Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 26 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Cloud adoption and escalating threats accelerate encryption deployments, finds latest Thales Global Encryption Study

by The Gurus
April 13, 2017
in Editor's News
safe
Share on FacebookShare on Twitter

Thales, a leader in critical information systems, cybersecurity and data security, announces the results of its 2017 Global Encryption Trends Study. The report, based on independent research by the Ponemon Institute and sponsored by Thales, captures how organizations around the world are dealing with compliance, increased threats, and the implementation of encryption to protect their most sensitive data.
The report reveals enterprises have accelerated adoption of encryption strategies, with 41 percent of respondents saying their organization has an encryption strategy applied consistently across the enterprise. Notably, for the first time in the study’s 12-year history, business unit leaders have a higher influence over encryption strategy than IT operations. Other critical findings demonstrate organizations continue to show a preference for control over encryption and key management when those activities migrate to the cloud.
Protecting data at rest in the cloud:

  • 67% of respondents take one of two routes: they either perform encryption on premise prior to sending data to the cloud, or encrypt in the cloud using keys they generate and manage on premises
  • 37% said their organizations turn over complete control of keys and encryption processes to cloud providers

 Other key findings:

  • 31% are currently using or planning to use Hardware Security Modules (HSMs) with Bring Your Own Key (BYOK) deployments, with 20% claiming the same for Cloud Access Security Broker (CASB) deployments. Overall, usage of HSMs with CASBs is expected to double in the next 12 months (from 12% to 24%)
  • Use of HSMs among organizations grew to its highest level ever, at 38%; of those respondents, 48% own and operate HSMs on-premise in support of cloud-based applications
  • At 55%, compliance is the top driver for encryption – followed closely by protecting enterprise intellectual property (51%), customer information protection (49%) and protection from external threats (49%)

 Dr Larry Ponemon, chairman and founder of The Ponemon Institute, says:
“The accelerated growth of encryption strategies in business underscores the proliferation of mega breaches and cyberattacks, as well as the need to protect a broadening range of sensitive data types. Simply put, the stakes are too high for organizations to stand by and wait for an attack to happen to them before introducing a sophisticated data protection strategy. Encryption and key management continue to play critical roles in these strategies.”
John Grimm, senior director of security strategy at Thales e-Security, says:
“This year’s findings align with key trends demonstrating an increased reliance on the cloud, ever-evolving internal and external threats, and new data sources mandating stronger protection. The survey further reinforces that cloud key management offerings are more important than ever – and business-leader involvement is crucial to a sound security strategy. Thales is attuned to this development, and to its customers’ need for strong and flexible safeguards for the cloud. Recently, for example, we announced integrations with AWS, Google, Microsoft and Salesforce cloud platforms. Our support encompasses BYOK, key management as a service (KMaaS) and RESTful API use cases, with additional collaborations on the way.”
The Global Encryption Trends Study is now in its twelfth year. The Ponemon Institute surveyed more than 5,000 people across multiple industry sectors in the United States, United Kingdom, Germany, France, Australia, Japan, Brazil, the Russian Federation, Mexico, India, Saudi Arabia and the United Arab Emirates.
The new 2017 Global Encryption Trends Study can be downloaded for free at: https://gets.thalesesecurity.com

FacebookTweetLinkedIn
Tags: CloudCybersecuritytTechnologyThreats
ShareTweet
Previous Post

US, Europe Partner to Counter 'Fake News' and Cyberattacks

Next Post

Report 2017: Hybrid IT Organisations Experience Cost-Efficiencies and Scalability, but Still Struggle with IT Professional Skills Gap, Visibility, and Security Concerns

Recent News

CREST and IASME announce partnership with the NCSC to deliver Cyber Incident Exercising scheme

September 26, 2023
partnership

Cyberelements Partners with ABC Distribution Partners to Revolutionise Privileged Access Management in Europe

September 26, 2023
Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

September 25, 2023
Nurturing Our Cyber Talent

Nurturing Our Cyber Talent

September 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information