This vulnerability meant that customers could unintentionally configure the local .git folder to be created in the publicly accessible content root of the Azure App Service containers, which would put them at risk for information disclosure. Wiz, a cloud security firm, announced the issue in late December.The 2021 Data Breach Investigations Report1 from Verizon, released in the second quarter of 2021, noted that compromised external cloud assets were more common than on-premises assets in both incidents and breaches. Many attacks targeted credentials that were then used to access cloud-based collaboration and email services, as well.Even with these types of security issues, we continue to see rapid growth in moving workloads to the cloud, building new applications in the cloud, and subscribing to a wide range of SaaS and other cloud services. The goal of the SANS 2022 Cloud Security Survey is to provide additional insight into how organizations are using cloud today, the threats security teams are facing in the cloud, and what we are doing to improve security posture in the cloud, as well. This year, we again had several hundred respondents, who represented a number of industries. Figure 1, seen on the next page, provides a snapshot of the demographics for the respondents to the 2022 survey.1www.verizon.com/business/resources/reports/dbir/ 1 / 13 125% MULTI-CLOUD IS COMPLEX ENOUGH. MULTI-COMPLIANCE AND SECURITY? MULTI-CONFUSING. See how organizations are adapting to securing the cloud. READ THE SANS REPORT DAVID, Thanks for your visit. We have selected for you and your friends from ABB a collection of relevant readings for IT and Security professionals on how organizations secure their cloud environments and are getting more from their efforts and investments. ANALYST REPORT: ESG TECH VALIDATION GIGAMON HAWK DEEP OBSERVABILITY PIPELINE This ESG Validation Report documents our evaluation of the Gigamon Hawk Deep Observability Pipeline, focusing on how it can help organizations to establish and maintain end-to-end observabilityand security of workloads deployed in hybrid and multi-cloud environments.Organizations continue to see their IT environments as complex. In fact, ESG research uncovered that 79% of respondents believe that their IT environments are equally, if not more complex, than they were two years ago. Blog Posts & Podcasts Analyst Reports On-Demand Webinars Videos Case Stories 02 Link IDC Blog Series Your Network and Their Cloud | gigamon.com You’re Investing in Cloud Services. Have you taken the right steps to ensure security? Most Viewed 0835 Link Demystify Automated Cloud Visibility with VPC Traffic Mirroring and Gigamon - Gigamon Blog Updated September 30, 2021. AWS is the industry leader in IaaS, with an extensive and worldwide public cloud presence that offers endless scalability, 03 Link Navigating the Cloud Journey | Podcast | Gigamon This podcast series is the perfect destination for cloud practitioners responsible for planning, architecting, implementing, and operating any part of their organization's cloud tech stack. Thank You By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookie Policy Reject All Accept All Cookies Manage Cookie Settings PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Back Button PERFORMANCE COOKIES Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices