Welcome!

News Feed Item

Global Survey Reveals Security Concerns Holding Back Data Center Consolidation and Cloud Migration

Strong Security Measures, Including Encryption and Key Management, Are Prerequisites for Businesses to Move Forward with Data Center Consolidation Initiatives

BALTIMORE, Feb. 11, 2014 /PRNewswire/ -- Security concerns are preventing businesses from unlocking the potential benefits of data center consolidation and cloud services, according to new research from SafeNet, Inc., a global leader in data protection. The research, which is based on a global survey of approximately 600 security and IT executives, found that while nearly three-quarters of IT professionals view data center consolidation as important (75 percent EMEA; 73 percent NORAM; 63 percent APAC), more than half (51 percent) have no consolidation plans in place (46 percent EMEA; 49 percent NORAM; 71 percent APAC) and only a quarter have completed consolidation projects.

(Photo:  http://photos.prnewswire.com/prnh/20140211/PH56109-INFO)
(Logo: http://photos.prnewswire.com/prnh/20131031/PH07356LOGO)

The survey results illustrate that security challenges, with regard to addressing encryption and key management needs, may be contributing factors to the slower progress in consolidation efforts, including moving workloads from physical machines to virtualized systems.  Specifically, of those who view data center consolidation as important, 62 percent said their biggest worry was losing control of cryptographic keys (68 percent EMEA; 65 percent NORAM; 59 percent APAC).  This sentiment indicates that strong encryption and secure management of keys are critical prerequisites to data center consolidation and cloud migration.

In fact, only one-fifth (21 percent) of respondents indicated that they are currently doing any encryption in their virtual environments (23 percent EMEA; 22 percent NORAM; 16 percent APAC). As well as encryption and managing cryptographic keys being technically challenging for IT professionals, these survey results also suggest that businesses do not have the required staffing levels in place to support a consolidation project.  Nearly 60 percent of respondents said they had less than five people involved in encryption management globally.  In addition, nearly one-third (27.5 percent) said they had more than 10 business applications that required encryption.

"The adoption of new technologies -- such as big data, mobility, and cloud-based services -- has pushed data center consolidation to the top of the priority list for many businesses. Yet it is clear that security concerns combined with a lack of resources are hampering the progress of such transformations," stated Prakash Panjwani, senior vice president and general manager, SafeNet.

"Any shift in infrastructure can be daunting for IT professionals, however with data now stored across a hybrid IT landscape -- including on-premises, on mobile devices, and in the cloud -- security teams need to move away from traditional approaches and adopt new encryption technologies that support today's dynamic data center and service provider environments," Mr. Panjwani continued.

Looking specifically at current security processes for managing cryptographic keys, the research revealed that:

  • Almost three-quarters (74 percent) have at least some encryption keys in software (74 percent EMEA; 76 percent NORAM; 69 percent APAC) – leaving the door open to attackers.
  • Less than one in ten (8.3 percent) secure their keys solely in hardware (8 percent EMEA; 7 percent NORAM; 14 percent APAC).
  • Just under one-fifth (18 percent) didn't know where their keys were stored (17 percent EMEA; 16 percent NORAM; 17 percent APAC).
  • Less than half of respondents (45.6 percent) manage cryptographic keys centrally (41 percent EMEA; 43 percent NORAM; 45 percent APAC). This sets the stage for inefficiency, overlapping efforts, inconsistent policy enforcement, and difficulty in auditing.

"Encrypted data is only as secure and available as the keys used to encrypt it, so businesses need to ensure they are getting their key management strategies right. By deploying a multi-layer encryption and centralized key management strategy, and leveraging hardware for key management and storage, organizations can accelerate their cloud, virtualization, and consolidation initiatives while also retaining control over their sensitive data," concluded Prakash Panjwani, SafeNet.

Supporting Documents

About the Survey

The research from SafeNet polled more than 580 individuals across more the 50 countries globally. Respondents comprised of security and IT executives from a range of industries, including financial services, healthcare, technology, media, consumer packaged goods, retail, and more.  The full report can be found here.

About SafeNet Data Protection Solutions
SafeNet data protection solutions provide multi-layer encryption with centralized key management and storage. SafeNet delivers the comprehensive encryption platforms that enable security professionals to safeguard sensitive data in data centers, virtualized data centers, and private and public clouds.

SafeNet enables customers to encrypt sensitive data at the storage, file, virtual instance, database, and application layer, while managing encryption security policies and encryption keys centrally. In addition, SafeNet supports format-preserving tokenization for a wide variety of data types. Through this multi-layer approach, SafeNet enables organizations to:

  • Separate administration of systems and applications from the data stored or processed within these infrastructure layers, ensuring privileged users can't see sensitive data.
  • Take advantage of lower-cost operational models while consistently enforcing security policies.
  • Centralize encryption management across physical, virtual, and public cloud environments, and efficiently deliver detailed logs and compliance reporting for internal and external auditors.
  • Employ key vaulting and secure cryptographic resources, both in data center and multi-tenant environments, in order to retain full ownership and control of their encryption service.

With these capabilities, organizations can institute a defense-in-depth strategy that delivers high levels of security for sensitive data, regardless of where it resides—even if there's been a breach of other controls.

About SafeNet
Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organizations around the globe. SafeNet's data-centric approach focuses on the protection of high-value information throughout its lifecycle, from the data center to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments.  Learn more about SafeNet on Twitter, LinkedIn, Facebook, YouTube, and Google +.

CONTACT: Amanda Curtis, 443.327.1276, [email protected]

SOURCE SafeNet, Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that Technologic Systems Inc., an embedded systems solutions company, will exhibit at SYS-CON's @ThingsExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Technologic Systems is an embedded systems company with headquarters in Fountain Hills, Arizona. They have been in business for 32 years, helping more than 8,000 OEM customers and building over a hundred COTS products that have never been discontinued. Technologic Systems’ pr...
How will your company move to the cloud while ensuring a solid security posture? Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is ...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
In his session at 20th Cloud Expo, Chris Carter, CEO of Approyo, will discuss the basic set up and solution for an SAP solution in the cloud and what it means to the viability of your company. Chris Carter is CEO of Approyo. He works with business around the globe, to assist them in their journey to the usage of Big Data in the forms of Hadoop (Cloudera and Hortonwork's) and SAP HANA. At Approyo, we support firms who are looking for knowledge to grow through current business process, where even...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain.
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
Some people worry that OpenStack is more flash then substance; however, for many customers this could not be farther from the truth. No other technology equalizes the playing field between vendors while giving your internal teams better access than ever to infrastructure when they need it. In his session at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, will talk through some real-world OpenStack deployments and look into the ways this can benefit customers of all sizes....
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From ...
Cloud Expo, Inc. has announced today that Andi Mann and Aruna Ravichandran have been named Co-Chairs of @DevOpsSummit at Cloud Expo 2017. The @DevOpsSummit at Cloud Expo New York will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and @DevOpsSummit at Cloud Expo Silicon Valley will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, Cloud Expo and @ThingsExpo are two of the most important technology events of the year. Since its launch over eight years ago, Cloud Expo and @ThingsExpo have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, I provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading the...
In recent years, containers have taken the world by storm. Companies of all sizes and industries have realized the massive benefits of containers, such as unprecedented mobility, higher hardware utilization, and increased flexibility and agility; however, many containers today are non-persistent. Containers without persistence miss out on many benefits, and in many cases simply pass the responsibility of persistence onto other infrastructure, adding additional complexity.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In his general session at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, will explore...
In his session at @ThingsExpo, Steve Wilkes, CTO and founder of Striim, will delve into four enterprise-scale, business-critical case studies where streaming analytics serves as the key to enabling real-time data integration and right-time insights in hybrid cloud, IoT, and fog computing environments. As part of this discussion, he will also present a demo based on its partnership with Fujitsu, highlighting their technologies in a healthcare IoT use-case. The demo showcases the tracking of patie...