+ All Categories
Home > Documents > MIDDLE EAST ENCRYPTION TRENDS STUDY · Encryption for data protection is on the rise: ... TOP 9 USE...

MIDDLE EAST ENCRYPTION TRENDS STUDY · Encryption for data protection is on the rise: ... TOP 9 USE...

Date post: 05-Jun-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
1
Encryption for data protection is on the rise: 0% 10% 20% 30% 40% 50% 60% TOP 9 USE CASES FOR HSMs IN 2019 THE IMPORTANCE OF HSMs TO AN ENCRYPTION OR KEY MANAGEMENT STRATEGY 43% 40% 35% 30% 26% 26% 26% 25% 24% 52% Follow nCipher Security on: TODAY 70% IN THE NEXT 12 MONTHS of organizations now have a consistent, enterprise-wide encryption strategy. HSM (HARDWARE SECURITY MODULE) USE GREW TO HSM use cases are varied: Code signing Payment credential provisioning HIGHEST GROWING USE CASES FOR HSMs FROM 2018 TO 2019 18% 20% 26% 26% 19% 24% IoT root of trust Payment credential issuing 2019 2018 2019 2018 2019 2018 of respondents want encryption solutions to support both on-premise and cloud deployment. of respondents rate the pain of encryption key management at 7 or higher on a 10 point scale. 1 = minimum impact, 10 = severe impact DATA DISCOVERY continues to be the biggest challenge in planning and executing a data encryption strategy (58% of respondents). EMPLOYEE MISTAKES are by far the most significant threat to sensitive data (67% of respondents – more than external hackers and malicious insiders combined). THE MOST IMPORTANT CLOUD ENCRYPTION FEATURES ARE: Support for the KMIP standard Granular access controls The challenges of encryption: of organizations have more than 6 products that perform encryption. SIEM integration Overall importance of HSMs is growing: of organizations use HSMs to provide internal cryptography-as-a-service. Encryption for data security, HSMs for application protection – a proven combination that delivers trust, integrity and control. A hardware security module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys Application level encryption Public cloud encryption including for Bring Your Own Key (BYOK) With Privileged Access Management (PAM) solutions Database encryption With Cloud Access Security Brokers for enterprise key management Payment credential provisioning (e.g., mobile, IoT) IoT root of trust Code signing Blockchain applications HSMs for application protection reach a new high: Corporate data breaches are in the headlines on an almost daily basis, while business critical applications face malicious threats or are accidentally compromised by employee mistakes. Our study of 340 IT security professionals in Saudi Arabia and the United Arab Emirates reveals the increased proliferation of encryption to protect data and hardware security modules (HSMs) to harden applications. CLICK TO DOWNLOAD THE FULL REPORT Employee Mistakes External Hackers Malicious Insiders 54% 67% 25% 16% 2019 MIDDLE EAST ENCRYPTION TRENDS STUDY 2017 2018 2019 30% 34% 36% ENCRYPTION IS GROWING IN EMERGING USE CASES of respondents use encryption for Docker containers, up from 29% last year and highest of any region Encryption for IoT devices grew from 23% last year to 31% this year 2018 2019 31% 23% Encryption for IoT devices 85% 62% 62% BYOK management support 52% TOP REASONS TO ENCRYPT DATA •To protect enterprise intellectual property: 74% (highest of any region) •To protect customer personal information: 66% •To protect against specific, identified threats: 42% 2016 2019 2018 2017 50 % 28 % 34 % 30 % 25% 2019 2018 5% Highest growth across any region
Transcript
Page 1: MIDDLE EAST ENCRYPTION TRENDS STUDY · Encryption for data protection is on the rise: ... TOP 9 USE CASES FOR HSMs IN 2019 ... MIDDLE EAST ENCRYPTION TRENDS STUDY 2017 2018 2019 30%

Encryption for data protection is on the rise:

0% 10% 20% 30% 40% 50% 60%

TOP 9 USE CASES FOR HSMs IN 2019

THE IMPORTANCE OF HSMs TO AN ENCRYPTION OR KEY MANAGEMENT STRATEGY

43%

40%

35%

30%

26%

26%

26%

25%

24%

52%

Follow nCipher Security on:

TODAY

70%IN THE NEXT 12

MONTHS

of organizations now havea consistent, enterprise-wide

encryption strategy.

HSM(HARDWARE SECURITY MODULE)

USE GREW TO

HSM use cases are varied:

Code signing Payment credential provisioning

HIGHEST GROWING USE CASES FOR HSMsFROM 2018 TO 2019

18%20%

26% 26%

19%24%

IoT root of trust Payment credential issuing

20192018 20192018 20192018

of respondents want encryption solutions to support both on-premise and cloud deployment.

of respondents rate the pain of encryption key management at 7 or higher

on a 10 point scale. 1 = minimum impact, 10 = severe impact

DATA DISCOVERY continues to be the biggest challenge in

planning and executing a data encryption strategy (58% of respondents).

EMPLOYEE MISTAKESare by far the most significant threat to sensitive data (67% of respondents – more than external hackers and malicious insiders combined).

THE MOST IMPORTANT CLOUD ENCRYPTION FEATURES ARE:

Support for the KMIP standard Granular access controls

The challenges of encryption:

of organizations have more than 6 products that

perform encryption.

SIEM integration

Overall importance of HSMs is growing:

of organizations use HSMs to provide internalcryptography-as-a-service.

Encryption for data security, HSMs for application protection –a proven combination that delivers trust, integrity and control.

A hardware security module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys

Application level encryptionPublic cloud encryption including for

Bring Your Own Key (BYOK)With Privileged Access Management (PAM) solutions

Database encryptionWith Cloud Access Security Brokers for

enterprise key managementPayment credential provisioning (e.g., mobile, IoT)

IoT root of trust

Code signing

Blockchain applications

HSMs for application protection reach a new high:

Corporate data breaches are in the headlines on an almost daily basis, while business critical

applications face malicious threats or are accidentally compromised by employee mistakes.

Our study of 340 IT security professionals in Saudi Arabia and the United Arab Emirates

reveals the increased proliferation of encryption to protect data and hardware security

modules (HSMs) to harden applications.

CLICK TO DOWNLOAD THE FULL REPORT

Employee Mistakes

External Hackers

MaliciousInsiders

54%67% 25% 16%

2019

MIDDLE EAST ENCRYPTION TRENDS STUDY

2017 2018 2019

30%34% 36%

ENCRYPTION IS GROWING IN EMERGING USE CASES

of respondents use encryption for Docker

containers, up from 29% last year and highest

of any region

Encryption for IoT devices grew from 23% last year

to 31% this year

2018 2019

31%23%

Encryption for IoT devices

85% 62% 62%BYOK management support

52%

TOP REASONS TO ENCRYPT DATA•To protect enterprise intellectual property: 74% (highest of any region)•To protect customer personal information: 66%•To protect against specific, identified threats: 42%

2016 201920182017

50%

28%34%

30%

25%

20192018

5%

Highest growth across any region

Recommended