CIOs split on cloud data restrictions

 

Miners join Finance and Government as most constrained sectors.

Almost one in three Australian firms eyeing cloud computing are saddled with IT policies or requirements that ban data from going offshore, according to Telsyte.

The survey of 260 chief information officers found 29 percent have some kind of restrictions on data location, while 36 percent have no restrictions placed on them.

Of those most restricted are enterprises in the mining, financial services and government sectors.

The restrictions could be regulatory, addressing privacy concerns or "might be for perception or defensive reasons", senior analyst Rodney Gedda said. 

The least restricted in terms of data location are firms in property services, manufacturing and transport.

Overall, the survey found 35 percent of Australian enterprises had adopted some form of platform or infrastructure-as-a-service.

The most-used IaaS players are Amazon Web Services, Microsoft Azure and Rackspace. The leader - whom Gedda would not disclose - has more than 50 percent of Australian IaaS users signed on.

Future Telsyte research aims to ascertain the impact that local IaaS players were having in winning business.

The survey results form part of Telsyte's Australian infrastructure and cloud computing market study for 2012.

Copyright © iTnews.com.au . All rights reserved.


CIOs split on cloud data restrictions
 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1023

Vote