Financial Organisations Are Migrating To The Cloud

New findings see the hybrid cloud market growing significantly over the next five years among financial and financial service companies. The cloud infrastructure firm Nutanix has announced the financial services sector findings of its report, measuring organisations’ plans for adopting private, hybrid and public clouds. 

These results point to a digital transformation within the industry, with nearly 50% of respondents reporting that the Covid-19 virus caused them to increase their investment in the hybrid cloud.

This investment in hybrid cloud is the only IT model showing positive growth among financial company respondents, and it is expected to increase by nearly forty percent in that timeframe. The financial services companies plans to increase their investment in private cloud over the next year is 10% higher than the global average showing that private cloud adoption is crucial to creating a modern hybrid cloud.  

Other Results 

Security issues are driving private cloud adoption: Financial services organisations ranked security, privacy, and compliance issues as the most concerning when running applications within public cloud solutions (62%). 30% of respondents were less concerned with public cloud capacity as the security of sensitive data is most important, and organisations are looking for different answers.

Investment in hyper-converged infrastructure shows the industry’s confidence in private cloud: Nearly 50% of financial sector respondents say they’ve either fully deployed hybrid cloud or are in the process of doing so, and 38% report they will be deploying HCI within the next two years. 

This investment is directly aligned with increased private cloud adoption: as HCI reduces the time it takes to build the software-defined, scalable infrastructure necessary to support private cloud.

Financial services organisations are looking to optimise their cloud usage: The sector’s top motivations for modernising its IT infrastructure is to gain greater control of IT resource usage (59%) and to gain the speed (58%), and flexibility needed (55%) to meet business requirements.

They must also invest in talent to support a hybrid cloud environment as over a third of financial services respondents say they don’t have enough employees with the skills needed to manage mixed private and public cloud environments. 

Furthermore,  34% said they lacked expertise in cloud-native technologies and containers. These issues have contributed to organisational struggles to fully adopt hybrid cloud.

Nutanix:           Tech Republic:      Help Net Security:       ITPro

You might Also Read:

The Five Best Ways To Secure Your Cloud Environment:

 

« Crypto Currency Users Hijacked
Google is Offering $3m To Fact-Check Vaccine Fake News »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

Cyber Security & Information Systems Information Analysis Center (CSIAC)

Cyber Security & Information Systems Information Analysis Center (CSIAC)

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

MER Group

MER Group

MER Group is a world-leading integrator in the areas of communications and security. MER cyber solutions cover the entire range of cyber and intelligence related products and services.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

Aricoma

Aricoma

Aricoma are Architects of Digital. We aim to become a major player in end-to-end IT services and digital transformation in Europe.

Honeywell Process Solutions (HPS)

Honeywell Process Solutions (HPS)

Honeywell's Industrial Cyber Security Solutions help plants and critical infrastructure sectors defend the availability, reliability and safety of their industrial control systems.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

ConvergeOne

ConvergeOne

ConvergeOne is a leading global IT services provider of collaboration and technology solutions including cybersecurity.

Alertot

Alertot

Hackers attack minutes after a new vulnerability is published. Alertot helps to decrease exposure time in organizations by notifying new issues when they are disclosed.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

Incode

Incode

Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online.