MN-NCIPHER-SECURITY
As organizations accelerate digital initiatives such as cloud and the internet of things (IoT), and data volumes and types continue to rise, IT professionals cite protection of customer personal information as their number one priority, according to the 2020 Global Encryption Trends Study from the Ponemon Institute.
This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20200407005297/en/
The Ponemon Institute has collaborated with nCipher Security , an Entrust Datacard company and world leader in hardware security modules (HSMs), on this multinational survey of how and why organizations deploy encryption, now in its fifteenth year.
Threats, drivers and priorities
For the first time, protecting consumer personal information is the top driver for deploying encryption (54% of respondents), outranking compliance, which ranked fourth (47%). Traditionally compliance with regulations was the top driver for deploying encryption, but has dropped in priority since 2017, indicating that encryption is transitioning from a requirement to a proactive choice to safeguard critical information.
Employee mistakes continue to be the biggest threat to sensitive data (54%) and significantly outweigh concerns over attacks by hackers (29%), or malicious insiders (20%). In contrast, the least significant threats cited include government eavesdropping (11%) and lawful data requests (12%).
Data discovery the number one challenge
With the proliferation of data from digital initiatives, cloud use, mobility, IoT devices and the advent of 5G networks, data discovery continues to be the biggest challenge in planning and executing a data encryption strategy, with 67% of respondents citing this as their top concern. And that is likely to increase, with a pandemic-driven surge in employees working remotely, using data at home, creating extra copies on personal devices and cloud storage.
Blockchain, quantum and adoption of new encryption technologies
The study indicates that 48% of organizations have adopted encryption strategies across their enterprises, up from 45% in 2019. With encryption deployment steadily growing, how are organizations looking ahead? In the near term, 60% of organizations plan to use blockchain, with cryptocurrency/wallets, asset transactions, identity, supply chain and smart contracts cited at the top use cases.
Other much-hyped technologies are not on IT organizations’ near-term radar. Most IT professionals see the mainstream adoption of multi-party computation at least five years away, with mainstream adoption of homomorphic encryption more than six years away, and quantum resistant algorithms over eight years out.
Trust, integrity, control
The use of hardware security modules (HSMs) continues to grow, with 48% of respondents deploying HSMs to provide a hardened, tamper-resistant environment with higher levels of trust, integrity and control for both data and applications. Organizations in Germany, the United States and Middle East are more likely to deploy HSMs, with Australia, Germany and the United States most likely to assign importance to HSMs as part of their organization’s encryption or key management activities.
HSM usage is no longer limited to traditional use cases such as public key infrastructure (PKI), databases, application and network encryption (TLS/SSL). The demand for trusted encryption for new digital initiatives has driven significant HSM growth for big data encryption (up 17%) code signing (up 12%), IoT root of trust (up 10%) and document signing (up 7%). Additionally, 35% of respondents report using HSMs to secure access to public cloud applications.
The race to the cloud
Eighty-three percent of respondents report transferring sensitive data to the cloud, or planning to do so within the next 12 to 24 months, with organizations in the United States, Brazil, Germany, India and South Korea doing so most frequently.
In the next 12 months, respondents predict a significant increase in the ownership and operation of HSMs to generate and manage Bring Your Own Key (BYOK), and integration with a Cloud Access Security Broker (CASB) to manage keys and cryptographic operations. The survey found that the most important cloud encryption features are:
- support for Key Management Interoperability Protocol (KMIP) (67%)
- security information and event management (SIEM) integration (62%)
- granular access controls (60%)
- key usage audit logs (55%), and
- privileged user access controls (50%).
“Consumers expect brands to keep their data safe from breaches and have their best interests at heart. The survey found that IT leaders are taking this seriously, with protection of consumer data cited as the top driver of encryption growth for the first time,” says Dr Larry Ponemon, chairman and founder of Ponemon Institute. “Encryption use is at an all-time high with 48% of respondents this year saying their organization has an overall encryption plan applied consistently across the entire enterprise, and a further 39% having a limited plan or strategy applied to certain application and data types.”
“As the world goes digital, the impact of the global pandemic highlights how security and identity have become critical for organizations and individuals both at work and at home,” says John Grimm vice president of strategy at nCipher Security. “Organizations are under relentless pressure to deliver high security and seamless access – protecting their customer data, business critical information and applications while ensuring business continuity. nCipher empowers customers by providing a high assurance security foundation that ensures the integrity and trustworthiness of their data, applications and intellectual property.”
Other key trends include:
- The highest prevalence of organizations with an enterprise encryption strategy is in Germany (66%) followed by the United States (66%), Sweden (62%), Hong Kong (60%), Netherlands (56%) and the United Kingdom (54%).
- Payment-related data (54% of respondents) and financial records (54% of respondents) are most likely to be encrypted.
- The least likely data type to be encrypted is health-related information (25% of respondents), a surprising result given the sensitivity of this information and recent high-profile healthcare data breaches.
- The industries seeing the most significant increase in extensive encryption usage are manufacturing (49%), hospitality (44%) and consumer products (43%).
Download the 2020 Global Encryption Trends Study here .
2020 Global Encryption Trends Study methodology
The 2020 Global Encryption Trends Study, based on research by the Ponemon Institute, captures how organizations around the world are dealing with compliance, increased threats, and the implementation of encryption to protect their business critical information and applications. 6,457 IT professionals were surveyed across multiple industry sectors in 17 countries/regions: Australia, Brazil, France, Germany, India, Japan, Hong Kong, Mexico, the Middle East (which is a combination of respondents located in Saudi Arabia and the United Arab Emirates), the Russian Federation, Southeast Asia (Indonesia, Malaysia, Philippines, Thailand, and Vietnam), South Korea, Taiwan, the United Kingdom, the United States and two new regions for the first time, Netherlands and Sweden.
About nCipher Security
nCipher Security, an Entrust Datacard company, is a leader in the general-purpose hardware security module (HSM) market, empowering world-leading organizations by delivering trust, integrity and control to their business-critical information and applications. Today’s fast-moving digital environment enhances customer satisfaction, gives competitive advantage and improves operational efficiency – it also multiplies the security risks. Our cryptographic solutions secure emerging technologies such as cloud, IoT, blockchain, and digital payments and help meet new compliance mandates. We do this using our same proven technology that global organizations depend on today to protect against threats to their sensitive data, network communications and enterprise infrastructure. We deliver trust for your business-critical applications, ensure the integrity of your data and put you in complete control – today, tomorrow, always. www.ncipher.com
Follow us on LinkedIn , Twitter , Facebook and Instagram – search nCipherSecurity.
View source version on businesswire.com: https://www.businesswire.com/news/home/20200407005297/en/
About Business Wire
Subscribe to releases from Business Wire
Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.
Latest releases from Business Wire
Synthio Labs Raises $5 Million to Build the Voice AI Operating System for Life Sciences Customer Engagement19.11.2025 16:00:00 CET | Press release
Synthio Labs, a clinical-grade voice AI company transforming how life sciences organisations engage clinicians and patients, today announced that it has raised $5 million in seed funding. The round was led by Elevation Capital with participation from 1984 Ventures, Peak XV Partners, Y Combinator, and several strategic angels from the global healthcare and AI ecosystem. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251119509940/en/ Rajashekar Vasantha (left), Supreet Deshpande (center), and Sahitya Sridhar (right), the founding team behind Synthio Labs’ voice-powered AI platform for pharma “We believe Synthio Labs is defining the next major Customer Engagement infrastructure for Life Sciences. Their Clinical-grade Voice AI platform unifies how pharma communicates - giving field teams a powerful voice companion, and giving physicians and patients instant, trusted, compliant answers 24/7. Pharma’s global Commercial and GTM foo
Torq Crushes EMEA Estimates With Record-Breaking Q3, Hitting 185% of Quarterly Target19.11.2025 15:00:00 CET | Press release
Torq Achieves 284%EMEA Customer Growth As It Signs Iconic Enterprises Including Virgin Atlantic, Kyocera, Siemens, and Zara Torq, the autonomous security operations leader, today announced it has exceeded Q3 EMEA revenue estimates, achieving 185% of its quarterly target. Torq is now firmly established as EMEA’s autonomous security operations platform of choice as enterprise goliaths continue joining its customer ranks, including Virgin Atlantic, Kyocera, Siemens, and Zara. Torq’s EMEA headcount grew 400% across 2025 to accommodate the exponentially increasing demand. “As worldwide momentum accelerates, Torq is doubling down on its EMEA investment by expanding operations, growing regional leadership, and strengthening our on-the-ground presence to fuel our next stage of growth,” said Ofer Smadari, CEO and co-founder, Torq. “Torq is now trusted by many of the world’s largest brands inside some of the most complex and sophisticated security operations centers. With new expansion into Germ
iConnections Launches Pipelines: A Powerful New Way for LPs and GPs to Turn Connections Into Real Momentum19.11.2025 15:00:00 CET | Press release
iConnections, the leading network for allocators and fund managers, today announced the launch of Pipelines, a new productivity and relationship-management tool built directly into the platform. Pipelines gives LPs and GPs a structured, visual, and purpose-built way to organize their outreach, nurture relationships, and drive their fundraising or investment processes forward—without relying on fragmented spreadsheets or generic CRMs. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251119021208/en/ Born from extensive feedback across the alternative investment ecosystem, Pipelines is designed to solve a common industry challenge: after a productive event or outreach cycle, promising conversations often lose momentum because there is no simple, tailored way to track next steps. “With Pipelines, users finally have a workflow that matches the way this industry actually operates,” said Douglas Melchior, VP of Product at iConnectio
Xsolla Releases “The Xsolla Report: State of Play Q3 2025 Edition, Vol. 8,” Delivering Clear, Data-Led Insights for Game Developers19.11.2025 15:00:00 CET | Press release
Report Unpacks Regional Trends Across China, Europe, and MENA to Inform Growth, Monetization, and Player Engagement Strategies Xsolla, a global video game commerce company that helps developers launch, grow, and monetize their products, today announces the release of The Xsolla Report: State of Play Q3 2025 Edition, Vol. 8, a comprehensive analysis of market forces shaping the games industry. The report synthesizes the latest data and expert perspectives to help developers and publishers plan for sustainable growth across platforms and regions. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251119397781/en/ Graphic: Xsolla As developers navigate new distribution models and evolving monetization approaches, the Q3 2025 edition offers a practical perspective on where the market is heading. The global player base is projected to reach 3.6 billion by year-end, with revenue on track to reach $188.8 billion—driven by steady moment
PicSee Launches the World’s First Social Platform That Helps You Get All Your Photos from Friends19.11.2025 15:00:00 CET | Press release
Built on Mutual Photo Sharing and Powered by AI PicSee, a new kind of social platform, announced its global launch - introducing a revolutionary way for friends and family to reconnect through photos. Built on mutual photo sharing and powered by AI, PicSee helps users automatically get all their photos from friends by giving them theirs - without ever uploading them to the cloud. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251112904808/en/ PicSee App - Home Screen Every year, trillions of photos are captured but rarely shared with the friends in them. PicSee changes that. Using on-device facial recognition and a patent-pending “give to get” system, the app automatically identifies which photos belong to whom and helps friends exchange them securely with a single tap. PicSee scans a user’s gallery, recognizes faces, and generates a personalized invite such as: “I have 75 of your pics. Come get them on PicSee.” Once two fri
In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.
Visit our pressroom
