10
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security GLOBAL EDITION

Trends in Encryption and Data Security THALES DATA THREAT REPORT. Trends in Encryption and Data Security. ... Encryption tools top the plan for data security related spending to …

Embed Size (px)

Citation preview

www.thales-esecurity.com

2018 THALES DATA THREAT REPORT

Trends in Encryption and Data Security

GLOBAL EDITION

2018 THALES DATA THREAT REPORTNOW IN ITS SIXTH YEAR

1,200+ SENIOR IT SECURITY EXECUTIVES SURVEYED GLOBALLY | 500 U.S. TOTAL

Copyright 2018 Thales

U.S.U.K.

GERMANY

JAPAN

INDIA

SWEDENNETHERLANDS

KOREA

IT’S 2018 - CHANGE HOW YOU PROTECT YOUR DATA.OR BE BREACHED. AGAIN.

67%breached globally

71%breached in the US

BREACHED IN THE LAST YEAR

Global Breaches US Breaches

2018

2017

2016

breachedboth in thelast yearandpreviously

Up from

11% last year

15%

BREACHED EVER

36% 46%

26% 24%

21% 20%

BREACHED …. AGAIN!

DIGITAL TRANSFORMATION WITHOUT DATA SECURITYIT’S LIKE DRIVING OFF A CLIFF!

HEADLONG ADOPTION COMPOUNDS THE PROBLEM

94% use digital transformation technologies with sensitive data(cloud, big data, IoT, containers, blockchain and mobile payments)

42% use more than 50 SaaS applications

99%use Big

Data

94%implement

IoT

91%working on or

usingmobile payments

53% use3 or more PaaS environments

57% use3 or more IaaS vendors

GROUNDHOG DAY: TIMES HAVE CHANGEDSECURITY STRATEGIES HAVE NOT

IT Security pros know data at rest security is most effective at protecting sensitive information–but aren’t prioritizing increased spending

Rated Effective Spending Increase

Endpoint & mobileAnalysis & correlation

Data at rest Data in motionNetwork

74%50%

64%57%

77%40%

75%48%

75%48%

DEPLOYING TO THE CLOUDDATA SECURITY REQUIRED

Top Cloud Security Concerns(rates of very/extremely concerned)

64%

62%58%

58%57%

54%

Attacks at the Service Provider

Lack of control over location of data

Security of my organization’sdata in the cloud

Managing Encryption Keys acrossmultiple cloud environments

Custodianship of encryption keysMeeting compliance requirements

Encryption The top IT security control needed to expand cloud adoption

44% 42% 41%34%

Encryption of Detailed ITcloud data with and Physical

Enterprise premises key management and storage

Security information

Encryption ofcloud data

with CSP key management and storage

HSMs on premises or in

the cloud

What are enterprises doing about the problem today?

Implementing CASB

46%

Enabling encryption

services offeredby the CSP

51%

Deploying orusing a BYOK

solution

40%

EVERYBODY IS USING BIG DATASENSITIVE DATA USE COMPOUNDS PROBLEMS

99% of enterprises now use big data

45% are using sensitive datawithin big data environments today

Top concerns for sensitive data within big data environments

Data may be anywhere

Security of reports

Privacy Violations

Lack of native security frameworks

Privileged user access

34%

33%

30%

27%

What’s needed to speedBig Data adoption?

36%35%

32% 31%

Improved System levelmonitoring and encryption

reporting and accesscontrols

Encryption ofdata thatenablesanalysis

Compliance certifications

Stronger userauthentication

38%

30%

MOBILE PAYMENTS ON THE RISEENCYRPTION REQUIRED

91% Using or planning to use mobile payments

37% are using sensitive data with mobile applications

Encryption a key tool enablingsafe use of mobile payments

Encryption establishes secureidentity with digital birthcertificates for devices

Encryption protectsdata-in-transit

Encryption protects dataon devices

Encryption and access controls help organizations meetcompliance requirements forback end data stores

already in production

41% 24%

In pilot or testing

26%

evaluating

Top concerns with mobile payments41% 39% 37% 36% 35%

PII data Payment cardinformation

W eakauthentication

Fraudsters – newaccount fraud

Fraudsters –account takeover

ENCRYPTION – A KEYSTONE TECHNOLOGYFOR PROTECTING DATA

Privacy Requirements: Encryption the top tool needed to meet newPrivacy requirements like GDPR

44%

35%

38%

48%

41%

Cloud: The top tool for more cloud use

Secure Identity needed to drive Big Data Adoption

Big Data: Encryption needed to drive Big Data Adoption

IoT: Encryption the top tool to increase ability to use IoT

Containers: Encryption drives Container usage

42%

Encryption tools top the plan for data security related spending to be purchased in the next year

Global tools US tools

45%43%

42%

Tokenization

Encryption with BYOK

Hardware Security Modules

44%43%

41%

Encryption needed to drive the adoption of the technologies needed for digital transformation

www.thales-esecurity.com

2017 THALES DATA THREAT REPORT

Trends in Encryption and Data Security

GLOBAL EDITION