Finally, enterprise-wide encryption strategies increase!

HITBSecConf2019 - The 10the annual HITB Security Conference in The Netherlands - Trainings, Conference track and Haxpo exhibition. Register now.

New research by the Ponemon Institute captures how organizations around the world are dealing with compliance, increased threats, and the implementation of encryption to protect their most sensitive data.

encryption strategies increase

Enterprises have accelerated adoption of encryption strategies, with 41 percent of respondents saying their organization has an encryption strategy applied consistently across the enterprise. Notably, business unit leaders have a higher influence over encryption strategy than IT operations.

Other critical findings demonstrate organizations continue to show a preference for control over encryption and key management when those activities migrate to the cloud.

Protecting data at rest in the cloud

  • 67% of respondents take one of two routes: they either perform encryption on premise prior to sending data to the cloud, or encrypt in the cloud using keys they generate and manage on premises
  • 37% said their organizations turn over complete control of keys and encryption processes to cloud providers.

“The accelerated growth of encryption strategies in business underscores the proliferation of mega breaches and cyberattacks, as well as the need to protect a broadening range of sensitive data types. Simply put, the stakes are too high for organizations to stand by and wait for an attack to happen to them before introducing a sophisticated data protection strategy. Encryption and key management continue to play critical roles in these strategies,” said Dr Larry Ponemon, chairman and founder of The Ponemon Institute.

Differences in enterprise encryption strategies by country

encryption strategies increase

Key findings

  • 31% are currently using or planning to use Hardware Security Modules (HSMs) with Bring Your Own Key (BYOK) deployments, with 20% claiming the same for Cloud Access Security Broker (CASB) deployments. Overall, usage of HSMs with CASBs is expected to double in the next 12 months (from 12% to 24%)
  • Use of HSMs among organizations grew to its highest level ever, at 38%; of those respondents, 48% own and operate HSMs on-premise in support of cloud-based applications
  • At 55%, compliance is the top driver for encryption – followed closely by protecting enterprise intellectual property (51%), customer information protection (49%) and protection from external threats (49%).

“This year’s findings align with key trends demonstrating an increased reliance on the cloud, ever-evolving internal and external threats, and new data sources mandating stronger protection. The survey further reinforces that cloud key management offerings are more important than ever – and business-leader involvement is crucial to a sound security strategy,” said John Grimm, senior director of security strategy at Thales e-Security.