The biggest driver of encryption technology is the need to comply with regulation
Security positions are up, other IT postings way down.
Read Now
Read Now
By comparison, only 8 percent said that avoiding public disclosure after a data breach was a main driver.
Respondents were able to choose more than one answer.
This is the 11th year that the survey has been conducted, and the researchers were also able to identify some trends.
For example, IT operations, while still the biggest influence on a company's encryption strategy, has been making a smaller impact.
"The lines of business are starting to be much more influential in laying in encryption as a security strategy," said Peter Galvin, vice president of strategy and marketing at Thales e-Security, which, together with Vormetric Data Security, sponsored the report.
Since 2005, the the influence of IT operations fell from 53 percent down to 32 percent, while the influence of lines of business rose from 10 percent to 27 percent.
The influence of the security function has also increased a little bit, but not as much, from 12 percent to 16 percent.
Another trend is that the percentage of companies with an enterprise-wide encryption strategy that's applied consistently throughout the enterprise has risen from 15 percent in 2005 to 37 percent. And the percentage of companies with no encryption strategy has fallen from 38 percent to just 15 percent.
"There a lot more recognition of the importance of encryption," said Galvin.
However, encryption has also been, to some degree, a victim of its own success.
With more encryption, there are more encryption keys and signatures to keep track off.
"Managing the keys turns out to be pretty tricky," he said. "The more people implement encryption, and in more places, there are so many islands to manage that the pain starts to be very pronounced because the tools aren't centralized and aren't the same between different vendors."
According to the survey, no clear key ownership was selected as a major pain point by 57 percent of respondents, followed by the lack of skilled personnel with 49 percent, isolated and fragmented systems with 47 percent, and inadequate key management tool with 46 percent.
Among the types of keys that were most difficult to manage, SSH keys tied for first place the list with keys for clouds and other external services, with 61 percent of respondents each.
Keys for third-party systems such as those belonging to partners or customers were next with 57 percent, followed by application-owned keys at 54 percent.
No comments:
Post a Comment