Menu

IoT FEATURE NEWS

Thales Study Says Two-Thirds of Enterprises Don't Secure Sensitive Data

By

In a recent announcement, Thales, a security provider for critical information systems, cybersecurity and data, has released the results of its 2017 Thales Data Threat Report, Advanced Technology Edition, which was issued in conjunction with analyst firm 451 Research.

According to the report, 93 percent of respondents will use sensitive data in an advanced technology environment, which was defined as cloud, SaaS, big data, IoT or container, this year. Of those respondents, 63 percent also reported a belief that their organizations are deploying these technologies ahead of having appropriate data security solutions in place.

Although that number is high, it represents a drop from last year, when Thales reported that 70 percent of respondents voiced worries about security breaches from attacks targeting cloud service providers (CSP), compared to about 60 percent in this recent study. On the SaaS front, 57 percent of respondents report leveraging sensitive data, and they say they are most fearful about online storage, online backup and online accounting.

“Most major cloud providers have larger staffs of highly-trained security professionals than any enterprise, and their scalability and redundancy can provide protection from the kinds of DDOS attacks that can plague on-premises workloads,” said Garrett Bekker, principal analyst, Information Security, 451 Research. “Perhaps, as a result of the recognition of these public cloud security realities, security concerns overall for public cloud are waning.”

In big data, almost half of respondents say they are using sensitive data in big data environments, but they are afraid of risks from sensitive data everywhere, security of reports and privileged-user access.

The report indicates that encryption is the security strategy of choice for advanced technologies, with 60 percent of respondents saying they would increase cloud deployments if CSPs offered data encryption in the cloud with enterprise key control. Data encryption and digital birth certificates with encryption technology were identified as the two most popular security options for IoT deployments.

“The digital world we live in, which encompasses everything from cloud to big data and IoT, demands an evolution of IT security measures,” said Peter Galvin, VP, Strategy, Thales e-Security. “The traditional methods aren't robust enough to combat today's complicated threat landscape. Fortunately, adopters of advanced technologies are getting the message – as evidenced by the number of respondents expressing an interest in or embracing encryption. Putting an 'encrypt everything' strategy into practice will go a very long way towards protecting these powerful, yet vulnerable, environments.”

Download the full report here: http://dtr.thalesesecurity.com




Edited by Alicia Young

Editorial Director

SHARE THIS ARTICLE
Related Articles

IoT Time Podcast S.5 Ep.12 Sigfox USA

By: Ken Briodagh    3/26/2020

In this episode of IoT Time Podcast, Ken Briodagh sits down with Jeremy Prince, President, Sigfox USA, to talk about how you can scale IoT networks an…

Read More

KORE Announces Evolution of its Vertical Market IoT Strategy

By: Ken Briodagh    3/26/2020

KORE, the independent IoT company, recently unveiled its new vertical market strategy, and the company's mission to help brands deploy, manage, and se…

Read More

COVID-19 Could Expose the Cloud's Limits, Says GlobalData Study

By: Ken Briodagh    3/24/2020

COVID-19 (or Coronavirus) is likely to be the most impactful thing to affect the technology industry in 2020.

Read More

Momentum IoT and Skyboss Announce Partnership to Streamline Field Service and Reduce Overhead

By: Ken Briodagh    3/24/2020

Momentum IoT and Skyboss have announced a new formal partnership between the two companies.

Read More

Industrial Internet Consortium Announces Software Trustworthiness Whitepaper

By: Ken Briodagh    3/24/2020

IIC offers guidance to improve the safety, security, privacy, reliability and resilience of software for IIoT systems

Read More