Thales | Security for What Matters Most
More About This Author >
Thales | Security for What Matters Most
More About This Author >
Multi-cloud data security threats are escalating at an unprecedented rate. According to Forrester and the 2025 Thales Global Cloud Data Security Study, the primary drivers of multi-cloud risks are: growing complexity, insufficient access controls, and the rapid rise of AI. As organizations expand across multiple cloud platforms, they face growing challenges related to shadow data, regulatory compliance, and inconsistent access controls in disparate clouds.
Collectively, these challenges create a significant data security vulnerability. Nearly 89% of organizations struggle for clarity about what data exists, where, and how to safeguard it. AI further exacerbates vulnerabilities by expanding data creation, access, and usage, rendering many traditional data security tools inadequate. As a result, multi-cloud data security has become a Board of Directors’ priority.
In a recent webinar, guest speaker Heidi Shey, Principal Analyst, Forrester, and Todd Moore, Global VP/GM of Data Security Products, Thales, discussed critical data security strategies, focusing on the role of Data Security Posture Management (DSPM) in tracking and protecting data throughout its lifecycle. They answered the five most pressing questions and highlighted the essential need for automated, centralized security approaches for addressing the visibility and compliance challenges inherent in complex hybrid, and multi-cloud environments.
Limited visibility remains one of the most persistent challenges in multi-cloud environments. Siloed cloud platforms, each with its own cloud-native data tools, restrict an organization’s ability to gain a comprehensive understanding of its data landscape. Without unified visibility, classification, and protection and enforcement controls, sensitive data becomes increasingly difficult to manage at scale.
The most fundamental question organizations need to answer is: “What data needs to be protected?” Regulated data, such as PII and PCI, requires protection. Beyond that, intellectual property, sensitive corporate information, and organizational secrets that may be embedded in code also need to be secured. All data must be protected throughout its entire lifecycle, including secure disposal.
Equally important is recognizing the risks that must be addressed. While compliance risk has traditionally been the main priority for security programs, two emerging forces are rapidly amplifying data risk—and accelerating the need for stronger mitigation strategies:
It’s important to understand the types of data risk because, as Heidi Shey says, “Different types of data risks require different types of controls and mitigation.”
The three types of data risks are:
Source: Forrester Research
Moving at the speed of AI: As AI adoption surges, so does AI’s access to sensitive data. Organizations must evolve their risk planning and threat models accordingly, and use AI to enhance defensive tactics such as threat and gap analysis, detection validation, and automated remediation.
In parallel, AI-driven attacks, exploitation of vulnerabilities, and system malfunctions introduce additional layers of complexity that security teams must be prepared to navigate.
Transition to quantum-safe security: Organizations should begin preparing for post quantum cryptography by conducting an inventory of where encryption is used across the organization today and building a clear roadmap to upgrade to modern, quantum resilient standards as they emerge.
Per Todd Moore, “While AI and quantum computing introduce new risks, preparing for them simultaneously requires organizations to discover, classify, cleanse, and protect their data—using techniques such as masking and tokenization—before that data is put to use.”
Cloud service providers (CSPs) offer cloud-native data security tools designed to protect data in their individual platforms. However, relying solely on cloud-native security features introduces several risk deficiencies. These deficiencies stem from variances in visibility, capabilities, configurability, and inter-platform coordination.
Each CSP implements distinct security controls, APIs, and configuration standards such as AWS GuardDuty, Azure Security Center, and GCP Security Command Center. Differences in firewall capabilities, intrusion prevention, and threat intelligence integration may leave workloads inconsistently protected because a vulnerability addressed in one cloud platform may remain exposed in another.
In short, cloud-native tools alone cannot deliver consistent or comprehensive data protection in multi-cloud environments. Overreliance on these tools often increases operational complexity, fragments security controls, and creates blind spots that elevate overall risk.
To address these challenges, organizations are increasingly adopting data security posture management (DSPM) as a dedicated security discipline for multi-cloud environments. DSPM-based tools enable a data-first approach by automating data discovery, classification, risk assessment, and encryption protection across hybrid and multi-cloud infrastructures.
A unified approach to securing data must span all states of —data creation, data in motion, data at rest, and data in use. In multi-cloud environments, where risk continues to rise, traditional tools leave critical data exposed and limit the ability to safely leverage AI and prepare for a post-quantum future.
As Todd Moore explains, “By consolidating discovery, monitoring, protection, and control into a single, unified platform across clouds, organizations can reduce blind spots, simplify operations, and regain control over their data. DSPM illuminates a clear path forward—bringing visibility and resilience to multi-cloud data security and enabling a safer, more secure data future.”
Listen to the full Thales and Forrester webinar here
Learn more about Thales Data Security Posture Management
Learn more about Thales CipherTrust Data Security Platform