Skip to main content

The data is in the cloud,
but who's in control?

The annual Global Encryption Trends Study is back (17 years and counting) and this year’s report puts multi-cloud security in the spotlight. Organizations continue to migrate to multiple-cloud platforms and hybrid cloud environments. The result is increased complexity and loss of control. So, what is the best path forward? Get the answers.

  • See the emerging trends in multi-cloud encryption strategies
  • Compare notes to see what’s working and what’s not for over 6,000 respondents across multiple industry sectors in 17 countries/regions
  • Learn how to gain control of the data and prioritize your digital security investments

Get the 2022 Report

2022 Global Encryption Trends Study Report on tablet
Percent Background

A big spike in encryption strategy adoption

The Ponemon Institute reported that 62% of organizations have an encryption strategy in place – the sharpest increase in adoption in nearly two decades.

Percent Background

The threats are on the rise

72% of organizations have suffered a data breach, half of them within the last year. At the same time, 55% of respondents struggle to find where sensitive data resides.

Percent Background

HSMs becoming essential security tech

The importance of HSMs continues to grow, with 49% of respondents saying they have HSMs as a critical component of their multi-cloud security strategies.

Related Resources

Related Solutions

nShield general purpose HSMs

Learn about the family of nShield HSMs and how they serve as the security backbone and root of trust for cloud deployments.

nShield as a Service

Easy, efficient access to cryptography as a service.

Entrust KeyControl

Universal key management for encrypted workloads.

nShield Container Option Pack

Deploy containerized applications in the cloud integrated with high-assurance nShield HSMs.

nShield Web Services Option Pack

Cloud-friendly interface to high assurance HSMs.

Identity as a Service

Cloud-based platform for intelligent identity and access management.

Cryptographic Center of Excellence

Learn how to establish a Crypto Center to optimize business continuity, compliance, and security.

Get the Report