{"id":15380,"date":"2021-06-09T05:00:00","date_gmt":"2021-06-09T05:00:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/06\/09\/entrust-2021-hong-kong-encryption-trends-study-shows-increased-focus-on-cloud-data-protection-across-region\/"},"modified":"2021-06-09T05:00:00","modified_gmt":"2021-06-09T05:00:00","slug":"entrust-2021-hong-kong-encryption-trends-study-shows-increased-focus-on-cloud-data-protection-across-region","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/06\/09\/entrust-2021-hong-kong-encryption-trends-study-shows-increased-focus-on-cloud-data-protection-across-region\/","title":{"rendered":"Entrust 2021 Hong Kong Encryption Trends Study Shows Increased Focus on Cloud Data Protection Across Region"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\"><!--<a class=\"format-txt\" href=\"{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<p class=\"subheadline\">\n                               Conducted by the Ponemon Institute, the 16th annual study highlights regional adoption of enterprise-wide encryption faster than global averages                            <\/p>\n<p>HONG KONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media&#13;<br \/>\nOutReach<\/a>\u00a0&#8211; 9 June 2021 &#8211;<b> <\/b>Security and&#13;<br \/>\nIT professionals in Hong Kong continue to outpace the global average when it&#13;<br \/>\ncomes to the adoption of enterprise-wide encryption, with particular focus on cloud&#13;<br \/>\nservices and applications, as well as containers. This and other findings are&#13;<br \/>\nhighlighted in the <a href=\"https:\/\/www.entrust.com\/lp\/en\/hong-kong-encryption-trends-study?utm_source=pr&amp;utm_medium=press_release&amp;utm_campaign=22Q1_DPS_APAC_GC_Press_Release_HK_Encryption_Trends_Study&amp;utm_content=&amp;nc_sfid=7014w000001mpIl\">Entrust 2021 Hong Kong Encryption&#13;<br \/>\nTrends Study<\/a>,&#13;<br \/>\npart of the 16<sup>th<\/sup> annual multinational survey by the Ponemon&#13;<br \/>\nInstitute. The study reports on the cybersecurity challenges organisations face&#13;<br \/>\ntoday, and how and why organizations deploy encryption.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>Identified&#13;<br \/>\nthreats and priorities<\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Specifically,&#13;<br \/>\n54% of respondents in Hong Kong now have a consistently applied encryption&#13;<br \/>\nplan\/strategy, well ahead of the global average (50%) for the second year&#13;<br \/>\nrunning. Also for the second straight year in Hong Kong, the biggest threats&#13;<br \/>\nthat might result in the exposure of sensitive data were employee mistakes (47%&#13;<br \/>\nvs. 53% globally) and system or process malfunction, which increased from 30%&#13;<br \/>\nto 36% (vs. 31% globally).<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Currently,&#13;<br \/>\naround six-in-ten (59%) organizations surveyed in Hong Kong transfer data to&#13;<br \/>\nthe cloud. This is up from 55% last year, but is expected to surge with an&#13;<br \/>\nadditional 24% planning to do so in the next 12-24 months. Similarly, just over&#13;<br \/>\nhalf of organizations surveyed deploy encryption for public cloud services (51%&#13;<br \/>\nvs. 46% globally) and Bring Your Own Key (BYOK) management support was cited as&#13;<br \/>\nthe fastest growing feature of cloud encryption solutions by 53%, up from 48%&#13;<br \/>\nlast year. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Furthermore,&#13;<br \/>\nnearly half (47%) of responding IT professionals in Hong Kong deploy encryption&#13;<br \/>\nfor containers, the highest rate worldwide, up from 40% last year and far above&#13;<br \/>\nthe global average of 32%.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>The&#13;<br \/>\ngrowing role of hardware security modules (HSMs)<\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>For Hong&#13;<br \/>\nKong IT professionals, the pain associated with key management is increasing,&#13;<br \/>\nwith two-thirds reporting a high rate of overall pain associated with managing&#13;<br \/>\nkeys or certificates. This is up from 61% last year and higher than this year&#8217;s&#13;<br \/>\nglobal average of 56%. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Similar to&#13;<br \/>\nlast year, the top factor driving this is &#8220;no clear ownership&#8221; (74% vs. 64%&#13;<br \/>\nglobally), with inadequate key management tools in second place (58% vs. 46%&#13;<br \/>\nglobally).<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Another&#13;<br \/>\nfactor to consider is the lower rates of hardware security module (HSM) adoption,&#13;<br \/>\nwith\u00a0 40% of respondent organizations in&#13;<br \/>\nHong Kong using HSMs (vs. 49% globally). The fact that this is up from 34% last&#13;<br \/>\nyear, making it the 2nd highest increase worldwide, suggests that the benefits&#13;<br \/>\nof HSMs \u2013 including the ability to help with key management &#8211; are being&#13;<br \/>\nrecognized in the region. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>In fact, Hong&#13;<br \/>\nKong results indicate that the importance of HSMs to encryption or key&#13;<br \/>\nmanagement strategy is expected to increase from 63% to 79% over the next 12&#13;<br \/>\nmonths. Similarly, with the increased focus on cloud migration, when using HSMs&#13;<br \/>\nto protect cloud applications a higher percentage of responding organizations&#13;<br \/>\nin Hong Kong than any other region prefer to use HSMs they own and operate (54%&#13;<br \/>\nvs 41% globally).<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Over the&#13;<br \/>\nnext 12 months, respondent organizations anticipate greater use of HSMs for&#13;<br \/>\nseveral use cases, led by TLS\/SSL going from 38% to 78% year over year, the largest&#13;<br \/>\nexpected increase of any use case. Other leading use cases include database&#13;<br \/>\nencryption (increasing from 25% to 45%), blockchain applications (from 13% to&#13;<br \/>\n30%) and payment transaction processing or payment credential&#13;<br \/>\nissuing\/provisioning (expected to increase from 26% to 40%).<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>&#8220;Organizations&#13;<br \/>\nin Hong Kong are increasing their use of the cloud and containers as IT and&#13;<br \/>\nsecurity professionals focus on\u00a0 the&#13;<br \/>\nrisks associated with employee mistakes and system or process malfunctions. As&#13;<br \/>\nthey strive to protect customer information and intellectual property and to&#13;<br \/>\ncomply with data privacy mandates, organizations on average now use more than eight&#13;<br \/>\ndifferent products that perform encryption. This brings new challenges&#13;<br \/>\nassociated with discovering where sensitive data resides, deploying encryption&#13;<br \/>\ntechnology and training users to use encryption appropriately,&#8221; said Michael&#13;<br \/>\nTai, Area Vice President, Greater China, Entrust. &#8220;Key management still causes&#13;<br \/>\na high level of pain, due primarily to concerns about key ownership and&#13;<br \/>\ninadequate key management tools. As they deploy encryption for databases,&#13;<br \/>\ncontainers and cloud applications, organizations in the region seek encryption&#13;<br \/>\nsolutions that offer scalability, tamper resistance with an HSM, but as cloud&#13;<br \/>\nuse increases, organizations prefer to own and manage the HSMs used to protect&#13;<br \/>\ncloud applications.&#8221;<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>Additional&#13;<br \/>\nInformation:<\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Report: <a href=\"https:\/\/www.entrust.com\/lp\/en\/hong-kong-encryption-trends-study?utm_source=pr&amp;utm_medium=press_release&amp;utm_campaign=22Q1_DPS_APAC_GC_Press_Release_HK_Encryption_Trends_Study&amp;utm_content=&amp;nc_sfid=7014w000001mpIl\">2021 Hong Kong Encryption Trends&#13;<br \/>\nStudy<\/a><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Blog: <a href=\"https:\/\/blog.entrust.com\/2021\/06\/2021-hong-kong-encryption-trends\/\">As cyber threats grow, Hong Kong&#13;<br \/>\noutpaces the world in enterprise encryption strategies<\/a><b\/><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>\u00a0<\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>2021 Global Encryption Trends Study methodology<\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The 2021&#13;<br \/>\nGlobal Encryption Trends Study, based on research by the Ponemon Institute,&#13;<br \/>\ncaptures how organizations around the world are dealing with compliance,&#13;<br \/>\nincreased threats, and the implementation of encryption to protect their business-critical&#13;<br \/>\ninformation and applications. 6,610 IT professionals were surveyed across&#13;<br \/>\nmultiple industry sectors in 17 countries\/regions: Australia, Brazil, France,&#13;<br \/>\nGermany, Hong Kong, Japan, Mexico, Middle East (which is a combination of&#13;<br \/>\nrespondents located in Saudi Arabia and the United Arab Emirates), Netherlands,&#13;<br \/>\nthe Russian Federation, Spain, Southeast Asia, South Korea, Sweden, Taiwan, the&#13;<br \/>\nUnited Kingdom, and the United States.<\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-06-09\/81200\/entrust-2021-hong-kong-encryption-trends-study-shows-increased-focus-on-cloud-data-protection-across-region\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conducted by the Ponemon Institute, the 16th annual study highlights regional adoption of enterprise-wide encryption faster than global averages HONG KONG SAR &#8211;\u00a0Media&#13; OutReach\u00a0&#8211; 9 June 2021 &#8211; Security and&#13; IT professionals in Hong Kong continue to outpace the global average when it&#13; comes to the adoption of enterprise-wide encryption, with particular focus on cloud&#13; &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/15380"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=15380"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/15380\/revisions"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=15380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=15380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=15380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}