Businesses embracing encryption to protect their most sensitive data
10 Dec 2012
Business News, Virus News
Almost half of companies worldwide have started using encryption technology to protect critical data. At the same time, companies are facing difficulties in implementing encryption systems and require comprehensive security solutions that are both effective and simple to use.
- Survey conducted by B2B International and Kaspersky Lab in July 2012 polled 3300 senior IT professionals from 22 countries
- 44% of companies have implemented encryption technology to protect critical corporate data
- 36% of IT specialists use full disk encryption (FDE)
- 32% of IT specialists use data encryption on external devices
Encryption is the fifth most widespread protection technique – a sharp rise from the results of a similar survey in 2011 where it barely crept into the top 10. In effect, encryption is the final defensive barrier: even after a criminal has successfully forced his way into the company’s IT infrastructure, this last hurdle makes it extremely difficult to get access to important information.
However, most companies have still not fully introduced encryption. According to the B2B International survey, only one-third of specialists (36%) use full disk encryption (also known as encryption of information arrays) and less than half of those specialists (44%) actually protect critical information. Data encryption on external devices, e.g. USB drives, is used by 32%.
Encryption of highly critical data ranks second among the security measures which companies want to develop, with only protection against malware scoring higher. At the same time, companies are facing difficulties in implementing encryption systems, which are notably absent from the top five protection measures used. These results show that companies require modern systems of information protection, which are both effective and simple to implement.
Download full version of the survey report
Nikolay Grebennikov, Chief Technology Officer
"Encryption is among the most promising technologies for reducing the risk of critical data leakage, but it’s at its most effective when incorporated into a comprehensive security system for corporate IT infrastructure. Our business solutions can provide this comprehensive protection for all corporate network endpoints."