Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Encryption Finally Gaining Widespread Enterprise Adoption

    Written by

    Chris Preimesberger
    Published July 12, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      For a long time, encryption was like drinking prune juice or taking castor oil for employees in an enterprise—they only used it when they absolutely had to.

      No so anymore. Encryption for data storage and email security is now almost mainstream within enterprises, largely because: a) internal and cyber-security issues are at an all-time high; and b) security companies have been working hard to make encryption and key management easier to use.

      New evidence of this trend comes from cybersecurity software maker Thales e-Security, which recently revealed the findings of its 2016 Encryption Application Trends Study.

      The report, released June 28 and based on independent research by the Ponemon Institute, notes the biggest users of encryption are companies in financial services, health care and pharmaceutical and technology and software industries. Because highly regulated financial and personal healthcare data is so sensitive in nature, it is logical they would be leading the way in using encryption.

      However, the key takeway in the study is this: Companies across the board reported that extensive use of encryption jumped a full 7 percent to a total of 41 percent, the largest increase in the 11-year history of this report.

      Trends: More and Better Encryption and Key Management, Trust in Cloud

      The Thales-Ponemon study takes in a good sampling. It is part of an annual survey of more than 5,000 individuals covering 14 major industry sectors and 11 countries; it focuses on how encryption is being used in conjunction with business applications to protect data and allows companies to benchmark their use of encryption against companies in similar industry sectors and geographies.

      “This report primarily shows clear trends toward more and better encryption, easier and more efficient key management, and more organizations moving more aggressively to the cloud,” Peter Galvin, vice president of strategy at Thales, told eWEEK.

      This matches up with what eWEEK has been seeing in the security space for a couple of years.

      “The increased usage of encryption can be traced to many factors, chief among them being cyber-attacks, privacy compliance regulations and consumer concerns,” said John Grimm, senior director of security strategy at Thales. “The continuing rise of cloud computing as well as prominent news stories related to encryption and access to associated keys have caused organizations to evolve their strategy with respect to encryption key control and data residency.

      “Our global research shows that significantly more companies are embracing an enterprisewide encryption strategy, and demanding higher levels of performance, cloud-friendliness and key management capabilities from their encryption applications,” he said.

      Key Takeaways from Survey

      Here are the key data points from the survey:

      — Companies reporting extensive use of encryption jumped 7 percent up to a total of 41 percent, the largest increase in the 11-year history of this report.

      — Performance and latency are now considered the most critical features of encryption applications, reflecting increased encryption adoption and the need to assure IT managers it does not interfere with business operations.

      — Support for both cloud and on-premise deployment ascended to the second most important feature of encryption applications, reflecting the increased move to the cloud and requirements for cryptographic services that span seamlessly from the enterprise to the cloud.

      — Databases, internet communications (SSL/TLS) and laptop hard drives consistently top the list of areas where encryption is most frequently used.

      — Companies that are more mature with respect to their encryption strategy are more likely to deploy hardware security modules (HSMs) across a wide array of encryption applications. HSMs are most frequently used in conjunction with SSL/TLS, database encryption and application-level encryption.

      — For cloud data protection, financial services companies apply encryption to data at rest and exert sole organizational control over encryption keys at rates that significantly exceed averages across all industries.

      Steady Increase in Encryption Usage for 11 Years

      “In the 11 years the core survey has been conducted, there has been a steady increase in the use of encryption technology, with the highest increase ever in this year’s results,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute.

      “Along with that increase we’ve seen the rise of new challenges in the areas of encryption key management, data discovery and cloud-based data storage. The findings of this study demonstrate the importance of both encryption and key management across a wide range of industries and core enterprise applications—from networking, databases and application-level encryption to PKI, payments and public and private cloud computing.”

      You can download a free copy of the report here.

      Chris Preimesberger
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Linkedin Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×