Research Report: Operationalizing Encryption and Key Management
Research Report

Apr 05, 2024
by Bill Lundell, Thiemann Todd, Enterprise Strategy Group _
The potential for serious business disruptions from breaches makes securing data critical. Ransomware, software supply chain compromise, and targeted penetration attacks are just some of the looming threats that can result in data loss, compliance violations, brand damage, and lost revenue. Additionally, ransomware actors are changing their tactics to focus on data extortion: holding exfiltrated data hostage to public exposure.

As a result, organizations are turning to encryption to maintain cyber resilience in response to a successful data breach as well as to ensure data privacy and compliance. Although organizations understand how encryption protects data, they struggle with the implementation, specifically how encryption and key management solutions balance security, usability, performance, compatibility, and costs. Further compounding these problems is quantum computing’s potential to break current encryption capabilities, representing another challenge to securing sensitive data. Vendors need to demystify and simplify encryption and key management.

To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 387 IT, cybersecurity, compliance, and DevOps professionals at organizations in North America (US and Canada) involved with encryption and data security technology and processes.
 

Page Count: 27