High Threat Potential across the Data Center
IT professionals report a wide variety of potential security concerns to keep them up at night. Three top the list: attacks targeting specific data types (62 percent); attacks of server, platform, and data center infrastructure assets (61 percent); and hackers seeking to gain control of software assets (60 percent). Almost half are concerned about rootkit attacks at the hypervisor level or below, network attacks, and attacks targeting end-point devices. Concern for Security Threats Percent Highly Concerned (6–7 ratings) (n=200) 60% 62% 61% 55% 50% 47% Attacks targeting specific types of data(malicious loss of confidential data) Attacks targeting server, platform, and data center infrastructure assetsHackers seeking to gain control of software assetsAttacks targeting end points (notebooks, devices) Attacks targeting networks(denial of services, distributed denial of service) Rootkit attacks at the hypervisor or below on servers(BIOS and firmware) How concerned are you about each of the following potential security threats to your IT environment? (1=not at all concerned, 7=very concerned) Q:
Peer Research Report: Cloud Security Issues - Page 0001.html
Peer Research Report: Cloud Security Issues - Page 0002.html
Peer Research Report: Cloud Security Issues - Page 0003.html
Peer Research Report: Cloud Security Issues - Page 0004.html
Peer Research Report: Cloud Security Issues - Page 0005.html
Peer Research Report: Cloud Security Issues - Page 0006.html
Peer Research Report: Cloud Security Issues - Page 0007.html
Peer Research Report: Cloud Security Issues - Page 0008.html
Peer Research Report: Cloud Security Issues - Page 0009.html
Peer Research Report: Cloud Security Issues - Page 0010.html
Peer Research Report: Cloud Security Issues - Page 0011.html
Peer Research Report: Cloud Security Issues - Page 0012.html
Peer Research Report: Cloud Security Issues - Page 0013.html
Peer Research Report: Cloud Security Issues - Page 0014.html
Peer Research Report: Cloud Security Issues - Page 0015.html
Peer Research Report: Cloud Security Issues - Page 0016.html
Peer Research Report: Cloud Security Issues - Page 0017.html
Peer Research Report: Cloud Security Issues - Page 0018.html
Peer Research Report: Cloud Security Issues - Page 0019.html
Peer Research Report: Cloud Security Issues - Page 0020.html
Peer Research Report: Cloud Security Issues - Page 0021.html
Peer Research Report: Cloud Security Issues - Page 0022.html
Peer Research Report: Cloud Security Issues - Page 0023.html
Peer Research Report: Cloud Security Issues - Page 0024.html
Peer Research Report: Cloud Security Issues - Page 0025.html
Peer Research Report: Cloud Security Issues - Page 0026.html
Peer Research Report: Cloud Security Issues - Page 0027.html
Peer Research Report: Cloud Security Issues - Page 0028.html

A javascript error just appeared or you do not have installed a Flash Player plugin in your browser.

Prestimedia, your interactive publications solution provider, invites you to download the latest Adobe Flash plugin by clicking here

This e.print interactive catalogue is made by Prestimedia