Intelligent Tech Channels Issue 53 | Page 40

majority of respondents cited encryption ( 59 %) and key management ( 52 %) as the security technologies they currently use to protect sensitive data in the cloud .
However , when asked what percentage of their data in the cloud is encrypted , only 11 % of respondents said between 81 – 100 % is encrypted . Additionally , key management platform sprawl may be an issue for enterprises . Only 10 % of respondents use one to two platforms , 90 % use three or more , and almost one in five ( 17 %) admitted using eight or more platforms .
Encryption should be a priority area for enterprises to focus on when it comes to securing data in the cloud . In fact , 40 % of respondents stated that they were able to avoid the breach notification process because the stolen or leaked data was encrypted or tokenized , showcasing the tangible value of encryption platforms .
Additionally , it is encouraging to see signs enterprises embrace Zero Trust and investing accordingly . Nearly a third of
The growing importance of data sovereignty is increasingly raising questions for CISOs and data protection officers when considering their cloud strategy , governance and risk management .
respondents ( 29 %) said they are already executing a Zero Trust strategy , a quarter ( 27 %) said they are evaluating and planning one and , 23 % said they are considering it . This is a positive result , but there is certainly still room to grow .
Sebastien Cano , Senior Vice President for Cloud Protection and Licensing activities at Thales , said : “ The complexity of managing multi-cloud environments cannot be overstated . Additionally , the growing importance of data sovereignty is increasingly raising questions for CISOs and data protection officers when considering their cloud strategy , governance and risk management . The challenge is not only where the sensitive data resides geographically , but even who has access to sensitive data inside the organisation .
“ There are various solutions such as encryption and key management . Last but not least , continuing to embrace a Zero Trust strategy will be essential in securing these complex environments , helping to ensure organisations can support their data and manage future challenges .” •
40 www . intelligenttechchannels . com