reach a new high: hsm€¦ · code signing big data encryption highest growing use cases for hsms...
TRANSCRIPT
Encryption for data protection is on the rise:
0% 10% 20% 30% 40% 50% 60%
Germany
US
SECTORS WITH HIGHEST
ENCRYPTION USAGE
Communications
HSM usage rates were highest in:
COUNTRIES WITH HIGHEST HSM USAGE RATES
TOP 8 USE CASES FOR HSMs IN 2019
THE IMPORTANCE OF HSMs TO AN ENCRYPTION OR KEY MANAGEMENT STRATEGY
Retail Financial Services
Financial Services
Education & Research
Technology & Software
Technology and Software
Australia
COUNTRIES WITH HIGHEST
ENCRYPTION USAGE
GermanyUS India
48%
45%
36%
32%
30%
29%
28%
60%
Follow nCipher Security on:
TODAY
69%IN THE NEXT 12
MONTHS
of organizations now havea consistent, enterprise-wide
encryption strategy.
HSM(HARDWARE SECURITY MODULE)
USE GREW TO
14-YEAR HISTORY OF STUDY
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
Highest year-over-year growthever (up 6% from 2018)
HSM use cases are varied:
Code signing Big data encryption
HIGHEST GROWING USE CASES FOR HSMsFROM 2018 TO 2019
7%
20%
12% 12%
24%22%
12%
20%
IoT root of trust Document signing
20192018 20192018 20192018 20192018
of respondents want encryption solutions to support both on-premise and cloud deployment.
of respondents rate the pain of encryption key management at 7 or higher
on a 10 point scale. 1 = minimum impact, 10 = severe impact
DATA DISCOVERY continues to be the biggest challenge in
planning and executing a data encryption strategy (69% of respondents).
EMPLOYEE MISTAKESare by far the most significant threat to sensitive data (54% of respondents – more than external hackers and malicious insiders combined).
THE MOST IMPORTANT CLOUD ENCRYPTION FEATURES ARE:
Support for the KMIP standard Granular access controls
The challenges of encryption:
of organizations have more than 6 products that
perform encryption.
POLICY ENFORCEMENTis rated as the most important feature of encryption solutions (73% of respondents rated higher than performance for the first time!)
SIEM integration
Overall importance of HSMs is growing:
of organizations use HSMs to provide internalcryptography-as-a-service.
Encryption for data security, HSMs for application protection –a proven combination that delivers trust, integrity and control.
A hardware security module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys
Application level encryption
TLS/SSL
Database encryptionPublic cloud encryption including for Bring Your
Own Key (BYOK)Payment credential provisioning (e.g., mobile, IoT)
PKI or credential management
With Privileged Access Management (PAM)solutions
Code signing
HSMs for application protection reach a new high:
Corporate data breaches are in the headlines on an almost daily basis, while business critical
applications face malicious threats or are accidentally compromised by employee mistakes.
Our study reveals the increased proliferation of encryption to protect data and hardware
security modules (HSMs) to harden applications.
CLICK TO DOWNLOAD THE FULL REPORT
Employee Mistakes
External Hackers
MaliciousInsiders
54%54% 30% 21%
20%
2019
GLOBAL ENCRYPTION TRENDS STUDY