Insights / Research Report / Operationalizing Encryption and Key Management
April 15, 2024

Operationalizing Encryption and Key Management

Todd Thiemann
Senior Analyst, IAM & Data Security

Bill Lundell
Senior Director, Sponsored and Syndicated Research

Market Topics

Cybersecurity

The potential for serious business disruptions from breaches makes securing data critical. Ransomware, software supply chain compromise, and targeted penetration attacks are just some of the looming threats that can result in data loss, compliance violations, brand damage, and lost revenue. Additionally, ransomware actors are changing their tactics to focus on data extortion: holding exfiltrated data hostage to public exposure.

As a result, organizations are turning to encryption to maintain cyber resilience in response to a successful data breach as well as to ensure data privacy and compliance. Although organizations understand how encryption protects data, they struggle with the implementation, specifically how encryption and key management solutions balance security, usability, performance, compatibility, and costs. Further compounding these problems is quantum computing’s potential to break current encryption capabilities, representing another challenge to securing sensitive data. Vendors need to demystify and simplify encryption and key management.

To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 387 IT, cybersecurity, compliance, and DevOps professionals at organizations in North America (US and Canada) involved with encryption and data security technology and processes.

Already an Enterprise Strategy Group client? Log in to read the full report.
If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

Unparalleled insights from analysts with an "insider" perspective

From strategy and product development to competitive insights and content creation, we deliver high-quality, actionable support services.