2022 Global Encryption Trends Study
Find out how organizations are using encryption to protect data and workloads across multiple cloud platforms.
The data is in the cloud,
but who's in control?
The annual Global Encryption Trends Study is back (17 years and counting) and this year’s report puts multi-cloud security in the spotlight. Organizations continue to migrate to multiple-cloud platforms and hybrid cloud environments. The result is increased complexity and loss of control. So, what is the best path forward? Get the answers.
- See the emerging trends in multi-cloud encryption strategies
- Compare notes to see what’s working and what’s not for over 6,000 respondents across multiple industry sectors in 17 countries/regions
- Learn how to gain control of the data and prioritize your digital security investments
A big spike in encryption strategy adoption
The Ponemon Institute reported that 62% of organizations have an encryption strategy in place – the sharpest increase in adoption in nearly two decades.
The threats are on the rise
72% of organizations have suffered a data breach, half of them within the last year. At the same time, 55% of respondents struggle to find where sensitive data resides.
HSMs becoming essential security tech
The importance of HSMs continues to grow, with 49% of respondents saying they have HSMs as a critical component of their multi-cloud security strategies.
How does your multi-cloud security strategy measure up?
Multi-cloud security challenges drive data protection strategies forward
nShield general purpose HSMs
Learn about the family of nShield HSMs and how they serve as the security backbone and root of trust for cloud deployments.
nShield as a Service
Easy, efficient access to cryptography as a service.
Universal key management for encrypted workloads.
nShield Container Option Pack
Deploy containerized applications in the cloud integrated with high-assurance nShield HSMs.
nShield Web Services Option Pack
Cloud-friendly interface to high assurance HSMs.
Identity as a Service
Cloud-based platform for intelligent identity and access management.
Cryptographic Center of Excellence
Learn how to establish a Crypto Center to optimize business continuity, compliance, and security.