Cloud and application security a high priority for UAE organizations

Palo Alto Networks® has announced the survey findings that call for more resilient cybersecurity framework in the region


  • Regional organizations are rapidly adopting cloud technologies and moving application
  • Prevention-focused security platform is the need of the hour
  • Cloud security is the top priority of UAE-based CIOs


Surveying over 1,000 IT decision-makers in the UAE and Saudi Arabia, the 2017 cloud security survey explores the state of cloud adoption and security amongst organizations in the region.

Palo Alto Networks®, the next-generation security company has announced the survey findings on Tuesday and it also coincided with the Palo Alto Networks Cybersecurity Summit 2017 in Dubai.

Technology advancement

As a result of automation and cloud services integration advancements, effective next-generation security measures can now be easily applied, without causing administrative friction; and the notion that security is a bottleneck to embracing any cloud model is a thing of the past.

UAE-based CIOs agree: cloud security is a top priority. On a scale of 0-10, with 10 being “very important”, cloud security ranked as an 8 or higher by the majority of UAE CIOs (56 percent), according to the Palo Alto Networks survey. Market figures back this up, with research firm IDC forecasting information security spend across the Middle East, Turkey and Africa to reach a record high of $2 billion in 2017.

Quick shift toward technology

Organizations are rapidly adopting cloud technologies, and moving applications and data into a diverse set of cloud offerings, spanning public cloud, private cloud, hybrid cloud and SaaS (‘Software as a service’). In the UAE, a shift towards digitalization, Internet of Things and cloud computing is boosted by ambitious mega-projects and initiatives, such as UAE Vision 2021, that are expected to have positive impact on the country’s IT services market.

The Palo Alto Networks survey found that more than two-thirds of respondents (70 percent) in the UAE indicated that they have one to ten cloud-based applications, with 15 percent and nine percent stating that they had 11 to 20 and more than 21 applications, respectively.

Private cloud is the most popular cloud computing solution amongst enterprises in the UAE, with 26 percent of respondents stating their company has adopted this. 15 percent of respondents preferred the public cloud, and a further 16 percent stated that they did not have any cloud computing solutions deployed, but they planned to make the shift to the cloud in the near future.

 “As more organizations move to the cloud to take advantage of increased operational efficiencies and lower costs, security needs to keep pace with the new dynamic environments in which businesses operate. Customers need a holistic, integrated and automated approach across their entire architecture from the network and data center to the cloud,” said Ercan Aydin, regional vice president of Emerging Markets at Palo Alto Networks.

With 46 percent of respondents admitting to having experienced a security incident, or being unsure if an incident has taken place, security vigilance needs be a top priority when it comes to the cloud.

Ensuring foolproof security

Of those surveyed, more than 50 percent stipulated that firewall (60 percent) and password protection (63 percent) were among the top security systems that their companies deploy to protect themselves against security breaches, indicating that there is a lack of understanding when it comes to securing applications and data in the cloud. Regardless of the size of the organization, a prevention-focused, natively engineered security platform that is simple to deploy and scalable to meet future growth demands is ideal.

“Security breaches and vulnerabilities make the headlines too often these days, and this could threaten trust in the digital age. With workloads and data increasingly distributed across physical and cloud computing environments, organizations need to have security in place that provides visibility, control and prevention of known and unknown threats, and which protects data, regardless of where it resides,” stated Aydin.