Data Encryption - A Market Update from Bloor Research

silhouette of a person

Written By: Nigel Stanley
Published: 6th March, 2009
Content Copyright © 2009 Bloor. All Rights Reserved.

In March 2009 Bloor Research released a Market Update on the subject of Data Encryption.

The past year has, yet again, seen significant data loss incidents that could have easily been avoided if sensible data encryption had been implemented. Gradually the flood of horror stories are forcing a rethink across both the private and public sectors as they grasp the significant impact a data loss incident can have on customers, clients or citizens.

Arguably the protection of data should be one of the top objectives of any IT function. Encryption, which is the process of taking a piece of data and obscuring it so that unauthorised people cannot view it should therefore be fundamental to the work of an IT department in any sizeable organisation. Small and medium sized businesses are also realising that data protection, in the form of encryption, is for them as well.

Encryption has always been surrounded with a mystique that seems designed to confuse anyone other than the most technically adept. Ultimately the key business decision is to protect data, the way this is done is not that relevant at a business level. What is of interest is the cost associated with managing such a security model. In particular the way in which keys, which enable data to be encrypted/decrypted, are managed can have a significant affect on the cost of owning a solution.

Encryption vendors range from very small, technically clever businesses through to much larger and significant players in the world of data encryption products. Any decision to embark on a data encryption purchase needs to be taken at a strategic level within an organisation as a customer will be closely aligned to their encryption supplier for a long time. Replacing an encryption solution with another is a complex, time consuming task so it is better to make the best decision at the beginning. An encryption supplier needs to be assessed for their stability and maturity as well as their product set as customers need to be assured that the supplier will be around in years to come.

Historically confidential data may only have been handled by a select few members of an executive team, but now it is likely to be accessed by all levels of staff throughout an organisation. Increasingly having a secure, encrypted IT infrastructure is a prerequisite for dealing electronically with many financial and institutional data suppliers such as banks and brokerages.

This prevalence of confidential information across a business posses a challenge to corporate policy makers and the IT departments who are tasked with keeping the data secure. Countless cases have been highlighted over the past year where staff at all levels have accessed vast amounts of valuable data only for it to stolen from unprotected laptops, transferred to business partner servers, or sent via email to recipients with uncertain security. The downturn in the global economy has forced many out of work. Where in the past this may have been production or manual workers, the latest downturn is affecting knowledge workers that have access to computer systems and data. Often bearing a grudge or resenting the decision to let them go ex-employees will often remove data in the form of customer lists, email accounts or other sensitive data. Clearly being fired stretches the loyalty of the most diligent of employees.

Various legislation is now in place, in some jurisdictions, to force data owners to publicly disclose if confidential data is lost. This requirement is removed if the data is encrypted.

Stresses in the global economy are putting even more data at risk of inappropriate access. Data encryption, in what ever format, is here to stay as it forms an integral component of a secure computing environment. This market update has highlighted key players and how they are striving to innovate in the encryption market. Inevitably the larger and more stable vendors will win business from large and enterprise sized customers but there is still demand for innovative solutions from the small encryption vendors.

One year on the strategic deployment of encryption solutions is still seen as difficult by many organisations and vendors must work hard to provide a product set that can be rolled out systematically over a period of time. Many customers have had a bad experience of encryption solutions and need reassurance that a new solution will be fit for purpose. Of significant concern will be key management and how this can be made more manageable than in the past - this appears to still be the number one issue with customers that have had a bad experience with encryption. The development of the OASIS open key management protocol will be followed with interest by many.

Debates about email encryption architectures will continue, but ultimately it is up to a customer organisation to deploy an email encryption solution that best fits their messaging infrastructure. Either choice of encryption is better than none, bearing in mind the quantity and quality of data that is communicated via email.

Inevitably the distinction between encryption and data leak prevention will continue to erode as vendors talk of a more comprehensive Enterprise Data Protection architecture. This will take time as acquisitions and partnerships need to settle down and technologies shared. At the lower end of the market, for example individual consumers and very small businesses, there will still be demand for basic encryption as a stand alone offering as they do not face the same management issues as larger enterprises. This will continue to provide an opportunity for the more tactical encryption vendors.

This next year will continue to see a colossal change in the worldwide financial system and the associated risks to data of all forms. The need for decent encryption should therefore be very high on any IT security professionals agenda.

The Market Update is available free of charge at BloorAnswers.com and features a number of vendors including;

  • CheckPoint
  • McAfee
  • BeCrypt
  • Verdasys
  • Credant Technologies
  • Sophos
  • GuardianEdge
  • PGP
  • RSA
  • Mobile Armor
  • FrontRange Solutions
  • SafeNet
  • DESLock
  • CryptoForge
  • Symantec
  • Vormetric
  • WinMagic
  • Tumbleweed Communications
  • Secude
  • Safend
  • Aladdin
  • Dekart
  • CA
  • Cisco
  • Voltage Security
  • Microsoft
  • Cryptzone

Post a comment?

We welcome constructive criticism on all of our published content. Your name will be published against this comment after it has been moderated. We reserve the right to contact you by email if needed.

If you don't want to see the security question, please register and login.