Hybrid Cloud - Organisations Face Big Challenges In Securing Their Applications

A  study commissioned by cybersecurity firm AlgoSec, highlights significant challenges organisations face in securing applications across hybrid multi-cloud environments. The Case for Convergence in Hybrid Multi-cloud, Application-centric Networks explores the complexities arising from fragmented infrastructure and inconsistent security practices.

As businesses increasingly rely on a mix of on-premises data centres and multiple cloud providers, traditional network security approaches are proving inadequate.

The report’s findings align with AlgoSec’s mission to simplify and secure application connectivity across fragmented infrastructures. This summary explores the report’s key findings, detailing the current state of hybrid cloud adoption, security tool fragmentation, attack prevalence, collaboration gaps, and the business benefits of improved network security.

Hybrid Cloud As The New Normal

The research confirms that hybrid cloud environments are now standard for most organisations. According to the findings, 85% of organisations utilise two or more cloud service providers, reflecting a widespread adoption of multi-cloud strategies. However, 43% of applications remain hosted on-premises, indicating that a significant portion of critical workloads has yet to transition fully to the cloud.

The report suggests that this hybrid model - combining on-premises infrastructure with multiple cloud platforms - is likely to persist for the foreseeable future.

This persistence stems from the need to balance legacy systems, regulatory requirements, and the flexibility offered by cloud solutions. The coexistence of on-premises and cloud-based applications creates a complex environment that demands robust and cohesive security measures to protect data and ensure operational continuity.

Fragmented Security Tools & Policies

One of the most pressing issues highlighted by the study is the fragmentation of security tools and policies. Approximately 89% of organisations employ different tools and policies to secure various segments of their infrastructure, leading to inconsistent security practices. Nearly 80% of respondents rely on cloud-native firewalls provided by their cloud service providers, while others use third-party security tools or microsegmentation solutions.

This siloed approach results in limited visibility across the network, making it challenging to enforce consistent security policies.

The lack of integration between tools increases the risk of vulnerabilities, as security teams struggle to gain a holistic view of their infrastructure. The report suggests that this fragmentation not only complicates security management but also hinders the ability to respond swiftly to threats.

Prevalence Of Public Cloud Attacks

The study reveals that public cloud environments are increasingly targeted by cyberattacks. Over the past two years, 43% of organisations reported experiencing at least one public cloud attack. The most common issues include malware spreading across systems (44%), misconfigurations (32%), and open ports (26%). These vulnerabilities expose organisations to significant risks, including data breaches and service disruptions. The high incidence of attacks underscores the limitations of current security practices in hybrid multi-cloud environments. Misconfigurations, in particular, are a critical concern, as they often result from human error or inconsistent policy enforcement across disparate systems. The findings highlight the urgent need for automated and unified security solutions to mitigate these risks effectively.

Collaboration Gaps Across Teams

Effective collaboration between security, cloud, networking, and application teams is essential for maintaining robust security in hybrid environments. However, the report indicates that 55% of organisations still need to improve coordination between these groups. While some organisations have begun merging responsibilities for on-premises and cloud security, siloed workflows persist, hindering effective communication and decision-making. This lack of collaboration exacerbates the challenges of managing complex, multi-vendor environments, as teams struggle to align on security priorities and policies. The study suggests that fostering better cross-team coordination is critical to achieving a unified security posture and reducing vulnerabilities across hybrid infrastructures.

Business Benefits Of Enhanced Network Security

Beyond mitigating risks, the research highlights significant operational and business benefits associated with improved network security. Organisations identify greater operational efficiency (63%), lower costs (48%), and faster cloud migrations (46%) as the top advantages of adopting converged security solutions. By streamlining security processes and automating policy management, businesses can reduce the time and resources required to manage complex infrastructures.

Faster cloud migrations enable organisations to capitalise on the scalability and flexibility of cloud platforms, while cost reductions help optimise budgets. These benefits demonstrate that investing in cohesive security strategies not only enhances protection but also drives tangible business outcomes, making it a strategic priority for organisations navigating hybrid multi-cloud environments.

Conclusion

AlgoSec's study paints a clear picture of the challenges and opportunities in securing hybrid multi-cloud environments. With 85% of organisations using multiple cloud providers and 43% of applications remaining on-premises, the hybrid model is here to stay. However, fragmented security tools, frequent public cloud attacks, and collaboration gaps pose significant risks. By adopting converged, automated security solutions, organisations can enhance visibility, reduce vulnerabilities, and achieve operational efficiencies.

The report deomonstrates the importance of unified security strategies to navigate the complexities of modern infrastructures.  As businesses continue to embrace hybrid multi-cloud environments, addressing these challenges will be critical to maintaining security and driving business success.

Algosec  |    Cisco

Image: Ideogram

You Might Also Read: 

Navigating The Complexities Of Data Backups In A Hybrid World:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Gen Z’s Cybersecurity Complacency Raises Alarm

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

Military Cyber Professionals Association (MCPA)

Military Cyber Professionals Association (MCPA)

MCPA are a team of Soldiers, Sailors, Airmen, Marines, Veterans and others interested in the development of the American military cyber profession.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

Haltdos

Haltdos

Haltdos is an AI driven website protection service that secures websites against today's cyber threats.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange is an intellectual hub and community of researchers with the common goal of advancing academic and industrial efforts in the science and engineering of quantum information.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

Cygenta

Cygenta

Cygenta brings a new approach to cybersecurity. We understand that true security means having digital, human and physical security working in harmony.

Dynatrace

Dynatrace

Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation.

Hunton Andrews Kurth

Hunton Andrews Kurth

Hunton Andrews Kurth LLP serves clients across a broad range of complex transactional, litigation and regulatory matters. Practice areas include Privacy and Cybersecurity.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

HyperSphere

HyperSphere

HyperSphere Data Protect is a patented technology establishing the world’s first cyberstorage solution designed to make data resilient against AI and quantum threats.