reach a new high: hsm€¦ · code signing big data encryption highest growing use cases for hsms...

1
Encryption for data protection is on the rise: 0% 10% 20% 30% 40% 50% 60% Germany US SECTORS WITH HIGHEST ENCRYPTION USAGE Communications HSM usage rates were highest in: COUNTRIES WITH HIGHEST HSM USAGE RATES TOP 8 USE CASES FOR HSMs IN 2019 THE IMPORTANCE OF HSMs TO AN ENCRYPTION OR KEY MANAGEMENT STRATEGY Retail Financial Services Financial Services Education & Research Technology & Software Technology and Software Australia COUNTRIES WITH HIGHEST ENCRYPTION USAGE Germany US India 48% 45% 36% 32% 30% 29% 28% 60% Follow nCipher Security on: TODAY 69% IN THE NEXT 12 MONTHS of organizations now have a consistent, enterprise-wide encryption strategy. HSM (HARDWARE SECURITY MODULE) USE GREW TO 14-YEAR HISTORY OF STUDY 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 Highest year-over-year growth ever (up 6% from 2018) HSM use cases are varied: Code signing Big data encryption HIGHEST GROWING USE CASES FOR HSMs FROM 2018 TO 2019 7% 20% 12% 12% 24% 22% 12% 20% IoT root of trust Document signing 2019 2018 2019 2018 2019 2018 2019 2018 of respondents want encryption solutions to support both on-premise and cloud deployment. of respondents rate the pain of encryption key management at 7 or higher on a 10 point scale. 1 = minimum impact, 10 = severe impact DATA DISCOVERY continues to be the biggest challenge in planning and executing a data encryption strategy (69% of respondents). EMPLOYEE MISTAKES are by far the most significant threat to sensitive data (54% of respondents – more than external hackers and malicious insiders combined). THE MOST IMPORTANT CLOUD ENCRYPTION FEATURES ARE: Support for the KMIP standard Granular access controls The challenges of encryption: of organizations have more than 6 products that perform encryption. POLICY ENFORCEMENT is rated as the most important feature of encryption solutions (73% of respondents rated higher than performance for the first time!) SIEM integration Overall importance of HSMs is growing: of organizations use HSMs to provide internal cryptography-as-a-service. Encryption for data security, HSMs for application protection – a proven combination that delivers trust, integrity and control. A hardware security module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys Application level encryption TLS/SSL Database encryption Public cloud encryption including for Bring Your Own Key (BYOK) Payment credential provisioning (e.g., mobile, IoT) PKI or credential management With Privileged Access Management (PAM) solutions Code signing HSMs for application protection reach a new high: Corporate data breaches are in the headlines on an almost daily basis, while business critical applications face malicious threats or are accidentally compromised by employee mistakes. Our study reveals the increased proliferation of encryption to protect data and hardware security modules (HSMs) to harden applications. CLICK TO DOWNLOAD THE FULL REPORT Employee Mistakes External Hackers Malicious Insiders 54% 54% 30% 21% 20% 2019 GLOBAL ENCRYPTION TRENDS STUDY

Upload: others

Post on 27-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: reach a new high: HSM€¦ · Code signing Big data encryption HIGHEST GROWING USE CASES FOR HSMs FROM 2018 TO 2019 7% 20% 12% 12% 24% 22% 12% 20% ... (e.g., mobile, IoT) PKI or credential

Encryption for data protection is on the rise:

0% 10% 20% 30% 40% 50% 60%

Germany

US

SECTORS WITH HIGHEST

ENCRYPTION USAGE

Communications

HSM usage rates were highest in:

COUNTRIES WITH HIGHEST HSM USAGE RATES

TOP 8 USE CASES FOR HSMs IN 2019

THE IMPORTANCE OF HSMs TO AN ENCRYPTION OR KEY MANAGEMENT STRATEGY

Retail Financial Services

Financial Services

Education & Research

Technology & Software

Technology and Software

Australia

COUNTRIES WITH HIGHEST

ENCRYPTION USAGE

GermanyUS India

48%

45%

36%

32%

30%

29%

28%

60%

Follow nCipher Security on:

TODAY

69%IN THE NEXT 12

MONTHS

of organizations now havea consistent, enterprise-wide

encryption strategy.

HSM(HARDWARE SECURITY MODULE)

USE GREW TO

14-YEAR HISTORY OF STUDY

2019

2018

2017

2016

2015

2014

2013

2012

2011

2010

2009

2008

2007

2006

Highest year-over-year growthever (up 6% from 2018)

HSM use cases are varied:

Code signing Big data encryption

HIGHEST GROWING USE CASES FOR HSMsFROM 2018 TO 2019

7%

20%

12% 12%

24%22%

12%

20%

IoT root of trust Document signing

20192018 20192018 20192018 20192018

of respondents want encryption solutions to support both on-premise and cloud deployment.

of respondents rate the pain of encryption key management at 7 or higher

on a 10 point scale. 1 = minimum impact, 10 = severe impact

DATA DISCOVERY continues to be the biggest challenge in

planning and executing a data encryption strategy (69% of respondents).

EMPLOYEE MISTAKESare by far the most significant threat to sensitive data (54% of respondents – more than external hackers and malicious insiders combined).

THE MOST IMPORTANT CLOUD ENCRYPTION FEATURES ARE:

Support for the KMIP standard Granular access controls

The challenges of encryption:

of organizations have more than 6 products that

perform encryption.

POLICY ENFORCEMENTis rated as the most important feature of encryption solutions (73% of respondents rated higher than performance for the first time!)

SIEM integration

Overall importance of HSMs is growing:

of organizations use HSMs to provide internalcryptography-as-a-service.

Encryption for data security, HSMs for application protection –a proven combination that delivers trust, integrity and control.

A hardware security module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys

Application level encryption

TLS/SSL

Database encryptionPublic cloud encryption including for Bring Your

Own Key (BYOK)Payment credential provisioning (e.g., mobile, IoT)

PKI or credential management

With Privileged Access Management (PAM)solutions

Code signing

HSMs for application protection reach a new high:

Corporate data breaches are in the headlines on an almost daily basis, while business critical

applications face malicious threats or are accidentally compromised by employee mistakes.

Our study reveals the increased proliferation of encryption to protect data and hardware

security modules (HSMs) to harden applications.

CLICK TO DOWNLOAD THE FULL REPORT

Employee Mistakes

External Hackers

MaliciousInsiders

54%54% 30% 21%

20%

2019

GLOBAL ENCRYPTION TRENDS STUDY