2021
Hong Kong Encryption Trends Study
Find out how organisations in Hong Kong are managing encryption across multiple clouds and how your data security practices compare.
You are here.
Your data is there.
Threats are everywhere.
The 2021 Hong Kong Encryption Trends Study, the most comprehensive encryption survey in the industry, highlights how organisations in Hong Kong are managing encryption strategies and data security threats across multiple clouds. The results are clear: organisations are expanding their use of encryption technologies into areas such as the cloud and containers as they focus on protecting customer data and intellectual property.
Coverage includes:
- Multi-cloud encryption strategies
- Trends in encryption adoption and deployment choices
- Threats, drivers, and priorities
- Importance of hardware security modules (HSMs)

Setting the pace
54% of organisations in Hong Kong have an encryption strategy that is applied consistently across the enterprise, outpacing the global average.
Customer data in focus
72% of organisations use encryption to protect customer information.
All boxed up
Nearly half of all organisations deploy encryption for containers, the highest rate worldwide.
Looking forward
Blockchain is close to mainstream adoption with next generation encryption technologies such as quantum algorithms more than five years away.
Other resources related to the 2021 study
Customer personal information, the number one data protection priority.
Related Solutions
nShield general purpose HSMs
Learn about the family of nShield HSMs and how they serve as the security backbone and root of trust for cloud deployments
nShield as a Service
Easy, efficient access to cryptography as a service
Entrust KeyControl
Universal key management for encrypted workloads.
nShield Container Option Pack
Deploy containerized applications in the cloud integrated with high-assurance nShield HSMs
nShield Web Services Option Pack
Cloud-friendly interface to high assurance HSMs
Identity as a Service
Cloud-based platform for intelligent identity and access management.
Cryptographic Center of Excellence
Learn how to establish a Crypto Center to optimize business continuity, compliance, and security.