• AU
  • magnifying glass search icon to open search field
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • AU
    Language
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

More than half of Australian Enterprises Have Misplaced Confidence in their Cloud Service Providers’ Security

Palo Alto Networks SYDNEY Oct 24, 2019 at 07:00 AM

SYDNEY, Australia – Oct. 24, 2019 – Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today released a report that uncovers the truth about the state of cloud security among large enterprises across Asia-Pacific including Australia, with many cases where perception doesn’t match the reality when it comes to securing the cloud. 

 

Conducted by Ovum Research, the report shows that large enterprises, defined as those with more than 200 employees, are not prepared for cloud-related cybersecurity threats, and more importantly, make the assumption that public cloud is secure by default. In fact, 56 per cent of security decision-makers in large Australian enterprises believe that security provided by their cloud service providers is sufficient to protect them from cloud-based cyber threats. 

 

“Organisations need to recognise that cloud security is a shared responsibility,” said Sean Duca, vice president and regional chief security officer, Asia-Pacific and Japan at Palo Alto Networks. “While cloud providers are responsible for the security of their infrastructure, the onus is on companies themselves to secure their data and applications stored in that infrastructure.”

 

Large Organisations Have Many Security Tools, but Lack a Unified View of Security

 

Among the Australian companies surveyed, 52 per cent operate with more than 10 security tools to secure their cloud. However, having numerous security tools creates a fragmented security posture, adding further complexity to managing security, especially if the companies are operating in a multi-cloud environment. The multi-cloud approach creates a dangerous lack of visibility that is prevalent in 69 per cent of large organisations in Australia, according to Ovum. 

 

The report highlights the ubiquity of multi-cloud deployments in large organisations that calls for a unified view of all cloud-native services, and recommends it is ideal for organisations to have a central console that uses technologies such as artificial intelligence to help prevent known and unknown malware threats, and quickly remediate accidental data exposure when it arises.

 

Large Organisations Lack Cloud Security Audits and Training 

 

The need for automation is further underscored by the study, which revealed that large enterprises do not have enough time and resources to dedicate to cloud security audits and training. 

 

87 per cent of organisations have either never conducted a security audit or do not do it on a yearly basis. Furthermore, more than quarter of audits do not include cloud assets and 79 per cent of organisations conduct internal audits only. Besides audits, there is also inadequate cloud security training for both IT and non-IT staff. More than two thirds (68 per cent) of Australian organisations do not provide cybersecurity training to IT security employees on a yearly basis. It is, therefore, not surprising that staff outside of IT departments receive even less training – 86 per cent of non-IT professionals do not receive cybersecurity training on a yearly basis. 

 

Despite organisations’ inability to provide more frequent audits and security training for IT teams and employees, it is encouraging to see 37 per cent of Australian organisations surveyed use threat intelligence and analytics to identify new threats and take necessary action. A further 16 per cent of Australian organisations have also equipped themselves with real-time threat monitoring capabilities. 

 

In order to be truly secure in cloud environments, it is pertinent for organisations in Asia-Pacific to be cognisant of cloud security best practices, which include:

 

  • Building security into the cloud environment from the get-go; security should be an enabler to accelerate cloud adoption.

  • Developing consistent security policies across all types of cloud deployments, which can be implemented properly through the help of tools that provide a unified view of all cloud assets and the threats they face. 

  • Allowing for frictionless deployment and easy scalability in multi-cloud environments, bridging the gap between highly controlled security teams and highly agile development teams.

  • Increasing audits and training for employees, both IT and non-IT.

  • Automating threat intelligence with natively integrated, data-driven, analytics-based approaches (leveraging machine learning/artificial intelligence) to avoid human error.

 

Learn More

  • ‘The Asia-Pacific Cloud Security Study’ report features analysis and best practices that can be implemented to help companies in Asia-Pacific protect themselves from cloud-based threats.

 

Note to Editors

The survey was conducted amongst 500 respondents from various vertical industries of large businesses with over 200 employees across five countries in Asia-Pacific. There were 100 respondents per country in Australia, China, Hong Kong, India and Singapore.

 

The companies surveyed needed to have 200+ employees and all had to be using public cloud as a minimum. The respondents to the survey ranged from owners to business directors and C-level executives, all of whom had to be either the final decision-maker or influencer when it came to the organisations’ cloud strategy. 

 

For more information on Palo Alto Networks cloud security offerings, visit https://www.paloaltonetworks.com/cloud-security.

 

###

 

About Palo Alto Networks 

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.

 

Palo Alto Networks and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

 

Media contacts:
Aarti Chauhan
Recognition PR on behalf of Palo Alto Networks
+61 2 9252 2266
Aarti_Chauhan@regognition.com.au

 

Jayne Livingston
Recognition PR on behalf of Palo Alto Networks
+61 2 9252 2266
Jayne_Livingston@recognition.com.au


Datasheet

PA-5200 Series Specsheet

Palo Alto Networks® PA-5200 Series of next-generation firewall appliances comprises the PA-5260, the PA-5250 and the PA-5220, which target high-speed data center, internet gateway and service provider deployments. The PA-5200 Series delivers up to 72 Gbps of throughput using dedicated processing and memory for the key functional areas of networking, security, threat prevention and management.

February 1, 2017
  • 5331

Datasheet

Cortex XDR

Hunt down and stop stealthy attacks by unifying network, endpoint, and cloud data

May 6, 2020
  • 16316

Datasheet

IoT Security Solution Brief

The industry's only complete IoT security product with visibility, prevention and enforcement for every IoT and OT device. Securing your investments in IoT and eliminating risk.

July 8, 2020
  • 15820

Datasheet

Panorama Datasheet

Overview of Panorama, our centralized security management system, that provides you with global control over multiple Palo Alto Networks firewalls.

March 18, 2019
  • 2508

Customer Case Study

University of Adelaide

The University of Adelaide is one of Australia’s Group of Eight research-intensive universities and is consistently ranked among the top one percent of universities in the world. Established in 1874, the University of Adelaide is Australia’s third oldest university and an iconic Adelaide institution.

April 7, 2014
  • 807

Datasheet

Prisma Access (GlobalProtect Cloud Service) Datasheet

Global expansion, mobile workforces and cloud computing are shifting the locations of your applications, data and users. These changes introduce new opportunities for business efficiencies, but they also create a set of unique cybersecurity challenges.

January 8, 2020
  • 806

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language