banner
Operationalizing Encryption and Key Management - Analyst Research

Operationalizing Encryption and Key Management - Analyst Research

The potential for serious business disruptions from breaches makes securing data critical. Ransomware, software supply chain compromise, and targeted penetration attacks are just some of the looming threats that can result in data loss, compliance violations, brand damage, and lost revenue. Additionally, ransomware actors are changing their tactics to focus on data extortion: holding exfiltrated data hostage to public exposure. 

As a result, organizations are turning to encryption to maintain cyber-resiliency in response to a successful data breach as well as to ensure data privacy and compliance. Although organizations understand how encryption protects data, they struggle with the implementation, specifically how encryption and key management solutions balance security, usability, performance, compatibility, and costs. Further compounding these problems is quantum computing’s potential to break current encryption protocols, representing another challenge to securing sensitive data. Vendors need to demystify and simplify encryption and key management. 

To gain more insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 387 IT, compliance, DevOps, and cybersecurity professionals at organizations in North America (US and Canada) involved with encryption and data security technology and processes.

Discover the key findings on encryption and key management, addressing challenges, trends, and strategies. Stay ahead in data security with expert insights.

 

Source: Enterprise Strategy Group, a division of TechTarget Inc. Research Survey, Operationalizing Encryption and Key Management, December 2023.