Is Your Cloud Security Strategy Keeping Up?

Key Insights

Key Insights from the 2025 State of Cloud
Security Report

As more organizations move to the cloud to boost agility and innovation, security is becoming a top priority. The 2025 State of Cloud Security Report (sponsored by Fortinet and produced by Cybersecurity Insiders), based on insights from 800+ IT professionals, offers a clear look at where businesses stand—and where they’re headed.

Cloud Adoption is Accelerating

  • 82% of companies now use the cloud to scale and stay resilient
  • Hybrid cloud (mix of on-prem and public cloud)
    adoption has risen to 54%
  • This flexible model supports both innovation and compliance
cloud adoption
security challenges

Security Challenges Are Growing

  • 61% cite security and compliance as top barriers
    to cloud adoption
  • Common issues include:
    • Misconfigured settings
    • Regulatory risks (e.g., HIPAA, GDPR)
    • Limited real-time threat detection
  • 76% report a shortage of cloud security expertise
  • Only 36% feel confident in their ability to detect and
    respond to threats

The Shift Toward Unified Security Platforms

  • 97% of organizations prefer centralized platforms to manage cloud security
  • Unified platforms, such as Fortinet’s FortiCNAPP, offer:
    • Visibility across environments
    • Misconfiguration alerts
    • Workload and container protection
    • Streamlined policy management
the shift
security budgets

Cloud Security Budgets Are Growing

  • Cloud security makes up 35% of overall IT security spending
  • 63% of organizations expect to increase that investment in the next year
  • Many are turning to flexible licensing models to optimize spending and scale as needed

Conclusion

As cloud adoption continues to accelerate, so do the complexities of keeping data, systems, and users secure.
The insights from the 2025 State of Cloud Security Report highlight an urgent need for organizations to rethink their strategies,
address internal skills gaps, and adopt more unified, proactive security models.