Encryption for data protection is on the rise:
0% 10% 20% 30% 40% 50% 60%
TOP 9 USE CASES FOR HSMs IN 2019
THE IMPORTANCE OF HSMs TO AN ENCRYPTION OR KEY MANAGEMENT STRATEGY
43%
40%
35%
30%
26%
26%
26%
25%
24%
52%
Follow nCipher Security on:
TODAY
70%IN THE NEXT 12
MONTHS
of organizations now havea consistent, enterprise-wide
encryption strategy.
HSM(HARDWARE SECURITY MODULE)
USE GREW TO
HSM use cases are varied:
Code signing Payment credential provisioning
HIGHEST GROWING USE CASES FOR HSMsFROM 2018 TO 2019
18%20%
26% 26%
19%24%
IoT root of trust Payment credential issuing
20192018 20192018 20192018
of respondents want encryption solutions to support both on-premise and cloud deployment.
of respondents rate the pain of encryption key management at 7 or higher
on a 10 point scale. 1 = minimum impact, 10 = severe impact
DATA DISCOVERY continues to be the biggest challenge in
planning and executing a data encryption strategy (58% of respondents).
EMPLOYEE MISTAKESare by far the most significant threat to sensitive data (67% of respondents – more than external hackers and malicious insiders combined).
THE MOST IMPORTANT CLOUD ENCRYPTION FEATURES ARE:
Support for the KMIP standard Granular access controls
The challenges of encryption:
of organizations have more than 6 products that
perform encryption.
SIEM integration
Overall importance of HSMs is growing:
of organizations use HSMs to provide internalcryptography-as-a-service.
Encryption for data security, HSMs for application protection –a proven combination that delivers trust, integrity and control.
A hardware security module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys
Application level encryptionPublic cloud encryption including for
Bring Your Own Key (BYOK)With Privileged Access Management (PAM) solutions
Database encryptionWith Cloud Access Security Brokers for
enterprise key managementPayment credential provisioning (e.g., mobile, IoT)
IoT root of trust
Code signing
Blockchain applications
HSMs for application protection reach a new high:
Corporate data breaches are in the headlines on an almost daily basis, while business critical
applications face malicious threats or are accidentally compromised by employee mistakes.
Our study of 340 IT security professionals in Saudi Arabia and the United Arab Emirates
reveals the increased proliferation of encryption to protect data and hardware security
modules (HSMs) to harden applications.
CLICK TO DOWNLOAD THE FULL REPORT
Employee Mistakes
External Hackers
MaliciousInsiders
54%67% 25% 16%
2019
MIDDLE EAST ENCRYPTION TRENDS STUDY
2017 2018 2019
30%34% 36%
ENCRYPTION IS GROWING IN EMERGING USE CASES
of respondents use encryption for Docker
containers, up from 29% last year and highest
of any region
Encryption for IoT devices grew from 23% last year
to 31% this year
2018 2019
31%23%
Encryption for IoT devices
85% 62% 62%BYOK management support
52%
TOP REASONS TO ENCRYPT DATA•To protect enterprise intellectual property: 74% (highest of any region)•To protect customer personal information: 66%•To protect against specific, identified threats: 42%
2016 201920182017
50%
28%34%
30%
25%
20192018
5%
Highest growth across any region