How To Get More Out Of Your Data Center



Similar documents
Encryption, Key Management, and Consolidation in Today s Data Center

The EMEA Encryption and Authentication Markets

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

VDI Security for Better Protection and Performance

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Compliance for the Road Ahead

The Convergence of IT Operations Management

Executive Summary P 1. ActivIdentity

SAFENET FOR SERVICE PROVIDERS. Deliver Data Protection Services that Boost Revenues and Margins

Profiting from SafeNet Authentication Service Offerings

Mobile Device Inventory the first step in enterprise mobile management

The Convergence of IT Operations

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

A Security Practitioner s Guide to the Cloud Maintain Trust and Control in Virtualized Environments with SafeNet s Trusted Cloud Fabric

This document has for purpose to elaborate on how Secomea have addressed all these topics with a solution consisting of the three components:

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care

SkySight: New Capabilities to Accelerate Your Journey to the Cloud

FOR THE FUTURE OF DATA CENTERS?

Creating an Enterprise App Store Addressing the Consumerization of IT without Jeopardizing Control

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

Preemptive security solutions for healthcare

How To Understand The Needs Of The Network

2014 HIMSS Analytics Cloud Survey

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it

Secure HIPAA Compliant Cloud Computing

Virtualization and Evolution to the Cloud Survey UNITED KINGDOM RESULTS

WHITEPAPER. Why Businesses are Embracing Cloud IaaS

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.

Cloud Computing and the Federal Government: Maximizing Trust Supporting the Mission and Improving Assurance with Data-centric Information Security

Multi-factor Authentication

WHITE PAPER. Realizing the Value of Unified Communications

SafeNet DataSecure vs. Native Oracle Encryption

Building the Business Case for Cloud: Real Ways Private Cloud Can Benefit Your Organization

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

CONNECTED HEALTHCARE. Trends, Challenges & Solutions

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

Ensuring security the last barrier to Cloud adoption

Complying with PCI Data Security

Future-Proofing Your Authentication Infrastructure

Hands on, field experiences with BYOD. BYOD Seminar

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

AL RAFEE ENTERPRISES Solutions & Expertise.

Strategies for Protecting Virtual Servers and Desktops

I D C T E C H N O L O G Y S P O T L I G H T. W i n d ow s Serve r E n d o f L i f e : An Opportunity t o E va l u a t e I T S tr a t e gy

Cloud Computing in a GxP Environment: The Promise, the Reality and the Path to Clarity

nfrascaletm Whitepaper A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration

Mobile Data Security Essentials for Your Changing, Growing Workforce

RSS Cloud Solution COMMON QUESTIONS

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Whitepaper. Disaster Recovery as a Service (DRaaS): A DR solution for all

CA Enterprise Mobility Management MSO

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

The business value of improved backup and recovery

The Small Business Cloud Outlook. An inside look at how small and mid-size businesses are turning to the cloud to solve everyday issues

2015 VORMETRIC INSIDER THREAT REPORT

VIRTUAL DESKTOP INFRASTRUCTURE: PLENTY OF POTENTIAL, BUT DO THE HOMEWORK BEFORE DIVING IN. by Todd Cota, Jerin May and Joesph Springer

Whitepaper. SaaS Isn t Just For Productivity Anymore Innovative endpoint encryption & security managed through the Cloud.

Contact Center Security: Moving to the Cloud

72% 41% THE MAJORITY OF BUSINESSES SAY THEY EXPECT TO PUT MORE THAN HALF OF THEIR WORKLOADS IN THE CLOUD BY 2017, UP FROM 58% TODAY.

An ICT ConsultingCompany

BRIDGE. the gaps between IT, cloud service providers, and the business. IT service management for the cloud. Business white paper

EndPoint Device Secures Files Transferring and Sharing

Datosphere Platform Product Brief

5 Critical Considerations for. Enterprise Cloud Backup

Peer Research Cloud Security Insights for IT Strategic Planning

Cloud security with Sage Construction Anywhere

The Technical Differential: Why Service Providers Choose VMware for Cloud-Hosted Desktops as a Service

SOLUTION WHITE PAPER. IT Business Management and Compliance Ensuring Cloud Governance

How To Get More Out Of The Cloud

Software-Based Session Border Controllers are Critical to the Evolution of Communications

10 Hidden IT Risks That Threaten Your Practice

When Desktops Go Virtual

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

How To Understand The Reasons For A Cloud-Based Server Farm

2014 Authentication Survey Executive Summary. How Organizations Are Responding to Mobile and Cloud Threats

2011 Virtualization and Evolution to the Cloud Survey

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

New research shows a connection between the use of cloud computing and increased business agility and competitive advantage.

State of Network Security 2014

Best Practices for Secure Mobile Access

Mobilize Your Corporate Content and Apps Enable Simple and Secure Mobile Collaboration for Business.

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business.

BBM Protected Secure mobile

5 Things to Look for in a Cloud Provider When it Comes to Security

The Market for Two-Factor Authentication

Retail store systems for high performance

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

How a Hybrid Cloud Strategy Can Empower Your IT Department

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Work With Genesis Insurance Company

Enterprise mobility trends 2015 and beyond

2013 State of the. enterprise cloud report

Consumerization Survey Report The Consumerization of IT

Technology. Accenture Data Center Services

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

From Private to Hybrid Clouds through Consistency and Portability

Halo. for PCI Compliance. Who Needs PCI in the Cloud? What It Takes to be PCI Compliant

10 Hidden IT Risks That Might Threaten Your Business

Transcription:

Data Center Encryption Survey Executive Summary Securing the Path to Consolidation in Today's Data Center

Overview Many want to make data center consolidation happen, but few have actually done so. While cloud offerings and virtualization have opened up a path for realizing the benefits of consolidation, many organizations are encountering significant hurdles in this journey. A SafeNet survey of more than 580 IT and security professionals explored these trends. In a global market that is increasingly fluid and competitive, organizations have to continue to ensure that they re getting the most value from their IT investments. Consequently, IT and business executives continue to pursue data center consolidation by reducing the number of physical data center sites, expanding the use of virtualization, and adopting cloud initiatives. How s it going? The SafeNet survey revealed several important takeaways: Encryption and key management will unlock the potential of consolidation and cloud. Data center consolidation was a high priority for many respondents, but the survey also indicated that there is a significant gap between attaining that objective and current realities. The survey results highlight the fact that security efforts, like employing encryption and managing cryptographic keys more securely and effectively, are a critical prerequisite to data center consolidation and cloud migration. Challenges in addressing these security requirements may be a contributing factor to the slower progress in consolidation efforts, including moving workloads from physical machines to virtualized systems. Why we re not there yet. In spite of the fact that 73% of survey participants recognized that management efficiency and cost saving were key advantages of data center consolidation and virtualization, they are still delaying decisions on consolidation projects citing technical difficulties at an astounding 53%. Further, while a different study found that twothirds of workloads running on x86 servers are now virtualized 1, only one-fifth of respondents indicated they are currently doing any encryption in their virtual environments. Those who can combine cloud with security and compliance will win. Success in the cloud requires a focus on security, including addressing baseline security controls, such as identity and access management (IAM) and anti-virus, as well as controls like encryption and key management. Those enterprises that can address these requirements will be able to realize the competitive advantages of more fully leveraging consolidation, virtualization, and the cloud. For the service providers that can assist enterprises in these efforts, huge market opportunities await. 1 ServerWatch, Taking Stock of the State of the Server Virtualization Market, Paul Rubens, August 5, 2013, http://www.serverwatch.com/ server-trends/the-state-of-the-server-virtualization-market.html The survey results highlight the fact that security efforts, like employing encryption and managing cryptographic keys more securely and effectively, are a critical prerequisite to data center consolidation and cloud migration. 2

Key Statistics What s Virtualized Isn t Being Encrypted In spite of the massive utilization of virtualization technologies today, only one-fifth of respondents are currently encrypting data in virtualized environments. 73% recognized that management efficiency and cost saving were key advantages of data center consolidation and virtualization % 90 80 70 60 50 40 30 20 10 0 20% Endpoints e.g. laptops, tablets, smartphones File servers Databases Web and other applications Financial applciations Storage Virtual infrastructure External IT (eg cloud, partner, outsourcing) Identity based authentication Electronic signatures (e.g. edocs) None I don t know Consolidation: A Goal Out of Reach? About three-quarters of respondents said data center consolidation is either very or quite important, but less than one-quarter have actually done anything about it. Very important How important is data center consolidation to your organization? Very important Quite important Not currently important 3

Have already consolidated Do you have plans to consolidate your data center? We have already consolidated Yes we have plans Maybe, under consideration No plans to consolidate Why we're not there yet 53% cite technical difficulties as the cause of delay in decisions on consolidation projects 4

So Much, Managed by So Few The survey revealed that encryption teams have to support many forms of encryption, many encrypted applications, and many encryption tools. However, the survey also showed one thing there isn t a lot of: staff members. Well over half, 58.2%, indicated that globally they have less than five people involved with encryption management. How many people are involved in the management of your encryption globally? Less than 5 people <5 6-10 11-25 26-50 >50 The survey revealed that encryption teams have to support many forms of encryption. More than half of respondents are using between one and three different encryption tools. 5

Keys Being Left Under the Door Mat Encrypted data is only as secure and available as the keys used to encrypt it. For instance, when keys are stored in servers, they are susceptible to compromise and loss, which exposes sensitive encrypted data to those same risks. To address these gaps, organizations will increasingly need to leverage purpose-built key management platforms that offer robust security and availability. These purposebuilt platforms allow users to store and manage keys in hardware, where they are more protected and controlled. However, currently around three-quarters of respondents store at least some encryption keys in software the IT equivalent of leaving house keys under the front door mat. Software Where do you secure your cryptographic keys? Software and hardware Software Hardware Software and hardware I don t know 6

The Must-have When Sourcing Solutions: Compliance and Security When sourcing business applications, 74% of respondents are looking for solutions that support compliance and security. One clear reason: Of that group, 59% are currently struggling with auditing their current data center estates. What do you look for when sourcing new business applications? % 90 80 70 60 50 40 30 20 10 0 Fast time to market Compliance and Security Compliance and security Ease of use Conclusion With multi-layer encryption and centralized key management, organizations can accelerate their cloud, virtualization, and data center consolidation initiatives, while retaining the controls they need to protect sensitive data, adhere to internal security policies, and comply with regulatory and government mandates. The service providers and cloud vendors that can deliver solutions that further these objectives will be able to capitalize on significant market opportunities. 7

About the Survey This white paper draws from a survey that SafeNet conducted in Fall 2013. The survey polled more than 580 individuals. Respondents were comprised of security and IT executives from a range of industries, including financial services, healthcare, technology, media, consumer packaged goods, retail, and more. Survey respondents had a truly global makeup, with more than 50 countries represented. About SafeNet Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organizations around the globe. SafeNet s data-centric approach focuses on the protection of high value information throughout its lifecycle, from the data center to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments. 8