2016 VORMETRIC DATA THREAT REPORT Trends in Encryption and Data Security Sponsoring Partners Global Edition
2016 VORMETRIC DATA THREAT REPORTTrends in Encryption and Data Security
Sponsoring Partners
Global Edition
2016 VORMETRICDATA THREAT REPORT – GLOBAL EDITION
1114 IT DECISION MAKERSUS (505), UK (101), DE (100), JP (102), AUS(100), MEX (103), BRZ (103)
HealthcareRetail OtherEnterprise
FinancialServices
Enterprises of: $250M+ for US, UK, DE, JP$100M+ for BRZ, MEX, AUS
Polling and Analysis by 451 Research
100%
Government
WHY IS COMPLIANCETHE TOP CONCERN?
91% 61%VULNERABLE TO DATA THREATS
9%
61%
22%
8%
NOT VULNERABLESOMEWHATVULNERABLEVERY VULNERABLEEXTREMELY VULNERABLE
HAD A DATA BREACH
RATES OF VULNERABILITY TO DATA THREATS
COMPLIANCE DOES NOT EQUALDATA BREACH PREVENTION
64%46%
BELIEVE COMPLIANCE IS EFFECTIVE AT PREVENTING DATA BREACHES
Compliance does not ensure security”..being compliant does not mean you won’t be breached”
“
“
Garrett BekkerSr. Analyst Enterprise Security, 451 Research
(58% IN THE 2015 REPORT)
RANK COMPLIANCE AS A TOP 3 IT SECURITY SPENDING PRIORITY
Rates of ranking as a Top 3 IT Security Spending Priority 39% - BEST PRACTICES
32% - PARTNERS/CUSTOMERS
46% - COMPLIANCE
46% - REPUTATION AND BRAND PROTECTION
36% - DATA BREACH AVOIDANCE
PUTTING FAITH INTHE WRONG DEFENCES
INCREASES IN IT SECURITY SPENDING PLANS BY CATEGORY
44% - ANALYSIS & CORRELATION TOOLS
48% - NETWORK DEFENSES
40% - DATA IN MOTION DEFENSES
39% - DATA AT REST DEFENSES
… perimeter defenses offer little help defending against multi‐stage attacks”
“It’s no longer enough just to secure networks and endpoints”
“
Garrett BekkerSr. Analyst Enterprise Security, 451 Research
… data‐at‐rest approaches have proven to be effective at protecting the data itself”
“
INCREASES IN SPENDING ON DATA AT REST DEFENSES FELL
47%
2014
39%
201544% - END POINT AND MOBILE
SOME ORGANIZATIONSARE GETTING IT RIGHT
58%INCREASING SPENDING ONIT SECURITYTO PROTECT SENSITIVE DATA
NOW MAKE PREVENTING DATA BREACHES A TOP SPENDING PRIORITY
36%
IMPLEMENTING EFFECTIVE DATA SECURITY TOOLS
39% - MULTI-FACTOR AUTHENTICATION
38% - SIEM SYSTEMS
40% - APPLICATION LAYER ENCRYPTION
39% - TOKENIZATION
38% - CLOUD SECURITY GATEWAY
GLOBAL VULNERABILITYTO DATA THREATS
GLOBAL
VULNERABLE VERY/EXTREMELY VULNERABLE
VERY OR EXTREMELY VULNERABLE
SOMEWHAT OR MORE
VULNERABLE
16%
84%
UNITEDSTATES
REGIONAL
UNITEDKINGDOM
23% 10%40%JAPAN MEXICOGERMANY
82%91%89%
12% 16%
84%
54%
94%
BRAZIL AUSTRALIA
36%
92% 93%
91% 34%
GLOBAL SPENDINGPRIORITY VARIATIONS
INCREASING DATA-AT-REST DEFENSE SPENDING
INCREASING SPENDING TO PROTECT DATA74% 62% 51%65% 63% 31%50%
U.S. U.K.MEXICOBRAZIL GERMANY AUS JAPAN
48% 45% 34%40% 37% 20%29%U.S. U.K.MEXICOBRAZIL GERMANY AUS JAPAN
US spending increase
2X or morethan Japan’s to protect data
In spite of TalkTalk & MumsNet
U.K. 11% behind U.S.in data-at-rest protection
39%
58%
45%
35%
EXECUTIVE MANAGEMENT
CONTRACTOR ACCOUNTS
INTERNAL AND EXTERNALDATA THREATS
THE MOST DANGEROUS INSIDERS (TOP 3 SELECTION)
TOP EXTERNAL THREATS
15% 12%39% 19% 15%CYBER CRIMINALS
HACKTIVISTSCYBER-
TERRORISTS
NATION STATES
COMPETITORS
PRIVILEGED USERS
SERVICE PROVIDER ACCOUNTS
ENCRYPTION TECHNOLOGIESA RECOGNIZED SOLUTION TO THE PROBLEMUSE ENCRYPTION TO:
41%
31%
53%
52%
38%
19%
BEST PRACTICES TO PROTECT DATA
MEET COMPLIANCE REQUIREMENTS
AVOID PR/REPUTATION DAMAGE
MEET DATA RESIDENCY REQUIRMENTS
AVOID LEGAL/FINANCIAL IMPACTS
PROTECT IP/COMPETITIVE ADVANTAGE
WHAT SHOULDORGANIZATIONS BE DOING
Get a better handle on where organization is using sensitive data – Both internal and external locationsDiscover and classify
Encryption and access control
Use encryption for more than just meeting compliance checklists. Consider an Encrypt Everything policy.
Use platform solutions that deliver a broad range of data security solutions on a single platform to reduce costs
Data security platforms
Security analytics Use data access monitoring combined with other threat indicators to identify threat activity patterns
Vormetric Data Security#DefenderOfData
VisionTo Secure the World’s Information
PurposeProtect business assets and brand
Customers1500+ Customers Across 21 Countries
17 of Fortune 30
30+ Cloud and Hosting Providers
Global PresenceGlobal Headquarters - San Jose, CA, USA
EMEA Headquarters - Reading, United Kingdom
APAC Headquarters - Singapore
Data-at-Rest Protection ProductsTransparent Encryption, Application-layer Encryption
Tokenization with Dynamic Data Masking
Cloud Encryption Gateway
Protection for Teradata Database
Key Management
Questions?
NameTitle
Contact