global encryption trends study 2016 infographic
TRANSCRIPT
GLOBAL ENCRYPTION AND KEY MANAGEMENT
2016
Breaches and cyber attacks have increased companies’ urgency to improve their security posture and this is reflected in this year’s findings
as more companies embrace an enterprise-wide encryption strategy.
KEY FINDINGS
THREATS
Encryption strategies increase37% of respondents say that their organization has an encryption strategy applied consistently across the entire enterprise.
Discovering where sensitive data resides
Initially deployingencryption technology
Classifying what data to encrypt
Germany
USA
Japan
HIGHEST
LOWEST
Australia
Mexico
26%
26%
System or processmalfunction
The most significant threats
to sensitive data are:
Which data ismost commonly
encrypted?
What are the main drivers for using encryptiontechnology solutions?
37%
57%
49%
35%
30%
55%Payment
related data
Financial services 56%
Health & pharma49%
Services48%
2016
15%Across entire
enterprise2005
ENCRYPTION
What industriesuse encryption?
Adoption differences in enterpriseencryption strategies by country
61%
45%
40%
Support for both cloud and on-premise deployment has risenin importance as organizations have increasingly embraced cloud computing and look for consistency across computing styles.
56% of organizations transfersensitive data to the cloud whether
or not it is encrypted or made unreadable via some other mechanism such as tokenization or data masking.
Is data at rest in the cloud protected by encryption?
56%
Top 3 countries that transfersensitive data to the cloud:
39% 44%
NO YES
KEY MANAGEMENT
FOLLOW US ON:
German, US and UK organizations are more likely to deploy HSMs
Perceived importance of HSMs as partof key management over four years
The pain and risk level associated with Key Management in all countries was reported at 53%, with Arabia as the
highest threshold 62% and the lowest reported by Russia 43%.
53%
No clearownership
Lack of skilledpersonnel
Systems areisolated andfragmented
What makes keymanagement painful?
57% 49% 47%
54% 45% 37%
63% 60% 59%
Thales e-Security Inc. 900 South Pine Island RoadSuite 710Plantation, FL 33324 USAPrivacy Policy
Consider the environment before printing this mail.
Thales UK Limited is incorporated in England and Wales with company registration number 00868273. Its registered office is located at 2 Dashwood Lang Road, The Bourne Business Park, Addlestone, Nr. Weybridge, Surrey KT15 2NX.
The information contained in this e-mail is confidential. It may also be privileged. It is intended only for the stated addressee(s) and access to it by any other person is unauthorised. If you are not an addressee or the intended addressee, you must not disclose, copy, circulate or in any other way use or rely on the information contained in this e-mail. Such unauthorised use may be unlawful. If you have received this e-mail in error, please inform us immediately on +44 (0)1844 201800 and delete it and all copies from your system. Commercial matters detailed or referred to in this e-mail are subject to a written contract signed for and on behalf of Thales UK Limited.
Hackers
28%Employeemistakes
52%
49%Intellectualproperty
62%Employee/HR
data
DOWNLOAD THEFULL STUDY
To comply with external privacy or datasecurity regulations and requirements
To protect information against specific,identified threats
To protect enterprise intellectual property
To protect customer personal information
61%
50%
49%
47%
FY12 FY13 FY14 FY15
33%39%
48% 49%
What is the biggest challengeto encryption deployment?