Global Cloud critical point: "Thales data Threat Report 2020 - Global Edition" shows that the organization is difficult to deal with security issues after the digital transition

Paris La Defense - (BUSINESS WIRE) - According to "2020 Thales data Threat Report - Global Edition" (2020 Thales the Data the Threat Report -, Ltd. Free Join Edition) and IDC research and analysis which shows that the organization We have reached the critical point of the global cloud , making it difficult to deal with digital technology transition (DX) brings security challenges. Today, all the data in half of respondents (50%) in the cloud, where nearly half (48%) were considered sensitive data. Cloudy With normal use as a new company, all respondents indicated, there are portions of sensitive data stored in the cloud is not encrypted, but the world has 49 percent of respondents said they had suffered a data breach. In addition to the digital transformation and cloudy complexity of this global study also showed that quantum computing has emerged as a major issue of concern, there are 72% of the organizations claimed that quantum computing will affect its security and cryptographic operations within the next five years .

Thales EDT, March 5 Ri (Zhousi) 11:00 am organizing a lecture entitled "Global Status Data Security: cloudy world of Zero Trust" webinar to discuss in detail this global report. Please register to participate.

Fast and secure digital transformation

By executives in charge of the investigation or the impact on the global IT and data security 1,723 bits threat report this year to explore more deeply the specific security challenges of "DX era." The report shows that the higher the level of the digital transition, the possibility of organizing encounter data leakage will be. Although the digital transformation of organizations seeking to gain a competitive advantage is, but the urge to rush to implement disruptive technologies around the world also create new vulnerabilities lead to data leakage and compliance audit failure. The report said that in software as a service (SaaS) and social media digital transition of these two categories ranked the most before, 45% of organizations had suffered a data breach in the past year.

Clear is the new normal, but it is also the biggest obstacle data security

The company is using multiple infrastructure as a service (IaaS) and Platform as a Service (PaaS) environment, as well as hundreds of software as a service (SaaS) applications. 81% of users are using more than one of IaaS vendor ( US 86% ), 81% of users have more than one of the PaaS vendor ( US 86% ), 11% of users want to manage more than 100 SaaS applications. As more data is migrated to the cloud, security issues become more complex. Nearly 40 percent of respondents as the biggest obstacle to the complexity of data security, a slight decrease compared with 44% last year.

Quantum computing upcoming

The global report made people concerned about the impact of quantum computing. 72% of organizations believe that quantum computing will affect their data security operations in the next five years, while 27% of organizations see it as a threat next year, suggesting that organizations need to improve the quantum encryption strength thereafter.

Not all industries have carried out digital transformation at the same speed

"Thales data Threat Report 2020 - Global Edition" also discusses the different levels of government as well as related security challenges, financial services, healthcare and retail industries digital transformation. The federal government organizations worldwide consider themselves to be the most active, nearly half (49%) of government respondents either actively subvert their participation in the market, or are integrated digital capabilities to achieve greater business agility. Followed by followed by health care (47%), retail (45%) and financial services (30%). This year, 54 percent of financial services respondents encountered data leakage or through compliance audits, followed by the government (52%), retail (49%) and healthcare (37%).

Improve data security of key points

The key driving force of challenging data security, but in large data, networking and container applications, encryption is the adoption and use. According to the survey this year, IDC recommends the following key policy for security professionals:

· Invest in modern, mixed and cloudy-based data security tools to enable shared responsibility to play a role model.

Consider zero-trust model to protect data.

• Increase the focus on data discovery solutions and centralized key management to enhance data security.

• A focus on the threat of vector control (threat vectors) within range.

• Use encryption to keep data on the risk of real vigilance.

For more information on the key findings and best security practices, please download the "Thales data Threat Report 2020 - Global Edition" copy.

" Because Cloudy applications and digital transformation, organizations face increasing and more complex network security challenges, they need to be more intelligent, better ways to achieve data protection. Zero Trust is an excellent program that can identify and verify access to applications and network users and devices, but if these measures fail, to protect sensitive data virtually powerless. with powerful data discovery, enhancement, data loss prevention and encryption solutions, to provide an appropriate basis for the data security, It enables comprehensive network protection goals. "

IDC vice president of network security products project Frank Dickson

" " Thales 2020 year data Threat Report - Global Edition "clearly shows that global organizations storing sensitive data in an unprecedented number of cloudy environment implement the right cloud security has never been so important as.. 5G launch of the network, things continue to expand and quantum computing is becoming a reality, organizations must adopt a more modern concept of data protection. the first step in protecting sensitive data to know what data is sensitive data. after identified as sensitive data, you should use the powerful Clear key management strategy for these data encryption and protection. "

Protection and vice president of global marketing strategy software licensing activities of Thales cloud Tina Stewart

Thales blog blog.thalesesecurity.com provide industry insights and views on the latest data security trends.

Welcome concern Thales: Twitter , LinkedIn , Facebook and YouTube .

About Thales

As a global technology leader, today's Thales (Euronext: HO) is the effort to build the world of tomorrow. Its top five markets where the Group, including customers in aviation, aerospace, rail transportation, digital identity and security, and defense fields provide products, services and solutions. Thales 80,000 employees around the world 68 countries, 2018 sales revenue of 19 billion euros (Gemalto merge data).

Thales is committed to investment in innovation, especially digitized, the interconnection, big data, artificial intelligence and four technology areas of network security to help all types of enterprises, institutions and governments to calmly deal with each decision juncture.

发布了2758 篇原创文章 · 获赞 111 · 访问量 78万+

Guess you like

Origin blog.csdn.net/sinat_41698914/article/details/104622303