In a recent announcement, Thales, a security provider for critical information systems, cybersecurity and data, has released the results of its 2017 Thales Data Threat Report, Advanced Technology Edition, which was issued in conjunction with analyst firm 451 Research.
According to the report, 93 percent of respondents will use sensitive data in an advanced technology environment, which was defined as cloud, SaaS, big data, IoT or container, this year. Of those respondents, 63 percent also reported a belief that their organizations are deploying these technologies ahead of having appropriate data security solutions in place.
Although that number is high, it represents a drop from last year, when Thales reported that 70 percent of respondents voiced worries about security breaches from attacks targeting cloud service providers (CSP), compared to about 60 percent in this recent study. On the SaaS front, 57 percent of respondents report leveraging sensitive data, and they say they are most fearful about online storage, online backup and online accounting.
“Most major cloud providers have larger staffs of highly-trained security professionals than any enterprise, and their scalability and redundancy can provide protection from the kinds of DDOS attacks that can plague on-premises workloads,” said Garrett Bekker, principal analyst, Information Security, 451 Research. “Perhaps, as a result of the recognition of these public cloud security realities, security concerns overall for public cloud are waning.”
In big data, almost half of respondents say they are using sensitive data in big data environments, but they are afraid of risks from sensitive data everywhere, security of reports and privileged-user access.
The report indicates that encryption is the security strategy of choice for advanced technologies, with 60 percent of respondents saying they would increase cloud deployments if CSPs offered data encryption in the cloud with enterprise key control. Data encryption and digital birth certificates with encryption technology were identified as the two most popular security options for IoT deployments.
“The digital world we live in, which encompasses everything from cloud to big data and IoT, demands an evolution of IT security measures,” said Peter Galvin, VP, Strategy, Thales e-Security. “The traditional methods aren't robust enough to combat today's complicated threat landscape. Fortunately, adopters of advanced technologies are getting the message – as evidenced by the number of respondents expressing an interest in or embracing encryption. Putting an 'encrypt everything' strategy into practice will go a very long way towards protecting these powerful, yet vulnerable, environments.”
Download the full report here: http://dtr.thalesesecurity.com.
We've just concluded the IoT Evolution Expo at Caesars Palace in Las Vegas and it's been an incredible event.
The editors of IoT Evolution World announce the winners of the Best in Show awards from the IoT Evolution Expo
Hello again, my friends. This is another dispatch from the front line at the IoT Evolution Expo, where Tuesday, day two, brought us insights on Smart …
In this special live episode from the IoT Evolution Expo, Ken Briodagh sits himself down to talk at you about some of the awesome stuff going on at th…
We had an incredible first day here at IoT Evolution Expo. It was 113 degrees out on the strip in Las Vegas, but we were full of nothing but icy cool …