Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Multi-cloud adoption grew by 70% year over year

the cloud
November 24, 2020

Sumo Logic released findings from its fifth annual report. ”The Continuous Intelligence Report: The State of Modern Applications, DevSecOps and the Impact of COVID-19” provides an inside look into the state of the modern application technology stack, including changing trends in cloud and application adoption and usage by customers, and the impact of COVID-19 as an accelerant for digital transformation efforts.

“This year was unlike any other that we have witnessed with a significant shift in organizations’ technology priorities, in part as a result of the COVID-19 pandemic,” said Bruno Kurtic, founding VP of strategy and solutions at Sumo Logic. “This continued acceleration to digital further fueled key trends including multi-cloud adoption, an expanding threat landscape, and  the need for improved collaboration across DevSecOps, as companies quickly made changes to adapt to new business demands. The need for continuous intelligence is even more critical as digital businesses require real-time analytics in order to deliver high performance, highly scalable, always-on digital services to speed decision making and drive the best customer experiences.”

”The Continuous Intelligence Report: The State of Modern applications, DevSecOps and the Impact of COVID-19” now it its 5th year, provides data-driven insights, best practices and trends by analyzing technology adoption among more than 2,100 Sumo Logic customers who run massive mission-critical modern applications on cloud platforms like AWS, Azure, and Google Cloud Platform as well as hybrid cloud infrastructure. Key findings from the report include:

 

Multi-cloud adoption accelerates during COVID-19 pandemic

Amidst the COVID-19 pandemic, the adoption of modern cloud services has surged. As businesses faced upheaval, many have turned to these platforms to support new and changing ways of doing business.

  • Multi-cloud adoption grew by 70% year over year, outpacing previous 12 months that saw 50% growth.
  • Enterprises are increasingly turning to modern cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), to deliver high quality and secure applications to their customers.

 

Modern cloud architectures become a reality

As more enterprises become dependent on the cloud, they’re shifting to a more “modern architecture.” This transition focuses on an application stack that consists of new tiers, technologies, and microservices.

  • The typical AWS application has as many as 26 services (up from 15 last year) and is deployed across two or more regions and two or more accounts.
  • Over 40 percent of Sumo Logic’s AWS customers are using container orchestration.
  • Kubernetes is fast becoming the default app platform, with over 85% of businesses choosing Kubernetes to build and operate applications across multiple clouds.
  • Additionally, serverless architecture is continuing to grow, and AWS Lambda adoption is now at 37 percent.

 

Security landscape dramatically shifts during COVID-19 pandemic

The security threat landscape has changed since the start of the COVID-19 pandemic, requiring a more rigorous and adaptive security processes and solutions. Securing cloud workloads requires adoption of both cloud-native security technologies and consuming available cloud data sources.

  • AWS customers adopted CloudTrail (60 percent), VPC Flow Logs (34 percent), and GuardDuty (22 percent) to meet this need. Additionally, the patterns of attack have changed throughout the course of the pandemic. The largest jump in attack origin came from Russia and India.
  • Based on Sumo Logic’s Global Intelligence for AWS, AWS regional centers in the U.S. and E.U. are top targets for attackers.

 

The WFH era reinforces the need for DevSecOps to break the silos

The continued expectations for DevOps to improve the release and updates of apps and services has challenged siloed teams - given their remote working situations. It's important that distributed development teams leverage analytics and insights to optimize the entire end-to-end software development and delivery process and improve the continuous intelligence of their organizations.

As the modern application stack continues to be reshaped by multi-cloud, open source technologies, and factors from extenuating circumstances like COVID-19, companies need a strategy to address this growing complexity. The answer lies in continuous intelligence, a new category of software that leverages real-time analytics and insights from a single, cloud-native platform across multiple use cases to speed decision-making, and drive world-class customer experiences. 

Download a full copy of the report here.

KEYWORDS: cloud security cyber security digital transformation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • pink and purple light over metal prongs

    Cyber assets increased by 133% year-over-year

    See More
  • Laptop with crumbled papers

    Emails delivering infostealers rose by 84% year-over-year

    See More
  • Blank check

    Cyber budgets year-over-year have increased by 59%

    See More

Related Products

See More Products
  • into to sec.jpg

    Introduction to Security, 10th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing