New research shows that most businesses have switched from legacy to cloud security solutions, resulting in money-savings.
SASE provider Netscope recently polled 700 IT professionals in Germany and the UK on their intentions and practices as the world turns to a remote-first approach. It found that four out of five European businesses have saved on hardware and equipment replacement as a result of the transition to the cloud.
Netscope says that replacing “expensive firewalls” (with firewall-as-a-service), in particular, produced savings for a fifth (21%) of IT teams, while many other businesses opted for VPNs and bandwidth. Saved on costs. Vendor consolidation has also created savings opportunities for a large number of firms (21%).
These are not just some of the early adopters. Netscope says 99.5% of research respondents are “starting network and security transformation projects within the next five years”, with more than half already underway or ready for the next twelve months.
However, challenges lie ahead. First, it is not yet clear who should take responsibility for major transformation projects, nor who should pay. A quarter of IT leaders (27%) are leaving it to the security team to fund both SASE and Zero Trust, while the same percentage is up to the network and infrastructure teams.
Most CIOs do not plan to converge network and security budgets, although many are considering merging teams. In addition, some respondents claimed that SASE is owned by networking teams, while a third (31%) said that responsibility was shared.
This “inconsistency” in the market, Netscope concluded, will result in the CISO and CIO continuing to battle over ownership of the projects.
Migrating to the cloud often also means expanding the headcount and changing the organizational structure. Many respondents expect their security team to grow, while others have already made changes to the structure or staffing of their networking team. In the end, nearly half (46%) are struggling to find suitable candidates for their security roles.
You may also want to check out our list of the best endpoint security solutions