-
Be the first to like this
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.
Published on
Not surprisingly, companies are continuing to increase their use of encryption and other data protection techniques in response to data breaches and cyber attacks. But some of the other top deployment reasons – and techniques being used -- may surprise you. In this slide deck Larry Ponemon from the Ponemon Institute and John Grimm, Thales e-Security, take a look at some of the top findings in this year’s Global Encryption Trends Study, including:
• Variation in encryption and key management trends across multiple vertical industries
• Attitudes regarding protection of sensitive data in the cloud
• Types of data that are most commonly encrypted
• Common use cases for encryption, and where Hardware Security Modules are most commonly deployed for key protection and management
Or why not watch the webinar:
https://www.thales-esecurity.com/knowledge-base/webcasts/top-trends-encryption-and-data-protection
and download the report:
https://www.thales-esecurity.com/knowledge-base/analyst-reports/global-encryption-trends-study
Be the first to like this
Login to see the comments