Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Encryption and Key Management trend survey results

Thales E-security : 22 April, 2015  (Technical Article)
Thales and the Ponemon Institute have completed their study on global encryption trends and the use of key management
Encryption and Key Management trend survey results

Thales announces the publication of its latest 2015 Global Encryption and Key Management Trends Study. The report, based on independent research by the Ponemon Institute and sponsored by Thales, reveals that the use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber-attacks and yet there are still major challenges in managing key across what are the mostly fragmented and tactical deployments of encryption technologies.

More than 4,700 business and IT managers were surveyed in the US, UK, Germany, France, Australia, Japan, Brazil, Russia and for the first time India and Mexico, examining global encryption trends and regional differences in encryption usage. The report is now in its tenth year since its launch in 2005.

Findings from the report include:

* Use of encryption continues to rise with 34% of respondents reporting that their organization uses encryption extensively
* Deployment of encryption is steadily shifting from a tactical to a strategic activity with 36% of organizations having an enterprise wide encryption strategy
* The top three reasons for deploying encryption are compliance with data protection mandates, to address specific security threats and to reduce the scope of compliance audits
* The use of encryption had a dramatic effect on the perceived requirement to notify those effected in the event of a data breach with nearly half of respondents believing that the use of encryption removed the need to disclose a breach
* The number one perceived threat to sensitive data is employee mistakes rather than external attack
* Despite cloud and big data getting all the hype, these are the least likely areas to use encryption – whereas backend storage, archives and databases are the most likely
* The biggest challenge faced by organizations executing a data encryption policy was in discovering where within their networks their sensitive data actually resides
* Key management is identified as a major pain point by more than half of respondents
* The primary reasons why key management is so painful are lack of corporate ownership, fragmented systems and inadequate tools
* More than half of respondents view hardware security modules (HSMs) as an important part of a key management strategy

Dr Larry Ponemon, chairman and founder of The Ponemon Institute, says: “Encryption usage continues to be a clear indicator of a strong security posture but there appears to be emerging evidence that concerns over key management are becoming a barrier to its more widespread adoption. In this study we drilled down into the issue of key management and found it continues to be a huge operational challenge. What is clear is that many organizations lack formal ownership and accountability when it comes to key management which is very concerning when you consider the value of the data being protected and operational implications of losing or mismanaging keys.”

Richard Moulds, vice president strategy at Thales e-Security says: “Whilst key management is now being recognized as a widespread organizational challenge, it is not a new issue. The challenges associated with key management have been addressed in heavily regulated industries such as payments processing, where best practices are well proven and could translate easily to a variety of other verticals. With more than 40 years’ experience providing key management solutions, Thales is ideally positioned to help organizations re-assess and re-evaluate their crypto security and key management infrastructure and deliver solutions that ensure their integrity and trustworthiness.”

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo