Close this search box.

Data Protection in the Cloud: A Critical Challenge for Enterprises

In 2022, the“Cloud Security Report” published by Fortinet revealed that 22% of respondents considered cloud security to be one of the biggest challenges in adopting cloud computing technology.

However, the 2023 report shows a significant change. Cloud adoption has remained stable, with almost 40% of respondents claiming to have moved more than half of their workloads to the cloud, and 58% expecting to do the same in the next 12 to 18 months.

Even so, data protection in the cloud remains a major concern, with 95% of companies worried about security in public cloud environments.

The Impact of Cloud Security: An Updated Perspective

As we saw in the research published by Fortinet, cloud security remains a major challenge, especially for companies that are migrating critical data and applications to the cloud.

In many cases, cloud adoption is being inhibited by a series of related challenges that prevent faster and wider adoption of cloud services.

Configuration error remains the biggest security risk in the cloud, according to 59% of cybersecurity professionals. Despite the economic headwinds, cloud security budgets are increasing for most organizations (60%) by an average of 33%.

In addition, 44% of organizations are looking for ways to achieve better visibility and control in the security of hybrid and multi-cloud networks.

On the other hand, 90% are looking for a single cloud security platform to protect data consistently and comprehensively across their entire cloud presence.

Therefore, to navigate the complex landscape of cloud security, organizations must adopt a proactive and centralized approach.

By incorporating cybersecurity into their migration to the cloud, companies can reduce risk, improve security and save costs.

By tackling cloud security challenges head on and harnessing the power of centralized platforms, organizations can unlock the full potential of the cloud while protecting their critical assets.

How does the lack of cloud security affect companies’ willingness to adopt cloud technologies?

This is due to the fact that the cloud suffers from constant threats that companies need to address on an ongoing basis.

Attacks such as DDoS, credential theft, malware and other types of threats are becoming increasingly sophisticated. And that’s not counting internal risks, which can also lead to compromised data security in the cloud.

In addition, companies also face the challenge of compliance. With increasing regulations, such as
General Data Protection Law (LGPD)
Payment Card Industry Data Security Standard (PCI DSS)
companies need to ensure that they are complying with all legal and regulatory requirements.

Other challenges companies face when it comes to data protection in the cloud

Besides the possibility of suffering attacks, there are other challenges that companies face when it comes to ensuring data protection in the cloud.

The following are some of the most pressing issues that companies must deal with when migrating their technology infrastructure to the cloud.

  1. Shortage of experienced professionals directly impacts data protection in the cloud

Migrating to the cloud requires highly skilled and experienced professionals. However, the lack of qualified professionals is one of the main problems companies face today.

With the growing demand for cloud IT professionals, the competition to hire these professionals is increasing, which means that companies have to spend more to hire and retain these employees.

A high risk that must be prioritized.

  1. APIs that are not safe to use

APIs are extremely important for allowing applications and devices to communicate with each other, but they also pose a major security risk in the cloud.

If APIs are not properly secured, cybercriminals can easily use them to gain unauthorized access to companies’ data and information.

One of the concerns companies have today is how to securely store and distribute API keys, also known as API secrets, given the high volume and agility required by DevOps teams.


  1. Insecure Cloud Data Storage

Business data is often stored on insecure cloud devices, which means it is subject to various risks, including cyber attacks.

If company data is not properly protected, cybercriminals can easily access it and steal the information.

Sometimes companies even have numerous protections in place, but even so, the hacker needs just one loophole, as reported

Docker Hub images leak sensitive data and private keys.

In case specific it was evenencryption was used to protect the data, but the storage of the keys was not.

  1. Use of open source applications

Open source applications are increasingly popular as they are considered cheaper and easier to deploy.

Applications can pose a major risk to companies’ cloud data protection, since cybercriminals can easily find and exploit the vulnerabilities present in them.

  1. Incorrect settings

Incorrect configurations are another major cloud data protection problem faced by companies. If the settings are not adjusted correctly, this can allow cybercriminals to gain unauthorized access to company data and information.

In addition, incorrect configurations can also prevent companies from accessing the security features needed to secure their networks.

In fact, data protection in the cloud is a critical challenge for companies of all sizes. With the increased adoption of the cloud, cybercriminals are increasingly looking for new ways to attack companies.

Companies must therefore ensure that they are properly prepared to meet these challenges, otherwise they may suffer serious consequences.

Thales Data Protection on Demand (DPoD): Data protection in the cloud on demand

The award-winning Thales Data Protection on Demand is a cloud-based platform that offers a wide range of cloud HSM and key management services through a simple online marketplace.

Security is now simplified, more cost-effective and easier to manage because there is no hardware to buy, deploy and maintain.

Just click and deploy the services you need, provision users, add devices and get usage reports in minutes.

With DPoD, you can:

  • Focus on services, not hardware;
  • Buy only what you need and reduce costs;
  • Protect data anywhere;
  • Get real-time reports and visibility;
  • Easily integrate with existing applications, IT infrastructure and services.
With DPoDthere is no need for initial capital investment and prices are based on usage

There is no hardware or software to buy or upgrade. You have the flexibility to buy services to meet changing business needs.

In addition, Thales Data Protection on Demand allows you to easily integrate your cloud and IT services. Pre-configured APIs make it easy to integrate key management and HSM services on demand.

With DPoD, you can protect sensitive data in any environment – cloud, virtual or local. Protect the data you create, store and analyze. Encrypt your blockchain, cloud and Internet of Things (IoT) applications.

DPoD offers infinite scalability and elasticity. Expand HSM and key management services up and down automatically. Easily grow key and HSM management capacity and encryption capabilities without limitations.

Focus on your business

There’s no need to buy, provision, configure and maintain technology assets. The entire technological infrastructure is managed by Thales, including an SLA.

Thales Data Protection on Demand was awarded the Gold 2022 Cybersecurity Excellence Award for the best managed security service. This award honors individuals and companies that demonstrate excellence, innovation and leadership in information security.

In short, in addition to encrypting the data, store the key in a cloud HSM that is separate from your current infrastructure in order to increase the degree of security, so that once your company’s data has been leaked, the hacker will not have access to the cloud HSM in an environment outside your applications’ cloud.

Find out how the Eval and Thales partnership can help your company

The partnership between Eval and Thales allows your company to benefit from the Data Protection on Demand solution without the need to purchase, provision, configure and maintain hardware and software for your HSM and cryptographic key management needs.

All physical hardware, software, and infrastructure are managed by the existing official partnership between Eval and Thales, including an SLA, so you can focus on your business.

We deploy and manage cryptographic key management module services and hardware security, on demand and in cloud adoption.

With on-demand data protection, Eval and Thales can offer encryption and key management services quickly and easily.

Ensure your company’s cybersecurity with the expertise of Eval Professional Services

Eval Professional Services is made up of a team of experts who ensure that your company is in good hands.

With qualified professionals certified by Thales, we offer security services tailored to the needs of your business.

Take advantage of our vast experience and expertise in information security and LGPD compliance.

From defining the scope of the project to handing it over to the client, we provide customized solutions that integrate cutting-edge encryption technologies and secure access control infrastructure.

As your partner, we are ready to help you carry out digitization projects in compliance with security and data protection regulations.

Our commitment to excellence allows us to minimize risks, maximize performance and guarantee the data protection in cloud adoption that your customers and partners expect.

We share our experience in all business flows to help you protect what is most valuable: your data and customers.

Discover the benefits of Professional Services for your company.

About Eval

With a track record of leadership and innovation dating back to 2004, Eval not only keeps up with technological trends, but we are also in an incessant quest to bring news by offering solutions and services that make a difference to people’s lives.

With value recognized by the market, EVAL’s solutions and services meet the highest regulatory standards of public and private organizations, such as SBIS, ITI, PCI DSS, and LGPD. In practice, we promote information security and compliance, increase companies’ operational efficiency, and reduce costs.

Innovate now, lead always: get to know Eval’s solutions and services and take your company to the next level.

Eval, safety is value.

Written by Arnaldo Miranda, Evaldo. Ai, reviewed by Marcelo Tiziano and designed by Caio.

About the author

Other posts