Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected
Acer America
Acer America Corp. is a computer manufacturer of business and consumer PCs, notebooks, ultrabooks, projectors, servers, and storage products.

Location

333 West San Carlos Street
San Jose, California 95110
United States

WWW: acer.com

ChannelPro Network Awards

hello 2
hello 3

Press Releases

April 6, 2018 |

Multi-cloud use and compliance requirements shape encryption strategy, finds latest Thales Global Encryption Study

Encryption with public cloud services experienced double digit growth

Thales, a leader in critical information systems, cybersecurity and data security, announces the results of its†2018 Global Encryption Trends Study. The report, based on independent research by the Ponemon Institute and sponsored by Thales, reflects some of the changes and challenges organizations are experiencing in a world marked by widespread cloud deployments, use of multiple public cloud providers and new regulations such as the EU General Data Protection Regulation (GDPR).

This year, 43% of respondents report that their organization has an encryption strategy applied consistently across their enterprise. This strategy is leveraged to protect sensitive data against cyber criminals, help organizations address complex compliance requirements, and guard against human error. Encryption, which is achieved with software or hardware tools such as hardware security modules (HSMs), is often coupled with best practice-based key management. Encryption is also playing an increasingly large role in protecting the enormous adoption of organizations deploying to the cloud.

Among the findings:

  • 84% of respondents either use the cloud for sensitive/non-sensitive applications and data today, or will do so in the next 12-24 months
  • 61% of respondents are using more than one public cloud provider, and 71% plan to in the next two years
  • 39% encrypt in public cloud services (such as Amazon Web Services, Microsoft Azure and Google Cloud), a number that has risen 11% since last year’s report
  • Overall HSM use grew to 41% — the highest level ever. The most common use cases for HSMs are SSL/TLS and application level encryption, with 20% of respondents reporting that they use HSMs with blockchain applications
  • 49% of enterprises are either partially or extensively deploying encryption of IoT data on IoT devices and platforms

This year’s statistics are encouraging, but the report does show areas of challenge. Data discovery rates as the top data encryption planning/execution challenge by 67% of respondents, a number that is 8% higher than 2017. Respondents from the UK,†Germany, the US and†France†have the most challenges, which likely points to activities associated with preparation and compliance of data privacy regulations such as GDPR which comes into effect in May this year.

When considering the majority of organizations polled are using more than one public cloud provider, the report also raises questions about how organizations are enforcing consistent encryption and key management policies across multiple cloud vendors. Securing data in a multi-cloud environment can be especially problematic for organizations seeking compliance, particularly if they are attempting to instantiate a single organizational policy using different native tools from multiple cloud providers. Not surprisingly, policy enforcement is second only to performance as a most valued feature of encryption solutions in this year’s study.

Dr.†Larry Ponemon, chairman, and founder of The Ponemon Institute, says:
“While enterprises are rightfully encrypting cloud-based data, 42% of organizations indicate they will only use keys for cloud-based data-at-rest encryption that they control themselves. Similarly, organizations that use HSMs in conjunction with public cloud-based applications prefer to own and operate those HSMs on-premises. These findings tell us control over the cloud is highly important to companies increasingly under pressure from data security threats and compliance requirements.”

John Grimm, senior director of security strategy at Thales eSecurity, says:†
“Companies navigating today’s threat landscape are understandably seeking out fast, scalable encryption tools that encompass enterprise and cloud use cases, and enforce policy consistently across both models. Fortunately, enterprises have more data protection choices today than when the race to the cloud began. These options include bring your own key (BYOK) and bring your own encryption (BYOE) solutions, which allow enterprises to apply the same encryption and key management solution across multiple platforms.”

The Global Encryption Trends Study is now in its thirteenth year. The Ponemon Institute surveyed more than 5,000 people across multiple industry sectors in†the United States,†United Kingdom,†Germany,†France,†Australia,†Japan,†Brazil, the†Russian Federation,†Mexico,†India,†Saudi Arabia, the†United Arab Emirates, and Korea.


Editor’s Choice

Broadcom-VMware Shakeout: How the Channel Has Been Affected By the Big Industry Acquisition

April 11, 2024 |

Industry experts weigh in on the “messy breakup” that MSPs were left with after Broadcom’s acquisition of VMWare.

Selling Cybersecurity: How MSPs Can Become Crucial Partners in Managing Risk

March 27, 2024 | David Powell

MSPs should try to bring an end customer into the cybersecurity fold. Here are some ways to help drive that.

3 Questions with Ingram Micro’s Sanjib Sahoo on Integrating AI into Managed Services

March 25, 2024 |

Ingram Micro’s EVP and chief digital officer shares some insights on how MSPs can effectively integrate artificial intelligence into their business operations.


Related News

Growing the MSP

Explore ChannelPro

Events

Reach Our Audience